نتایج جستجو برای: jamming mitigation

تعداد نتایج: 36306  

2015
Hui Sun Rui Wang Yanxiao Zhao

Dynamic Spectrum Access (DSA) network is envisioned as a promising candidate to significantly improve the spectrum utilization. Due to its specific features of the DSA, however, this network is more vulnerable to security attacks than the traditional wireless networks. And channel jamming is a one of main threats to DSA networks. So far, limited works have been done in mathematical and formal m...

Journal: :Perform. Eval. 2014
Cankut Orakcal David Starobinski

We introduce a theoretical framework to formally analyze the vulnerability of IEEE 802.11 rate adaptation algorithms (RAAs) to selective jamming attacks, and to develop countermeasures providing provable performance guarantees. Thus, we propose a new metric called Rate of Jamming (RoJ), wherein a low RoJ implies that an RAA is highly vulnerable to jamming attacks, while a high RoJ implies that ...

2013
G. Sridevi

Wireless networks are susceptible to numerous security vulnerabilities due to the open nature of the wireless medium. Anyone with a transceiver can eavesdrop on ongoing transmissions, block the transmission of legitimate ones or inject spurious messages. One of the fundamental ways for degrading the overall network performance is by jamming wireless transmissions. In this paper, we deal with th...

2015
Henna Khosla Rupinder Kaur

© 2015, IRJET.NETAll Rights Reserved Page 510 Jamming Attack Detection and Isolation to Increase Efficiency of the Network in Mobile Ad-hoc Network 1Henna Khosla, Student, Department of Electronics and Communication Engineering, Punjabi University, Patiala, Punjab, India 2Rupinder Kaur, Assistant Professor, Department of Electronics and Communication Engineering, Patiala, Punjab, India --------...

2015
Carl P. Goodrich Andrea J. Liu James P. Sethna

We propose a scaling ansatz for the elastic energy of a system near the critical jamming transition in terms of three relevant fields: the compressive strain ∆φ relative to the critical jammed state, the shear strain , and the inverse system size 1/N . We also use ∆Z, the number of contacts relative to the minimum required at jamming, as an underlying control parameter. Our scaling theory predi...

1997
John P. McDermott

Recent literature on information warfare has suggested that general replication is not useful in dealing with storage jamming attacks. We show that special cases of replication are useful not only in detecting but also in recovering from storage jamming attacks.

2007
Jason Sargent Lois Burgess Peter W. Eklund

This paper describes the first hand experiences of the electronic point of care (ePOC) project team and the project management and research and development issues that emerged over the course of a collaborative 3 year eHealth project. The paper highlights that despite the best of intentions by project managers, researchers and developers, a technologically innovative concept is no guarantee of ...

Journal: :Frontiers in artificial intelligence and applications 2022

In the condition of complex electromagnetic environment and multifarious methods activate jamming, anti-jamming approach has been highlighted. Anti-jamming method based on waveform entropy is used to counter nonsynchronous short pulse jamming because its low compute complexity easy implementation. This paper analyzes performance, obtain decision threshold value by taking use kernel function, ex...

Journal: :Nature Physics 2011

Journal: :M/C Journal 2006

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید