نتایج جستجو برای: jamming mitigation
تعداد نتایج: 36306 فیلتر نتایج به سال:
Dynamic Spectrum Access (DSA) network is envisioned as a promising candidate to significantly improve the spectrum utilization. Due to its specific features of the DSA, however, this network is more vulnerable to security attacks than the traditional wireless networks. And channel jamming is a one of main threats to DSA networks. So far, limited works have been done in mathematical and formal m...
We introduce a theoretical framework to formally analyze the vulnerability of IEEE 802.11 rate adaptation algorithms (RAAs) to selective jamming attacks, and to develop countermeasures providing provable performance guarantees. Thus, we propose a new metric called Rate of Jamming (RoJ), wherein a low RoJ implies that an RAA is highly vulnerable to jamming attacks, while a high RoJ implies that ...
Wireless networks are susceptible to numerous security vulnerabilities due to the open nature of the wireless medium. Anyone with a transceiver can eavesdrop on ongoing transmissions, block the transmission of legitimate ones or inject spurious messages. One of the fundamental ways for degrading the overall network performance is by jamming wireless transmissions. In this paper, we deal with th...
© 2015, IRJET.NETAll Rights Reserved Page 510 Jamming Attack Detection and Isolation to Increase Efficiency of the Network in Mobile Ad-hoc Network 1Henna Khosla, Student, Department of Electronics and Communication Engineering, Punjabi University, Patiala, Punjab, India 2Rupinder Kaur, Assistant Professor, Department of Electronics and Communication Engineering, Patiala, Punjab, India --------...
We propose a scaling ansatz for the elastic energy of a system near the critical jamming transition in terms of three relevant fields: the compressive strain ∆φ relative to the critical jammed state, the shear strain , and the inverse system size 1/N . We also use ∆Z, the number of contacts relative to the minimum required at jamming, as an underlying control parameter. Our scaling theory predi...
Recent literature on information warfare has suggested that general replication is not useful in dealing with storage jamming attacks. We show that special cases of replication are useful not only in detecting but also in recovering from storage jamming attacks.
This paper describes the first hand experiences of the electronic point of care (ePOC) project team and the project management and research and development issues that emerged over the course of a collaborative 3 year eHealth project. The paper highlights that despite the best of intentions by project managers, researchers and developers, a technologically innovative concept is no guarantee of ...
In the condition of complex electromagnetic environment and multifarious methods activate jamming, anti-jamming approach has been highlighted. Anti-jamming method based on waveform entropy is used to counter nonsynchronous short pulse jamming because its low compute complexity easy implementation. This paper analyzes performance, obtain decision threshold value by taking use kernel function, ex...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید