نتایج جستجو برای: mobile jammer

تعداد نتایج: 172187  

2015
Maria Scalabrin Valentina Vadori Anna V. Guglielmi

We consider a jamming problem, modeled as a zero-sum game with incomplete information played by a wireless network and a malicious jammer that wants to disrupt communication, in a wireless scenario with distance-dependent loss of the wireless medium. Multiple access is achieved by means of parallel channels, characterized by different propagation parameters. The jammer is unaware of the exact p...

2008
R. Li X. Zhao X. W. Shi

A class of linear derivative constraints, which provides robustness to the conventional narrowband uniform linear array configuration so as to handle broadband and moving jammer sources problem is presented. The robust modification of linear constrained minimum variance (LCMV) algorithm is given to broaden the null widths in the jammer directions. Numerical results show that the proposed algori...

Journal: :JCS 2014
R. Dhanasekaran G. Singaravel

Large number of low power, tiny radio jammers are constituting a Distributed Jammer Network (DJN) is used nowadays to cause a Denial of Service (DoS) attack on a Distributed Wireless Network (DWN). Using NANO technologies, it is possible to build huge number of tiny jammers in millions, if not more. The Denial of Service (DoS) attacks in Distributed Wireless Network (DWN) using Distributed Jamm...

2013
Manjesh Kumar Hanawal

In this thesis we analyze the performance of communication networks using game theoretic approaches. The thesis is in two parts. The first part studies the performance of Ad hoc, cellular and transportation networks taking into consideration spatial effects. The second part studies economic issues in the communication networks related to the ‘net neutrality’ regulations. Here we study price com...

2014
Divya Ann Luke

The wireless networks are more sensitive to the Denial-of-Service (DoS) attacks. The existing system is based on Spread Spectrum (SS). This technique mainly focuses on an external threat model. In wireless network the communications between nodes take place through broadcast communication. That is why, if an attacker present within the network can easily eavesdrop the message sent by any node. ...

2013
Ramalingam Sugumar

The jammer controls the probability of jamming and the transmission range in order to cause maximal damage to the network in terms of corrupted communication links. The jammer action ceases when it is detected by the network (namely by a monitoring node), and a notification message is transferred out of the jammed region. The jammer is detected by employing an optimal detection test based on th...

2015
S. Choe S. Jeon

In this paper, we present a Link-16-based tactical data link (TDL) simulator with cognitive antijamming capability (CAJC). CAJC improves antijamming capability of existing TDL by adding the cognitive radio (CR) spectrum sensing-based jammer detection. In the presented TDL, each terminal that senses (or detects) the jammer signal can avoid the jammer spectrum opportunistically. For jammer signal...

Objective(s): The increasing rate of over using cell phones has been considerable in youths and pregnant women. We examined the effect of mobile phones radiation on genes expression variation on cerebellum of BALB/c mice before and after of the birth. Materials and Methods: In this study, amobile phone jammer, which is an instrument to prevent receiving signals between cellular phonesand base t...

Journal: :CoRR 2018
Holger Boche Minglai Cai Ning Cai

In this paper we propose a new model for arbitrarily varying classical-quantum channels. In this model a jammer has side information. We consider two scenarios. In the first scenario the jammer knows the channel input, while in the second scenario the jammer knows both the channel input and the message. The transmitter and receiver share a secret random key with a vanishing key rate. We determi...

Journal: :International journal of Computer Networks & Communications 2014

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید