نتایج جستجو برای: mobile jammer
تعداد نتایج: 172187 فیلتر نتایج به سال:
We consider a jamming problem, modeled as a zero-sum game with incomplete information played by a wireless network and a malicious jammer that wants to disrupt communication, in a wireless scenario with distance-dependent loss of the wireless medium. Multiple access is achieved by means of parallel channels, characterized by different propagation parameters. The jammer is unaware of the exact p...
A class of linear derivative constraints, which provides robustness to the conventional narrowband uniform linear array configuration so as to handle broadband and moving jammer sources problem is presented. The robust modification of linear constrained minimum variance (LCMV) algorithm is given to broaden the null widths in the jammer directions. Numerical results show that the proposed algori...
Large number of low power, tiny radio jammers are constituting a Distributed Jammer Network (DJN) is used nowadays to cause a Denial of Service (DoS) attack on a Distributed Wireless Network (DWN). Using NANO technologies, it is possible to build huge number of tiny jammers in millions, if not more. The Denial of Service (DoS) attacks in Distributed Wireless Network (DWN) using Distributed Jamm...
In this thesis we analyze the performance of communication networks using game theoretic approaches. The thesis is in two parts. The first part studies the performance of Ad hoc, cellular and transportation networks taking into consideration spatial effects. The second part studies economic issues in the communication networks related to the ‘net neutrality’ regulations. Here we study price com...
The wireless networks are more sensitive to the Denial-of-Service (DoS) attacks. The existing system is based on Spread Spectrum (SS). This technique mainly focuses on an external threat model. In wireless network the communications between nodes take place through broadcast communication. That is why, if an attacker present within the network can easily eavesdrop the message sent by any node. ...
The jammer controls the probability of jamming and the transmission range in order to cause maximal damage to the network in terms of corrupted communication links. The jammer action ceases when it is detected by the network (namely by a monitoring node), and a notification message is transferred out of the jammed region. The jammer is detected by employing an optimal detection test based on th...
In this paper, we present a Link-16-based tactical data link (TDL) simulator with cognitive antijamming capability (CAJC). CAJC improves antijamming capability of existing TDL by adding the cognitive radio (CR) spectrum sensing-based jammer detection. In the presented TDL, each terminal that senses (or detects) the jammer signal can avoid the jammer spectrum opportunistically. For jammer signal...
Objective(s): The increasing rate of over using cell phones has been considerable in youths and pregnant women. We examined the effect of mobile phones radiation on genes expression variation on cerebellum of BALB/c mice before and after of the birth. Materials and Methods: In this study, amobile phone jammer, which is an instrument to prevent receiving signals between cellular phonesand base t...
In this paper we propose a new model for arbitrarily varying classical-quantum channels. In this model a jammer has side information. We consider two scenarios. In the first scenario the jammer knows the channel input, while in the second scenario the jammer knows both the channel input and the message. The transmitter and receiver share a secret random key with a vanishing key rate. We determi...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید