نتایج جستجو برای: mobile jammers
تعداد نتایج: 171927 فیلتر نتایج به سال:
Wireless Sensor Network (WSN) is an emerging technology for various applications public sector, private sector and military. It formed by a large number of networked sensing nodes. It contains of many sensor devices to cooperatively monitor selected target locations and communicate with base stations. Due to the different requirements of large-scale and realtime data processing in WSNs, provide...
Wireless communications are vulnerable to signal jamming attacks that can block mission-critical messages from being received. Spread spectrum techniques mitigate these attacks by spreading normal narrowband signals over a much wider band of frequencies and forcing jammers who do not know the spreading pattern to expend much more effort to launch the attack. In broadcast systems, however, jamme...
Wireless communication is susceptible to radio interference and jamming attacks, which prevent the reception of communications. Most existing anti-jamming work does not consider the location information of radio interferers and jammers. However, this information can provide important insights for networks to manage its resource in different layers and to defend against radio interference. In th...
MRI workers are occupationally exposed to static and time-varying gradient magnetic fields. While the 24-hour time-averaged exposure to static magnetic fields is about a few mT, the maximum static field strength can be as high as 500 mT during patient setup. Over the past several years, our laboratory has performed extensive experiments on the health effects of exposure of animal models and h...
This article focuses on the secure routing problem in decentralized Internet of Things (IoT). We consider a typical IoT scenario composed peer legitimate devices, unauthorized devices (eavesdroppers), and selfish helper jamming (jammers), propose novel incentive jamming-based scheme. For pair source destination, we first provide theoretical modeling to reveal how transmission security performan...
In this paper, we analyze the impact of a friendly unmanned aerial vehicle (UAV) jammer on UAV communications in presence multiple eavesdroppers. We first present channel components determined by line-of-sight (LoS) probability between and ground device, introduce different fadings for LoS non-line-of-sight (NLoS) links. then derive secrecy transmission satisfying both constraints legitimate wi...
1. Introduction Global positioning system (GPS) employing satellite-based location techniques has been widely used in providing precision navigational capabilities for aircraft, ships, and ground traffic. Due to a large processing gain with spread spectrum techniques employed, GPS receivers can be effective in extracting the navigational information signals transmitted from satellites at a powe...
We study the performance of the IEEE 802.11 MAC protocol under a range of jammers that covers both channel-oblivious and channel-aware jamming. We consider two channel-oblivious jammers: a periodic jammer that jams deterministically at a specified rate, and a memoryless jammer whose interfering signals arrive according to a Poisson process. We also develop new models for channel-aware jamming, ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید