نتایج جستجو برای: jamming mitigation

تعداد نتایج: 36306  

Journal: :Navigation: journal of the Institute of Navigation 2023

Abstract New GNSS applications demand resilience against radio interference and high position accuracy. Separately, these demands can be fulfilled by multi-antenna systems using spatial filtering carrier-phase positioning algorithms like real-time kinematic (RTK), respectively. However, combining approaches encounters a severe issue: The induces phase offset into the measured carrier l...

2007
Ali Broumandan Tao Lin

Jammer and interference are sources of errors in positions estimated by GNSS receivers. The interfering signals reduce signal-to-noise ratio and cause receiver failure to correctly detect satellite signals. Because of the robustness of beamforming techniques to jamming and multipath mitigation by placing nulls in direction of interference signals, an antenna array with a set of multi-channel re...

2014
Shixian Gong Xizhang Wei Xiang Li Yongshun Ling

For coherent jammers to wideband linear frequency modulation (LFM) radar, the ratio between jamming energy and signal energy is always constant. To enhance the jamming to signal ratio (JSR), a two-dimensional (2D) discretized coherent noise jamming (2D-DCNJ) method is first proposed in this paper, where the covering area of the noise jamming results in 2D imaging is limited to a certain shape a...

2004
Mithun Acharya Tanu Sharma David Thuente David Sizemore

Total physical jamming in wireless networks can be realized by generating continuous high power noise in the vicinity of wireless receiver nodes. The purpose of this paper is to show, using OPNET simulations, that similar jamming effectiveness can be achieved with much lower total energy. In the first half of the paper, we study the effects of periodic jamming with various power levels on the n...

Journal: :IJAHUC 2014
Kanika Grover Alvin S. Lim Qing Yang

Because of the proliferation of wireless technologies, jamming in wireless networks has become a major research problem due to the ease in blocking communication in wireless networks. Jamming attacks are a subset of denial of service (DoS) attacks in which malicious nodes block legitimate communication by causing intentional interference in networks. To better understand this problem, we need t...

2010
E. Steltz A. Mozeika J. Rembisz N. Corson H. M. Jaeger

This paper presents a new architecture in soft robotics that utilizes particulate jamming technology. A novel concept of actuation is described that utilizes jamming technology to modulate the direction and magnitude of the work performed by a single central actuator. Jamming “activators” modulate work by jamming and unjamming (solidifying and liquifying) a granular medium coupled to a core act...

Journal: :Wireless Engineering and Technology 2010
Rakesh Kumar Jha Hardik Patel Upena D. Dalal A. Wankhede Vishal

This paper presents simulation of WiMAX based system under jamming. The performance of the system was found out to greatly differ with the use of different jamming signals, allowing central areas to be identified, where system development should be focused on. In addition, from the basic theory point of view, rather surprising results were also found. This work should give a clear picture of ho...

Journal: :CoRR 2015
Sheng Wang Chunliang Chu

Jamming attacks could cause severe damage to Wireless Sensor Networks (WSNs). Once jamming attack occurs, the most urgent work is to get the position information of the jammer. Then safety measures to eliminate the jamming effects can be devised. In this paper, the jammer localization is conducted by geometric covering method to achieve a low energy consumption. And utilizing the power of the j...

1996
John P. McDermott David M. Goldschlag

Storage jamming can degrade real-world activities that share stored data. Storage jamming is not prevented by access controls or cryptographic techniques. Verification to rule out storage jamming logic is impractical for shrink-wrapped software or low-cost custom applications. Detection mechanisms do offer more promise. In this paper, we model storage jamming and a detection mechanism, using Un...

2016
S. Rajeswari R. Maheswari

-The effort of this article is regarding to detect jamming attacks in wireless networks. The Jamming detection and techniques have been proposed in the journalism. They established results by the authors are often CA and JADE as most of the jamming regions are closely marked, and they do not help to clearly differentiate jamming mechanisms. We explore a different jamming attack by discovering t...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید