نتایج جستجو برای: mobile jammer

تعداد نتایج: 172187  

2014
Miroslav Pajic Rahul Mangharam

Resilience to electromagnetic jamming and its avoidance are difficult problems. It is often both hard to distinguish malicious jamming from congestion in the broadcast regime and a challenge to conceal the activity patterns of the legitimate communication protocol from the jammer. In the context of energy-constrained wireless sensor networks, nodes are scheduled to maximize the common sleep dur...

2012
Ryan J.R Thompson Ediz Cetin Andrew G. Dempster

In this paper the performance of GPS timing under jamming conditions is evaluated in the context of a GPS jammer localization system that uses the TimeDifference-Of-Arrival (TDOA) technique. To investigate the performance of GPS timing receivers under jamming conditions, jammer signals of different types and powers were combined with real GPS signals and input into two timing receivers and the ...

Journal: :Computer Networks 2016
Suman Bhunia Vahid Behzadan Paulo Alexandre Regis Shamik Sengupta

In multihop ad hoc networks, a jammer can drastically disrupt the flow of information by intentionally interfering with links between a subset of nodes. The impact of such attacks can escalate when the jammer is moving. As a countermeasure for such attacks, adaptive beamforming techniques can be employed for spatial filtering of the jamming signal. This paper investigates the performance of ada...

2014
P. V. Aswani Kumari

In recent days, reactive enjoying strike has appeared as an exceptional security risk to wireless sensor network [WSN]. A few schemes are generated to acknowledge the trigger nodes, whose valid transmitting stimulates any reactive jammer. After identifying the trigger node, the node may likely be shut down to deactivate the jammer and its particular routing information is eliminated within the ...

2007
Amir Winshtok Yossef Steinberg

In this work we characterize the rate-distortion function of a Wyner-Ziv source, depending on an arbitrarily varying state, known non-causally at the encoder. We then consider the problem of joint source-channel coding of this source transmitted over an arbitrarily varying Gel’fand-Pinsker channel, where we assume that one jammer controls both, the source state sequence and the channel state se...

2011
Andrey Garnaev Yezekael Hayel Eitan Altman Konstantin Avrachenkov

In this paper we suggest a development of the channel capacity concept for a dynamic slotted ALOHA network. Our object is to find maxmin successful transmissions of an information over a dynamic communication channel. To do so, we analyze an ALOHA-type medium access control protocol performance in the presence of a jammer. The time is slotted and the system is described as a zero-sum multistage...

Journal: :EURASIP J. Wireless Comm. and Networking 2014
Bowen Duan Yueming Cai Jianchao Zheng Weiwei Yang Wendong Yang

This paper proposes a bargaining-based jammer power allocation scheme for multi-source multi-destination wireless network in the presence of a friendly jammer and a malicious node which eavesdrops erratically. We formulate the erratic behavior of the eavesdropper as a novel model where the eavesdropper wiretaps the message of the legitimate sources with a certain probability in a time slot. Mor...

2017
Monica Ravishankar D. Vijay Rao

The delay-tolerant-network (DTN) model is becoming a viable communication alternative to the traditional infrastructure model for military, terrestrial and atypical networks, which are characterised by transmission delay and intermittent network connections. The possibility of limited connectivity and resource scarcity in DTNs make them vulnerable to various cyber-attacks, including interferenc...

Journal: :CoRR 2016
Amr Abdelaziz Can Emre Koksal Hesham El Gamal

Angle of Arrival (AoA) estimation has found its way to a wide range of applications. Much attention have been paid to study different techniques for AoA estimation and its applications for jamming suppression, however, security vulnerability issues of AoA estimation itself under hostile activity have not been paid the same attention. In this paper, the problem of AoA estimation in Rician flat f...

2004
Anil Kandangath

Spread spectrum (SS) communication systems are now commonly used in civilian applications such as cellular systems and GPS and are fast becoming one of the most commonly used systems. Very low power SS systems such as Global Positioning Systems are extremely vulnerable to high power jammers. A vast array of techniques are available to resolve this problem and this paper attempts to review some ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید