نتایج جستجو برای: jamming mitigation

تعداد نتایج: 36306  

2009
Lei Zhang Tongtong Li

This paper considers spectrally efficient anti-jamming system design based on message-driven frequency hopping (MDFH). As a highly efficient frequency hopping scheme, MDFH is particularly robust under strong jamming. However, disguised jamming from sources of similar power strength can cause performance losses. To overcome this drawback, in this paper, we first propose an anti-jamming MDFH (AJ-...

2004
I. Garvanov Ivan Popchev

In many practical situations, however, the environment is presence of strong pulse jamming (PJ) with high intensity; the pulse jamming is with binomial distribution. In this case, the pulse jamming can cause drastic degradation in the performance of Constant False Alarm Rate (CFAR) processors. In this paper, CA CFAR and CA CFAR BI (binary integration) processors in binomial distributed pulse ja...

2016
Wang Jun

Convolution false-targets jamming against LFM fire-control radars generates range and velocity false targets which are coherent with target echo, which increases the difficulty of jamming detection and suppression and makes the victim radar system lost the track of real target. To combat against this type of jamming, the uncorrelated characteristic between the jamming and echo in FRFT domain is...

2009
Zaw Htike Choong Seon Hong

Radio jamming attack is the most effective and easiest Denial-of –Service (DOS) attack in wireless network. In this paper, we proposed a multi-channel MAC protocol to mitigate the jamming attacks by using cognitive radio. The Cognitive Radio (CR) technology supports real-time spectrum sensing and fast channel switching. By using CR technologies, the legitimate nodes can perform periodic spectru...

2015
S. Raja Ratna R. Ravi

Wireless networks are built upon the open shared medium which makes easy for attackers to conduct malicious activities. Jamming is one of the most serious security threats to information economy and it must be dealt efficiently. Jammer prevents legitimate data to reach the receiver side and also it seriously degrades the network performance. The objective of this paper is to provide a general o...

2005
Melanie R. Rieback Bruno Crispo Andrew S. Tanenbaum

This paper introduces an off-tag RFID access control mechanism called “Selective RFID Jamming”. Selective RFID Jamming protects low-cost RFID tags by enforcing access control on their behalf, in a similar manner to the RFID Blocker Tag. However, Selective RFID Jamming is novel because it uses an active mobile device to enforce centralized ACL-based access control policies. Selective RFID Jammin...

1997
J. McDermott

Storage jamming [15] is malicious but surreptitious modification of stored data, to reduce its quality. The person initiating the storage jamming does not receive any direct benefit. Instead, the goal is more indirect, such as deteriorating the position of a competitor. We assume that a Trojan horse does the storage jamming, since the Trojan horse may access data that the attacker cannot. Manua...

Journal: :EURASIP J. Adv. Sig. Proc. 2014
Kresimir Dabcevic Alejandro Betancourt Lucio Marcenaro Carlo S. Regazzoni

Cognitive radio (CR) promises to be a solution for the spectrum underutilization problems. However, security issues pertaining to cognitive radio technology are still an understudied topic. One of the prevailing such issues are intelligent radio frequency (RF) jamming attacks, where adversaries are able to exploit on-the-fly reconfigurability potentials and learning mechanisms of cognitive radi...

2013
G. Bala Raju

Wireless networks now enjoy widespread commercial implementation because of their ease of use, low cost and setup. However, since accessing wireless media is much easier than tapping a wired network, then security becomes a serious concern when implementing any wireless network. We consider a particular class of Denial of Service (DoS) attacks called jamming attacks. In the simplest form of jam...

2000
Mika Ståhlberg

The dependence on Mobile Networks is growing. The success of the Internet was followed by Denial of Service attacks. What if the same happens to Mobile Networks? This paper gives an introduction to the concept of Radio Jamming and explores jamming resistance of two popular mobile networks: GSM and WLAN. Radio interfaces of the two systems are analysed and effective jamming-to-noise ratios are c...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید