Статті в журналах з теми "Radio jamming"

Щоб переглянути інші типи публікацій з цієї теми, перейдіть за посиланням: Radio jamming.

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Radio jamming".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.

1

Fast, Walter. "Molecular Radio Jamming." Chemistry & Biology 10, no. 1 (January 2003): 1–2. http://dx.doi.org/10.1016/s1074-5521(03)00005-x.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Riza, Bob Subhan. "An Energy-Efficient Jamming Attacks Detection based on Cognitive Radio Networks." International Innovative Research Journal of Engineering and Technology 6, no. 2 (December 30, 2020): CS—37—CS—45. http://dx.doi.org/10.32595/iirjet.org/v6i2.2020.140.

Повний текст джерела
Анотація:
5G wireless networks, primarily because of the device - to - device connections can enable huge networking. Dynamic bandwidth connectivity is a feature that enables device-to-device connections. Applications configured with cognitive radios must be authorized to reprocess the bandwidth consumed by cellular connections. The complex efficiency of the bandwidth allows cognitive consumers to switch between networks. In specific, switching contributes to energy efficiency, delay, and bandwidth connectivity. When the system is under the jamming attack, the computational cost much more. It is a major problem to fix jamming while ensuring an optimal level of operation. Thus, existing anti-jamming methods consider static users, this suggests preventive measures for wireless cognitive radio users in this paper and test them. The multivariate cumulative total was used in this study to classify suspicious activity like jamming attacks in Cognitive Radio Networks (CRN). Preventive-measures are being taken to resolve security risks to cognitive radio networks. The Intrusion Detection System (IDS) has been presented, including a way of preventing attacks on the cognitive radio network infrastructure.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

McKinney, Tiffany. "Radio Jamming: The Disarmament of Radio Propaganda." Small Wars & Insurgencies 13, no. 3 (December 2002): 111–44. http://dx.doi.org/10.1080/09592310208559200.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Sârbu, Annamaria, and Dumitru Neagoie. "Wi-Fi Jamming Using Software Defined Radio." International conference KNOWLEDGE-BASED ORGANIZATION 26, no. 3 (June 1, 2020): 162–66. http://dx.doi.org/10.2478/kbo-2020-0132.

Повний текст джерела
Анотація:
AbstractIn this article we present software defined radio (SDR) instrumentation used for interfering or jamming Wi-Fi networks. A Wi-Fi network analyzer application was used together with a low cost, commercially available SDR, Hack RF one, to conduct aimed interference on a 802.11 b/g/n network. A GNU radio flowchart was used to control the radio transceiver (SDR) by emitting a jamming signal aimed towards the targeted client by means of a directional antenna. Various signal bandwidths and distance from the targeted device were tested to characterize the adequate parameters of an effective jamming signal with respect to the calculated signal to noise ratio (SNR). Jamming efficiency was evaluated by means of a Wi-Fi connectivity speed test application installed on the targeted device, in order to measure connectivity degradation if complete jamming was not possible. Results presented suggest that Wi-Fi jamming is possible by means of SDR technology, providing insights on the methodology used and initial optimisation procedures in the test environment.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Ksendzuk, A. V. "UNMANNED AERIAL VEHICLE DETECTION AND JAMMING RADIO COMPLEX." Issues of radio electronics, no. 3 (March 20, 2018): 19–24. http://dx.doi.org/10.21778/2218-5453-2018-3-19-24.

Повний текст джерела
Анотація:
Modern threats for anti-missile system and space surveillance and tracking system objects include terroristic and unidentifiable unmanned aerial vehicle. To counter these threats a concept of radar complex for unmanned aerial vehicles jamming and detection proposed. Complex consists of non-radiating radio locator, radio warfare station and global navigation jamming radar. Structure, principle of operation and basic technical characteristics of these systems described. Counter-drone actions algorithm in proposed complex described and analyzed. Results of mom-radiating radar development in JSC MAK Vimpel and its experimental investigation described. Precision of estimation range, velocity and angular location described. Jamming effectiveness estimator schematic diagram proposed. Jamming effectiveness may be estimated on navigation equipment or program models of prospective GPS receivers. Results of effective jamming signal development presented. Results may be used in small low-energy counter drone radioelectronic systems development for anti-missile and Space Surveillance and Tracking system objects.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Park, Kwi Woo, Min Joon Lee, and Chansik Park. "A Design of Anti-jamming Method Based on Spectrum Sensing and GNSS Software Defined Radio." E3S Web of Conferences 94 (2019): 03004. http://dx.doi.org/10.1051/e3sconf/20199403004.

Повний текст джерела
Анотація:
This paper presents result of new approach for anti-jamming using a method based on cognitive radio. To detect and get center frequency and bandwidth of jamming, a spectrum sensing based on multi-channel energy detector is implemented on the SDR. The SDR and a universal software radio peripheral is used to support real-time channel reconfiguration. And detected center frequency and bandwidth is used to select LO frequency to avoid jamming and receive GNSS signal. Then the receiver is reconfigured by the selected LO frequency. To verify the feasibility of the proposed anti-jamming process, position, carrier to noise ratio of each channel are measured using a test scenario that is consist of GPS and Beidou with a CW jamming. As a results, by switching of LO frequency, GNSS signal that is not affected by jamming can be received with the same performance as non-jamming.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Zhu, Yanmin, and Yuan Jiang. "On Optimal Antijamming Strategies in Sensor Networks." International Journal of Distributed Sensor Networks 8, no. 4 (April 1, 2012): 793194. http://dx.doi.org/10.1155/2012/793194.

Повний текст джерела
Анотація:
Physical layer radio jamming is a serious security threat to a wireless sensor network since the network relies on open wireless radio channels. A radio jammer is typically strategic and chooses its jamming strategy in response to the possible defense strategy taken by the sensor network. In this paper we model the interaction between the sensor network and the attacker as a noncooperative nonzero-sum static game. In such a game, the sensor network has a set of strategies of controlling its probability of wireless channel access and the attacker manipulates its jamming by controlling its jamming probability after sensing a transmission activity. We propose an algorithm for computing the optimal strategies for jamming attack and network defense. A critical issue is that there may exist a number of possible strategy profiles of Nash equilibria. To address this issue, we further propose to choose realistic Nash equilibria by applying the Pareto dominance and risk dominance. Our numerical results demonstrate that the strategies chosen by the Pareto dominance and risk dominance achieve the expected performance. Our results presented in the paper provide valuable defense guidance for wireless sensor networks against jamming attacks.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Shaikh, Sarmad Ahmed, Muhammad Minhaj Arshad, Hammad Mehmood Cheema, Muhammad Zainul Abideen, and Syed Masaab Ahmed. "An Educational Training Kit for an Efficient GPS Anti-Jamming System." International Journal of Emerging Technologies in Learning (iJET) 16, no. 06 (March 30, 2021): 231. http://dx.doi.org/10.3991/ijet.v16i06.21251.

Повний текст джерела
Анотація:
Global positioning system (GPS) is one of the key satellite-based radio technolo-gy providing navigational services on earth or near earth. The increasing usage of GPS applications in daily life has proved that students/researchers of many edu-cational departments including information and communication technology (ICT) are particularly interested to learn and visualize the GPS anti-jamming techniques in a simpler way in their major communication courses. It is a fact that GPS radio signal is vulnerable in various ways to jamming signals launched by malicious el-ements. The traditional available GPS anti-jamming techniques generally involve either added hardware and/or computational complexity which introduce difficul-ty for students to understand the basic concepts. As an alternative, this paper pre-sents a simpler GPS anti-jamming system kit based on L1-band (1.575 GHz) of GPS for education purpose. More specifically, the proposed antenna array, inte-grated with two couplers, cancels out the jamming signal in radio frequency (RF) domain using sum and difference patterns generated by the latter. The simulated and measured results, in terms of scattering parameters and power profiles, of the proposed system have shown that the jamming signal can be eliminated with less complexity. Eventually, the proposed GPS anti-jamming system has great poten-tial to be used in ICT related disciplines for learning and training purposes.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Di Pietro, R., and G. Oligeri. "Jamming mitigation in cognitive radio networks." IEEE Network 27, no. 3 (May 2013): 10–15. http://dx.doi.org/10.1109/mnet.2013.6523802.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Ibrahim, Khalid, Soon Xin Ng, Ijaz Mansoor Qureshi, Aqdas Naveed Malik, and Sami Muhaidat. "Anti-Jamming Game to Combat Intelligent Jamming for Cognitive Radio Networks." IEEE Access 9 (2021): 137941–56. http://dx.doi.org/10.1109/access.2021.3117563.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
11

Ibrahim, Khalid, Soon Xin Ng, Ijaz Mansoor Qureshi, Aqdas Naveed Malik, and Sami Muhaidat. "Anti-Jamming Game to Combat Intelligent Jamming for Cognitive Radio Networks." IEEE Access 9 (2021): 137941–56. http://dx.doi.org/10.1109/access.2021.3117563.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
12

Bożek, Konrad. "Implementation of ZKR-1 Wireless Communication Jammer. Presentation of the Results of Research and Development Projects." Pomiary Automatyka Robotyka 26, no. 1 (March 21, 2022): 41–46. http://dx.doi.org/10.14313/par_243/41.

Повний текст джерела
Анотація:
The article presents two modular radio transmission jamming devices developed by the consortium of Łukasiewicz-PIAP and ITTI sp. z o.o. as part of the project: „Jamming of radio transmission in selected facilities of the Border Guard”. In typical operating conditions the devices ensure effective blocking of radio communication (prevention of information leakage, protection against remote radio detonation of IED) and analysis of the frequency spectrum in the 25 MHz to 5.9 GHz band. Developed jammers are intended for use by professional state services, have a modern user interface and offer the possibility of remote control. The most important parameters and functionalities are characterized, as well as the distinguishing non-standard operating modes are discussed, i.e. the spectrum analysis mode and the responsive jamming mode, which minimizes the negative effects of user’s exposure to electromagnetic radiation in the vicinity of working devices for a long time.
Стилі APA, Harvard, Vancouver, ISO та ін.
13

Suárez, Fabio Alberto, William Alexander Cuevas, and Jorge Enrique Gaitán Ruiz. "Exploración del estado del arte en dispositivos inhibidores de radio frecuencia." Perspectivas en Inteligencia 10, no. 19 (December 20, 2018): 289–98. http://dx.doi.org/10.47961/2145194x.67.

Повний текст джерела
Анотація:
Se ha venido realizando diferentes exploraciones en el Centro de Investigación (CEINV) de la Escuela de Comunicaciones Militares (ESCOM) ubicada en la ciudad de Facatativá (Cundinamarca), con el fin de desarrollar el diseño de un inhibidor o ‘jammer’ de drones, por medio de una onda moduladora con forma de señal triangular sumada a un ruido de tipo blanco con el fin, de que tenga las características de jamming de barrido, pues, en el estándar 802.11 es sensible a este tipo de interferencia, el cual es usado para el control de drones. Cabe destacar, que existen diferentes estrategias de ‘jamming’ dependiendo la necesidad y las condiciones del entorno, donde, se emplearán las que se pueden definir en “jamming” por ruido de banda-ancha, “jamming” por ruido de banda parcial y “jamming” por ruido de banda-angosta, de las cuales, se derivan cuatro tipos de jammer basadas en las estrategias anteriormente mencionadas (Instituto Politécnico Nacional de México, 2001). Por lo tanto, se elegirá el más óptimo para cumplir con el objetivo de poder interrumpir la señal de control de un dron.
Стилі APA, Harvard, Vancouver, ISO та ін.
14

Mazin, A. V., and M. Yu Aliyev. "METHODS OF JAMMING INTERFERENCE." Issues of radio electronics, no. 11 (November 20, 2018): 80–84. http://dx.doi.org/10.21778/2218-5453-2018-11-80-84.

Повний текст джерела
Анотація:
The article investigates the problem of providing high noise immunity radar under the influence of passive and intentional interference. The purpose of radio operation of the radar is to create conditions that would impede the operation of systems and minimize its effectiveness. The main method of radio transmission is still creating (staging) interference. Modern radar systems must solve the tasks in terms of electronic suppression using, including intentional interference and under severe time constraints. It is shown that the most effective way to improve the noise immunity of radar systems designed to operate in multipoint space, including non-stationary, interference is adaptive space-time processing of the received signals, based on the angular selection of targets, due to the formation of zeros in the directional diagram in the direction of interference sources. This problem is solved by determining the accuracy of the direction finding of interference sources and is achieved by the joint operation of the antenna array and multi-channel signal processing devices, namely the separation of interference signals on different receiving channels.
Стилі APA, Harvard, Vancouver, ISO та ін.
15

Ibrahim, Khalid, Abdullah M. Alnajim, Aqdas Naveed Malik, Athar Waseem, Saleh Alyahya, Muhammad Islam, and Sheroz Khan. "Entice to Trap: Enhanced Protection against a Rate-Aware Intelligent Jammer in Cognitive Radio Networks." Sustainability 14, no. 5 (March 3, 2022): 2957. http://dx.doi.org/10.3390/su14052957.

Повний текст джерела
Анотація:
Anti-jamming in cognitive radio networks (CRN) is mainly accomplished using machine learning techniques in the domains of frequency, coding, power and rate. Jamming is a major threat to CRN because it can cause severe performance damage such as network isolation, network application interruption and even physical damage to infrastructure simple radio devices. With the improvement in communication technologies, the capabilities of adversaries are also increased. The intelligent jammer knows the rate at which users transmit data, which is based on the attractiveness factor of each user. The higher the data rate for a secondary user, the more attractive it is to the rate-aware jammer. In this paper, we present a dummy user in the network as a honeypot of the jammer to get the jammer’s attention. A new anti-jamming deceiving theoretical method based on rate modifications is introduced to increase the bandwidth efficiency of the entire cognitive radio-based communication system. We employ a defensive anti-jamming deception mechanism of the Pseudo Secondary User (PSU) to as an entice to trap the attacker by providing thus enhanced protection for the rest of the network from the impact of the attacker. Our analytical simulation results show a significant improvement in performance using the proposed solution. The utility of the proposed intelligent anti-jamming algorithm lies in its applications to support the secondary wireless sensor nodes.
Стилі APA, Harvard, Vancouver, ISO та ін.
16

Wang, Zixiang, Fan Zhen, Senlin Zhang, Meiqin Liu, and Qunfei Zhang. "Jamming-resilient algorithm for underwater cognitive acoustic networks." International Journal of Distributed Sensor Networks 13, no. 8 (August 2017): 155014771772630. http://dx.doi.org/10.1177/1550147717726309.

Повний текст джерела
Анотація:
Due to the limit spectrum resource in the underwater acoustic networks, underwater cognitive acoustic communication is a promising technique. The channel sharing mechanism in cognitive networks can improve the communication capacity efficiently. Jamming attack is a common deny of service attack in cognitive networks. In the underwater cognitive acoustic networks, the anti-jamming problem is quite different from cognitive radio networks. It calls for an effective anti-jamming strategy in the cognitive acoustic channel access. In this article, we propose an online learning anti-jamming algorithm called multi-armed bandit–based acoustic channel access algorithm to achieve the jamming-resilient cognitive acoustic communication. The imperfect channel sensing and the constraints of underwater acoustic communication are considered in the anti-jamming game. Under different kinds of jamming attacks, the channel utilization can be improved with our jamming-resilient approach.
Стилі APA, Harvard, Vancouver, ISO та ін.
17

Soysa, Madushanka, Pamela C. Cosman, and Laurence B. Milstein. "Optimized Spoofing and Jamming a Cognitive Radio." IEEE Transactions on Communications 62, no. 8 (August 2014): 2681–95. http://dx.doi.org/10.1109/tcomm.2014.2331964.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
18

Kim, Yongchul. "Fast and Robust Asynchronous Rendezvous Scheme for Cognitive Radio Networks." Applied Sciences 9, no. 12 (June 18, 2019): 2481. http://dx.doi.org/10.3390/app9122481.

Повний текст джерела
Анотація:
The rendezvous process is considered a key operation that allows a secondary user (SU) to access an unused authorized spectrum in cognitive radio networks (CRNs). Most existing works focused on fast guaranteed rendezvous without considering a sophisticated jamming attack environment. In this paper, I propose a fast and robust asynchronous rendezvous scheme that can improve robustness against jamming attacks under symmetric asynchronous environments in which all SUs have the same available channels. Unfortunately, in CRNs, each SU can have a different number of available channels due to their relative position to primary nodes (PUs). Therefore, I extend my fast and robust asynchronous rendezvous scheme (FRARS) to a general asymmetric scenario while preserving robustness against jamming attacks. I derive the maximum rendezvous time (MTTR) of my new algorithm and the upper bound of the expected TTR (ETTR) and compare it with the state-of-the-art algorithms such as jump-stay (JS) and Enhanced jump-stay (EJS). My numerical results show that the performance of the proposed technique is better than that of JS and EJS in terms of MTTR and ETTR. Also, the performance will be more significant when there are security concerns about a sophisticated jamming attack.
Стилі APA, Harvard, Vancouver, ISO та ін.
19

Pushpa Latha, S., and R. Sabitha. "New Analytical Channel Allocation Methodology for Multichannel Multi-Radio Wireless Networks." Journal of Computational and Theoretical Nanoscience 17, no. 5 (May 1, 2020): 2396–401. http://dx.doi.org/10.1166/jctn.2020.8902.

Повний текст джерела
Анотація:
In wireless technologies, jamming attack is a main Research problem in multichannel multi-radio as they block communication in wireless networks. Malicious nodes block legitimate communication through jamming attacks that causes intentional interference. This paper presents the problem of jamming attack in multichannel multi-radio wireless network. First, Allocated the channel in Randomized manner and measure the Entropy rate. Second, defined the channel capacity. Third determined noiseless channel. Furthermore, Find the responses from channel and compare Response channel (H(S/R)) with Noise less channel (T). If H(S/R) ∈ T, Then to select the channel otherwise to reject the channel and assign (H(S/R)) = Attack. Finally, Based on the jammer detection algorithm, the result is compared with cyclic spectral analysis. But the proposed algorithm computation process is very simple than cyclic spectral analysis algorithm and Cyclostationary.Based jammer Detection Algorithm.
Стилі APA, Harvard, Vancouver, ISO та ін.
20

Cadeau, Wednel, Xiaohua Li, and Chengyu Xiong. "Markov Model Based Jamming and Anti-Jamming Performance Analysis for Cognitive Radio Networks." Communications and Network 06, no. 02 (2014): 76–85. http://dx.doi.org/10.4236/cn.2014.62010.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
21

Lin, Ying. "Jamming-Aware Randomized Spectrum Sharing in Cognitive Radio Communication Networks." Applied Mechanics and Materials 513-517 (February 2014): 834–40. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.834.

Повний текст джерела
Анотація:
We investigatein this paper spectrum sharing techniques for multiple unlicensed userstoshareanavailablesparechannelincognitiveradionetworks. Inparticular,consideringasingle-slotted aloha channel access model, we develop an effcient transmission framework that enablesthe detection of jamming attacks. The proposed transmission strategy adopts a randomized PN-codeassignmentforeach transmissionslot. Furthermore,giventhePN-basedtransmissionframe-work, a two-step jamming detection algorithm is also devised by combining an energy detectorand a correlation detector. Theoretical analysis of the detection performance is presented and theimpactofsystemparameters is demonstratedthroughnumericalexamples.
Стилі APA, Harvard, Vancouver, ISO та ін.
22

Wu, Di, Hui Liu, and Ya Jun Wang. "Research of Anti-RGPO/RGPI Jamming for Radar Seeker." Applied Mechanics and Materials 644-650 (September 2014): 4355–59. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.4355.

Повний текст джерела
Анотація:
Analysis on the operation principle of digital radio frequency memory range (DRFM) with range gate pull off/in (RGPO/RGPI), a model of jamming signal is found in this paper. The use of stretch in the process of radar seeker receive signal is considered, so that the actual target echoes and jamming echoes will be moved into different frequencies. Then a low pass filter can be utilized to cancel the jamming signal and the actual target echo can be rebuilt through inverse stretch dealing. The simulation results show that this method can effectively suppress jamming signal.
Стилі APA, Harvard, Vancouver, ISO та ін.
23

Metzl, Jamie Frederic. "Rwandan Genocide and the International Law of Radio Jamming." American Journal of International Law 91, no. 4 (October 1997): 628–51. http://dx.doi.org/10.2307/2998097.

Повний текст джерела
Анотація:
Since its first transatlantic use in 1901, the radio has proven a remarkably powerful and versatile tool. It was used to incite racial hatred in Nazi Germany, Bosnia and Rwanda. Through Vatican Radio and other outlets, it has been harnessed to inspire love and peace. It has been used as an implement both to wage war and to coordinate relief activities in the aftermath of disaster. International broadcast stations like Radio Free Europe and Radio Martí have been viewed by some as a force of liberation, and by others as a tool of imperialism and hegemony.
Стилі APA, Harvard, Vancouver, ISO та ін.
24

Markevich, V. E. "INCREASE OF EFFICIENCY OF SUPPRESSION OF THE ACTIVE NOISE JAMMING IN RADAR INTERCEPTION OF AIR TARGETS IN THE REVIEW MODE." «System analysis and applied information science», no. 1 (May 4, 2017): 57–68. http://dx.doi.org/10.21122/2309-4923-2017-1-57-68.

Повний текст джерела
Анотація:
The modified algorithm of the adaptive compensating of the active noise jamming, based on usage of the recurrence estimation of inverse covariance matrix of jamming in the course of an self-tuning is considered. The matrix estimation is formed by a method of a serial regression (SRM), a consequence application of a lemma about inversing of a matrix to differential – to the difference equation for a rounded estimation of direct covariance matrix of jamming (CMJ). The single estimation of straight line CMJ is formed as result dyad products of the instant vectors of noises in handling channels. In partial channels the adaptive transversal filters with the self-tuning on value of a signal of an aggregate error are implemented.In article skeleton diagrams of devices of the compensating implemented by various methods are resulted. Mathematical modeling of operation of the algorithms, implemented by a method of the least squares (criterion of a minimum RMS error) and a method of a serial regression is performed.Results of mathematical modeling of operation of the device of compensating of active noises jamming in the conditions of the active radio-electronic counteraction at multipath propagation of signals both non-identical amplitude and phase characteristics of channels of handling are resulted. Optimal values of technical parameters of devices of compensating of the active noises jamming providing obtaining of demanded values of coefficient of suppression are given. The comparative analysis of indexes of efficiency of classical and offered algorithms of compensating is made. Advantage of algorithm of compensating of the active noises jamming, using the recurrence estimation of a inverse covariance matrix of jamming is shown.The algorithm of functioning on the basis of SRM allows to lower essentially requirements to specialized VLSI (FPGA) at implementation is hardware – program complexes for preprocessing of the radar, radio communication and radio – navigation information in the conditions of influence of the active noises jamming in the presence of effects of multipath propagation of signals, in the presence of delay of signals on an antenna system aperture, and also at unremovable technological dispersion amplitude and phase characteristics of the microwave of channels of handling.
Стилі APA, Harvard, Vancouver, ISO та ін.
25

Wu, Ben, Yang Qi, Chenxi Qiu, and Ying Tang. "Wideband Anti-Jamming Based on Free Space Optical Communication and Photonic Signal Processing." Sensors 21, no. 4 (February 6, 2021): 1136. http://dx.doi.org/10.3390/s21041136.

Повний текст джерела
Анотація:
We propose and demonstrate an anti-jamming system to defend against wideband jamming attack. Free space optical communication is deployed to provide a reference for jamming cancellation. The mixed signal is processed and separated with photonic signal processing method to achieve large bandwidth. As an analog signal processing method, the cancellation system introduces zero latency. The radio frequency signals are modulated on optical carriers to achieve wideband and unanimous frequency response. With wideband and zero latency, the system meets the key requirements of high speed and real-time communications in transportation systems.
Стилі APA, Harvard, Vancouver, ISO та ін.
26

Hao, Xin Hong, Hui Ling Chen, Kai Yue, and Yang Xun. "Method of Suppressing Noise AM Jamming with EMD for Combined Modulation Radio Ranging System." Applied Mechanics and Materials 740 (March 2015): 739–43. http://dx.doi.org/10.4028/www.scientific.net/amm.740.739.

Повний текст джерела
Анотація:
In this paper, aimed at suppressing the noise amplitude modulation jamming for a novel combined modulation radio ranging system, which transmits the waves combining pseudo random binary phase code (PRBPC) with linear frequency modulation (LFM), a signal processing method based on the empirical mode decomposition (EMD) and reconstruction of the target correlation peak signal is presented. Firstly, the correlation detection output signal of the ranging system is theoretically derived and proved to meet the condition of the Intrinsic Mode Function (IMF). Then the EMD processing for the target correlation peak signal, completely covered by the noise amplitude modulation (AM) jamming, is done and decomposes the signal into several IMFs. The difference of certain main IMF between the target signal and the strong jamming is utilized to reconstruct the target correlation function as the input signal of the detecting part. It is proved by simulation that the processing gain to the noise AM jamming can be significantly improved and the main lobe of the reconstructed correlation peak signal is more obvious, therefore it can be more easily identified.
Стилі APA, Harvard, Vancouver, ISO та ін.
27

Li, Yueqin, Heping Hang, Jun Zhang, and Minggang Shao. "A Radio Fuze Anti-Jamming Performance Evaluation Method." Open Cybernetics & Systemics Journal 9, no. 1 (May 29, 2015): 448–55. http://dx.doi.org/10.2174/1874110x01509010448.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
28

Berdyshev, A. V., Vladimir B. Avdeev, and S. N. Panychev. "Radio Jamming of Heterodyne Receivers at Interim Frequency." Telecommunications and Radio Engineering 66, no. 12 (2007): 1079–81. http://dx.doi.org/10.1615/telecomradeng.v66.i12.40.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
29

Zander, J. "Jamming in slotted ALOHA multihop packet radio networks." IEEE Transactions on Communications 39, no. 10 (1991): 1525–31. http://dx.doi.org/10.1109/26.103048.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
30

Huang, Jen-Feng, Guey-Yun Chang, and Jian-Xun Huang. "Anti-Jamming Rendezvous Scheme for Cognitive Radio Networks." IEEE Transactions on Mobile Computing 16, no. 3 (March 1, 2017): 648–61. http://dx.doi.org/10.1109/tmc.2016.2561275.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
31

Hoar, Peter. "Jamming Imperialism: Māori Radio and Postcolonial New Zealand." TMG Journal for Media History 22, no. 2 (December 19, 2019): 43. http://dx.doi.org/10.18146/tmg.592.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
32

Thanh, Pham-Duy, Hiep Vu-Van, and Insoo Koo. "Efficient Channel Selection and Routing Algorithm for Multihop, Multichannel Cognitive Radio Networks with Energy Harvesting under Jamming Attacks." Security and Communication Networks 2018 (2018): 1–12. http://dx.doi.org/10.1155/2018/7543212.

Повний текст джерела
Анотація:
We study jamming attacks in the physical layer of multihop cognitive radio networks (MHCRNs) where energy-constrained relays forward information from the source to the destination. Meanwhile, a jammer can transmit interfering signals on a channel such that all ongoing transmissions on this channel will be corrupted. In this paper, all jammers can attack only one of the predefined channels in each time slot. Moreover, they can randomly switch channels to start jamming another channel at the beginning of every time slot. The switching behavior is assumed to follow a Gaussian distribution. Due to limited battery capacity in the relays, energy harvesting is utilized to solve the energy-constrained problem in the cognitive radio network. Subsequently, relays are able to harvest energy from non-radio frequency (non-RF) signals such as solar, wind, or temperature. In this paper, we determine the throughput/delay ratio as a key metric to evaluate the performance in MHCRNs. Owing to the limited battery capacity in the relays and the jamming problem, the source needs to select proper relays and channels for each data transmission frame to optimize overall network performance in terms of end-to-end delay, throughput, and energy efficiency. Therefore, we provide two novel multihop allocation schemes to maximize achievable end-to-end throughput while minimizing delay in the presence of jammers. Through simulation results, we validate the effectiveness of the proposed schemes under multiple jamming attacks in MHCRNs.
Стилі APA, Harvard, Vancouver, ISO та ін.
33

Wang, Dawei, Pinyi Ren, Qinghe Du, Li Sun, and Yichen Wang. "Downlink and Uplink Cooperative Transmission for Primary Secrecy Based Cognitive Radio Sensor Networks." International Journal of Distributed Sensor Networks 2015 (2015): 1–14. http://dx.doi.org/10.1155/2015/152851.

Повний текст джерела
Анотація:
Aiming at allocating more licensed spectrum to wireless sensor nodes (SNs) under the constraint of the information security requirement of the primary system, in this paper, we propose a cooperative relaying and jamming secure transmission (CRJS) scheme in which SNs will relay primary message and jam primary eavesdrop concurrently with SN’s downlink and uplink information transmission in cognitive radio sensor networks (CRSNs). In our proposed CRJS scheme, SNs take advantages of physical layer secure technologies to protect the primary transmission and acquire some interference-free licensed spectrum as a reward. In addition, both decode-and-forward (DF) and amplify-and-forward (AF) relaying protocols are investigated in our proposed CRJS scheme. Our object is to maximize the transmission rate of SNs by optimal allocating of the relaying power, jamming power, and downlink and uplink transmit power under the target secure transmission rate requirement of the primary system. Moreover, two suboptimal algorithms are proposed to deal with these optimization problems. Furthermore, we analyze the transmission rate of SNs and allocate the relaying power, jamming power, and downlink and uplink transmit power for the asymptotic scenarios. Simulation results demonstrate the performance superiority of our developed strategy over conventional jamming scheme in terms of the transmission rate of WSN.
Стилі APA, Harvard, Vancouver, ISO та ін.
34

Liu, Hongdi, Hongtao Zhang, Yuan He, and Yong Sun. "Jamming Strategy Optimization through Dual Q-Learning Model against Adaptive Radar." Sensors 22, no. 1 (December 26, 2021): 145. http://dx.doi.org/10.3390/s22010145.

Повний текст джерела
Анотація:
Modern adaptive radars can switch work modes to perform various missions and simultaneously use pulse parameter agility in each mode to improve survivability, which leads to a multiplicative increase in the decision-making complexity and declining performance of the existing jamming methods. In this paper, a two-level jamming decision-making framework is developed, based on which a dual Q-learning (DQL) model is proposed to optimize the jamming strategy and a dynamic method for jamming effectiveness evaluation is designed to update the model. Specifically, the jamming procedure is modeled as a finite Markov decision process. On this basis, the high-dimensional jamming action space is disassembled into two low-dimensional subspaces containing jamming mode and pulse parameters respectively, then two specialized Q-learning models with interaction are built to obtain the optimal solution. Moreover, the jamming effectiveness is evaluated through indicator vector distance measuring to acquire the feedback for the DQL model, where indicators are dynamically weighted to adapt to the environment. The experiments demonstrate the advantage of the proposed method in learning radar joint strategy of mode switching and parameter agility, shown as improving the average jamming-to-signal radio (JSR) by 4.05% while reducing the convergence time by 34.94% compared with the normal Q-learning method.
Стилі APA, Harvard, Vancouver, ISO та ін.
35

Lan, Xuegang, Tao Wan, Kaili Jiang, Ying Xiong, and Bin Tang. "Intelligent Recognition of Chirp Radar Deceptive Jamming Based on Multi-Pulse Information Fusion." Sensors 21, no. 8 (April 11, 2021): 2693. http://dx.doi.org/10.3390/s21082693.

Повний текст джерела
Анотація:
The perception of jamming types is very important for protecting our radar in complex electromagnetic environments. Radar active deceptive jamming based on digital radio frequency memory (DRFM) has a high coherence with the target echo, which confuses the information of the target echo and achieves the effect of hiding the real target. Traditional deceptive jamming recognition methods need to extract complex features and artificially set classification thresholds, which is inefficient. The existing neural network-based jamming identification methods still follow the pattern of signal modulation-type identification, so there are fewer types of jamming that can be identified, and the identification accuracy is low in the case of low jamming-to-noise ratios (JNR). This paper studies the input of jamming recognition networks and proposes an improved intelligent identification method for chirp radar deceptive jamming. This method fuses three short-time Fourier transform time–frequency graphs disturbed by three consecutive pulse periods into a new graph as the input of the convolutional neural network (CNN). Using a CNN to classify the time–frequency image has realized the recognition of a variety of common deceptive jamming techniques. Similarly, by changing the network input, the original signal is used to replace the echo signal, which improves the accuracy of the jamming recognition in the case of a low JNR.
Стилі APA, Harvard, Vancouver, ISO та ін.
36

Meamari, Ehsan, Khadijeh Afhamisisi, and Hadi Shahriar Shahhoseini. "Game Theory-Based Analysis on Interactions Among Secondary and Malicious Users in Coordinated Jamming Attack in Cognitive Radio Systems." Journal of Circuits, Systems and Computers 25, no. 08 (May 17, 2016): 1650097. http://dx.doi.org/10.1142/s0218126616500973.

Повний текст джерела
Анотація:
IEEE 802.22 Standard utilizes cognitive radio (CR) techniques to allow sharing unused spectrum band. CR is vulnerable to various attacks such as jamming attacks. This paper has focused on coordinated jamming attacks. A simple strategy for secondary users is to change their bands and switch to other appropriate bands when the jamming attack has occurred. Also, the malicious users should switch to other bands in order to jam the secondary users. To address this problem, a game theoretical method is proposed to analyze coordinated jamming attacks in CR. Then, using Nash equilibrium on the proposed game, the most appropriate bands have been found to switch as well as the optimal switching probabilities for both secondary and malicious users. Meanwhile, effects of different parameters like the number of malicious users are investigated in changing the optimal switching probabilities by analysis of the model.
Стилі APA, Harvard, Vancouver, ISO та ін.
37

Lu, Lu, and Meiguo Gao. "A Truncated Matched Filter Method for Interrupted Sampling Repeater Jamming Suppression Based on Jamming Reconstruction." Remote Sensing 14, no. 1 (December 25, 2021): 97. http://dx.doi.org/10.3390/rs14010097.

Повний текст джерела
Анотація:
Interrupted sampling repeater jamming (ISRJ) is becoming more widely used in electronic countermeasures (ECM), thanks to the development of digital radio frequency memory (DRFM). Radar electronic counter-countermeasure (ECCM) is much more difficult when the jamming signal is coherent with the emitted signal. Due to the intermittent transmission feature of ISRJ, the energy accumulation of jamming on the matched filter shows a ‘ladder’ characteristic, whereas the real target signal is continuous. As a consequence, the time delay and distribution of the jamming slice can be obtained based on searching the truncated-matched-filter (TMF) matrix. That is composed of pulse compression (PC) results under matched filters with different lengths. Based on the above theory, this paper proposes a truncated matched filter method by the reconstruction of jamming slices to suppress ISRJ of linear frequency modulation (LFM) radars. The numerical simulations indicate the effectiveness of the proposed method and validate the theoretical analysis.
Стилі APA, Harvard, Vancouver, ISO та ін.
38

Gladyshev, A. B., A. N. Fomin, and D. S. Ermolenko. "Mobile complex of electronic countermeasures of satellite navigation systems for unmanned aerial vehicles." Spacecrafts & Technologies 6, no. 1 (March 29, 2022): 38–44. http://dx.doi.org/10.26732/j.st.2022.1.05.

Повний текст джерела
Анотація:
In this time using small unmanned pilot apparitions, weight until 10 kg in search and sabotage target acquires more and more relevance. Besides using resources of radiolocation for searching come less effective. It is due to small sizes unmanned pilot apparition, materials which are used in this and low flying of apparitions. Because more effective resources nitralisation small unmanned pilot apparition is instrument of radio-electronic suppression. Use in unmanned satellite systems of navigation with replacing antenna include navigation receivers in the upper hemisphere of apparitions create some problem of jamming by ground-based means of radioelectronic suppression. In this document provide variant of mobile complex include radio-electronic suppression satellite systems of navigation unmanned pilot apparitions with using passive radio-reflection with aerodynamic stabilization devices. This complex of model, calculated power jamming signal, defined using range of transmitting device, retold types of transmitting antennas used.
Стилі APA, Harvard, Vancouver, ISO та ін.
39

Ho-Van, Khuong, and Thiem Do-Dac. "Reliability-Security Trade-Off Analysis of Cognitive Radio Networks with Jamming and Licensed Interference." Wireless Communications and Mobile Computing 2018 (2018): 1–15. http://dx.doi.org/10.1155/2018/5457176.

Повний текст джерела
Анотація:
Cognitive radio networks (CRNs) allow coexistence of unlicensed users (UUs) and licensed users (LUs) and hence, mutual interference between UUs and LUs is neither ignored nor considered as Gaussian-distributed quantity. Additionally, exploiting jamming signals to purposely interfere with signal reception of eavesdroppers is a feasible solution to improve security performance of CRNs. This paper analyzes reliability-security trade-off, which accounts for maximum transmit power constraint, interference power constraint, jamming signal, and Rayleigh fading, and considers interference from LUs as non-Gaussian-distributed quantity. Toward this end, exact closed-form expressions of successful detection probability and successful eavesdropping probability, from which reliability-security trade-off is straightforwardly visible, are first suggested and then validated by Monte-Carlo simulations. Various results demonstrate that interference from LUs considerably decreases both probabilities while jamming signal enlarges the difference between them, emphasizing its effectiveness in improving security performance.
Стилі APA, Harvard, Vancouver, ISO та ін.
40

Wang, Jingning, Meng Liu, and Yi Zhang. "Research on Intelligent anti-jamming communication with Cognitive Radio." EAI Endorsed Transactions on Cognitive Communications 4, no. 14 (January 14, 2019): 155074. http://dx.doi.org/10.4108/eai.11-5-2018.155074.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
41

Wang, Wenjing, Shameek Bhattacharjee, Mainak Chatterjee, and Kevin Kwiat. "Collaborative jamming and collaborative defense in cognitive radio networks." Pervasive and Mobile Computing 9, no. 4 (August 2013): 572–87. http://dx.doi.org/10.1016/j.pmcj.2012.06.008.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
42

Wang, B., Yongle Wu, K. J. R. Liu, and T. C. Clancy. "An anti-jamming stochastic game for cognitive radio networks." IEEE Journal on Selected Areas in Communications 29, no. 4 (April 2011): 877–89. http://dx.doi.org/10.1109/jsac.2011.110418.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
43

Wu, Yongle, Beibei Wang, K. J. Ray Liu, and T. Charles Clancy. "Anti-Jamming Games in Multi-Channel Cognitive Radio Networks." IEEE Journal on Selected Areas in Communications 30, no. 1 (January 2012): 4–15. http://dx.doi.org/10.1109/jsac.2012.120102.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
44

Mietzner, Jan, Patrick Nickel, Askold Meusling, Patrick Loos, and Gerhard Bauch. "Responsive communications jamming against radio-controlled improvised explosive devices." IEEE Communications Magazine 50, no. 10 (October 2012): 38–46. http://dx.doi.org/10.1109/mcom.2012.6316774.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
45

Yue, Guosen, and Xiaodong Wang. "Anti-jamming coding techniques with application to cognitive radio." IEEE Transactions on Wireless Communications 8, no. 12 (December 2009): 5996–6007. http://dx.doi.org/10.1109/twc.2009.12.081627.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
46

Poonam, Ravi Kant, and Chander Kumar Nagpal. "A Novel Anti-Jamming Technique for Cognitive Radio Network." International Journal of Grid and Distributed Computing 9, no. 11 (November 30, 2016): 247–60. http://dx.doi.org/10.14257/ijgdc.2016.9.11.21.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
47

Tanergüçlü, Türker, Oya Ekin Karaşan, İbrahim Akgün, and Ezhan Karaşan. "Radio Communications Interdiction Problem under deterministic and probabilistic jamming." Computers & Operations Research 107 (July 2019): 200–217. http://dx.doi.org/10.1016/j.cor.2019.03.013.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
48

Aref, Mohamed A., and Sudharman K. Jayaweera. "Jamming-Resilient Wideband Cognitive Radios with Multi-Agent Reinforcement Learning." International Journal of Software Science and Computational Intelligence 10, no. 3 (July 2018): 1–23. http://dx.doi.org/10.4018/ijssci.2018070101.

Повний текст джерела
Анотація:
This article presents a design of a wideband autonomous cognitive radio (WACR) for anti-jamming and interference-avoidance. The proposed system model allows multiple WACRs to simultaneously operate over the same spectrum range producing a multi-agent environment. The objective of each radio is to predict and evade a dynamic jammer signal as well as avoiding transmissions of other WACRs. The proposed cognitive framework is made of two operations: sensing and transmission. Each operation is helped by its own learning algorithm based on Q-learning, but both will be experiencing the same RF environment. The simulation results indicate that the proposed cognitive anti-jamming technique has low computational complexity and significantly outperforms non-cognitive sub-band selection policy while being sufficiently robust against the impact of sensing errors.
Стилі APA, Harvard, Vancouver, ISO та ін.
49

Islam, Saiful, Mohammad Zahidul H. Bhuiyan, Sarang Thombre, and Sanna Kaasalainen. "Combating Single-Frequency Jamming through a Multi-Frequency, Multi-Constellation Software Receiver: A Case Study for Maritime Navigation in the Gulf of Finland." Sensors 22, no. 6 (March 16, 2022): 2294. http://dx.doi.org/10.3390/s22062294.

Повний текст джерела
Анотація:
Today, a substantial portion of global trade is carried by sea. Consequently, the reliance on Global Navigation Satellite System (GNSS)-based navigation in the oceans and inland waterways has been rapidly growing. GNSS is vulnerable to various radio frequency interference. The objective of this research is to propose a resilient Multi-Frequency, Multi-Constellation (MFMC) receiver in the context of maritime navigation to identify any GNSS signal jamming incident and switch to a jamming-free signal immediately. With that goal in mind, the authors implemented a jamming event detector that can identify the start, end, and total duration of the detected jamming event on any of the impacted GNSS signal(s). By utilizing a jamming event detector, the proposed resilient MFMC receiver indeed provides a seamless positioning solution in the event of single-frequency jamming on either the lower or upper L-band. In addition, this manuscript also contains positioning performance analysis of GPS-L5-only, Galileo-E5a-only, and Galileo-E5b-only signals and their multi-GNSS combinations in a maritime operational environment in the Gulf of Finland. The positioning performance of lower L-band GNSS signals in a maritime environment has not been thoroughly investigated as per the authors’ knowledge.
Стилі APA, Harvard, Vancouver, ISO та ін.
50

Aliev, D. A., Vladimir B. Avdeev, E. S. Vaganov, M. S. Vaganov, and S. N. Panychev. "Methodological Tools for Evaluating the Efficiency of Nonlinear Radio Communication and Radio Jamming Facilities." Telecommunications and Radio Engineering 68, no. 19 (2009): 1765–75. http://dx.doi.org/10.1615/telecomradeng.v68.i19.80.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії