Results 21 to 30 of about 2,897,668 (300)

Jamming Attacks and Anti-Jamming Strategies in Wireless Networks: A Comprehensive Survey [PDF]

open access: yesIEEE Communications Surveys and Tutorials, 2021
Wireless networks are a key component of the telecommunications infrastructure in our society, and wireless services become increasingly important as the applications of wireless devices have penetrated every aspect of our lives.
Hossein Pirayesh, Huacheng Zeng
semanticscholar   +1 more source

Survey on cognitive anti‐jamming communications [PDF]

open access: yesIET Communications, 2020
In this study, the authors review various jamming and anti‐jamming strategies in the context of cognitive radios (CRs). The study explores different jamming models and classifies them according to their functionality. Furthermore, a study of jamming detection techniques is provided to enable a CR to identify different jamming signals.
Mohamed A. Aref   +2 more
openaire   +1 more source

Retroactive Anti-Jamming for MISO Broadcast Channels [PDF]

open access: yes, 2013
Jamming attacks can significantly impact the performance of wireless communication systems. In addition to reducing the capacity, such attacks may lead to insurmountable overhead in terms of re-transmissions and increased power consumption. In this paper,
Amuru, SaiDhiraj   +3 more
core   +2 more sources

Intelligent Anti-Jamming Communication for Wireless Sensor Networks: A Multi-Agent Reinforcement Learning Approach

open access: yesIEEE Open Journal of the Communications Society, 2021
In this article, we investigate intelligent anti-jamming communication method for wireless sensor networks. The stochastic game framework is introduced to model and analyze the multi-user anti-jamming problem, and a joint multi-agent anti-jamming ...
Quan Zhou, Yonggui Li, Yingtao Niu
doaj   +1 more source

Blind source separation communication anti-jamming technology and practice

open access: yesTongxin xuebao, 2023
Aiming at the threat of broad frequency band suppressing jamming and the inherent contradiction between spectrum resources and communication anti-jamming ability, a method was proposed to add the statistics domain dimension on the basis of spread ...
Fuqiang YAO   +3 more
doaj   +2 more sources

Optimal Jammer Placement in Wireless Localization Systems [PDF]

open access: yes, 2016
In this study, the optimal jammer placement problem is proposed and analyzed for wireless localization systems. In particular, the optimal location of a jammer node is obtained by maximizing the minimum of the Cramer-Rao lower bounds (CRLBs) for a number
Bayram, Suat   +3 more
core   +2 more sources

Hierarchical coordinated anti-jamming channel access in clustering networks: a multi-leader multi-follower Stackelberg game approach

open access: yesEURASIP Journal on Advances in Signal Processing, 2021
This paper mainly investigates the multi-user coordinated anti-jamming problem in clustering communication networks. In such kinds of networks, there exist multiple clusters and multiple users who communicate with their receivers simultaneously. Besides,
Yifan Xu   +6 more
doaj   +1 more source

Researchment of Mainlobe Anti-jamming Algorithms

open access: yesJournal of Physics: Conference Series, 2020
Abstract Main lobe interferences usually cause the distortion and peak offset of main lobe and the heighten of side lobe level in adaptive beamformers. The block matrix algorithm utilized the direction vector which was determined by both the antenna arrays and the direction of interference to eliminate the main lobe interference.
Zhangkai Luo   +4 more
openaire   +1 more source

A discounted‐UCB1‐tuned plus Q‐learning based anti‐jamming routing algorithm for wireless mesh networks

open access: yesElectronics Letters, 2023
To achieve autonomous anti‐jamming routing for wireless mesh networks (WMNs) under the threat of unknown removable jammers, a Q‐learning anti‐jamming routing algorithm using the improved upper‐confidence‐bound (UCB) algorithm is proposed in this paper ...
Huihui Ding   +4 more
doaj   +1 more source

Repeater jamming suppression method for pulse Doppler fuze based on identity recognition and chaotic encryption

open access: yesDefence Technology, 2021
Pulse Doppler (PD) fuze is widely used in current battlefield. However, with the threat of repeater jamming, especially digital radio frequency memory technology, the deficiency in the anti-repeater jamming of a traditional PD fuze increasingly emerges ...
Jian Dai   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy