Results 41 to 50 of about 69,090 (215)

Common security issues and challenges in wireless sensor networks and IEEE 802.11 wireless mesh networks [PDF]

open access: yes, 2009
Both Wireless Mesh Network (WMN) and Wireless Sensor Network (WSN) are multi-hop wireless networks. WMN is an emerging community based integrated broadband wireless network which ensures high bandwidth ubiquitous internet provision to users, while, WSN ...
Loo, KK, Naeem, T
core   +1 more source

A Novel Anti-Jamming Decision-Making Algorithm Based on Knowledge Graph Technology

open access: yesApplied Sciences, 2022
Wireless communications are increasingly vulnerable to malicious jamming attacks due to the inherent openness and broadcast nature. In this regard, a novel anti-jamming scheme based on knowledge graph is proposed in this paper, where the knowledge graph ...
Yingtao Niu   +3 more
doaj   +1 more source

Vulnerability analysis of satellite-based synchronized smart grids monitoring systems [PDF]

open access: yes, 2014
The large-scale deployment of wide-area monitoring systems could play a strategic role in supporting the evolution of traditional power systems toward smarter and self-healing grids. The correct operation of these synchronized monitoring systems requires
Ahmed faheem Zobaa   +19 more
core   +1 more source

Anti-jamming performance of chaotic digital communication systems [PDF]

open access: yesIEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications, 2002
Among the various modulation schemes proposed for chaos-based digital communications, chaos-shift keying (CSK) and differential chaos-shift keying (DCSK) have been most thoroughly analyzed and considered for practical implementation. One important aspect of performance of any communication system is the ability to resist jamming.
Lau, FCM, Ye, M, Tse, CKM, Hau, SSF
openaire   +2 more sources

Jamming-resilient algorithm for underwater cognitive acoustic networks

open access: yesInternational Journal of Distributed Sensor Networks, 2017
Due to the limit spectrum resource in the underwater acoustic networks, underwater cognitive acoustic communication is a promising technique. The channel sharing mechanism in cognitive networks can improve the communication capacity efficiently.
Zixiang Wang   +4 more
doaj   +1 more source

Traffic on complex networks: Towards understanding global statistical properties from microscopic density fluctuations [PDF]

open access: yes, 2004
We study the microscopic time fluctuations of traffic load and the global statistical properties of a dense traffic of particles on scale-free cyclic graphs.
A. Arenas   +19 more
core   +2 more sources

Exploring UAV's multi-domain joint anti-jamming intelligent decision algorithm

open access: yesXibei Gongye Daxue Xuebao, 2021
To understand the complex communication environment of a UAV in battlefield, its unknown channel statistics information and poor intelligent jamming and anti-jamming capability, the multi-domain anti-jamming problem is studied, and a multi-domain joint ...

doaj   +1 more source

Security in Wireless Sensor Networks: Issues and Challenges [PDF]

open access: yes, 2006
Wireless Sensor Network (WSN) is an emerging technology that shows great promise for various futuristic applications both for mass public and military.
Delic, H, Ersoy, C, Onel, T, Onur, Ertan
core   +3 more sources

Hierarchical coordinated anti-jamming channel access in clustering networks: a multi-leader multi-follower Stackelberg game approach

open access: yesEURASIP Journal on Advances in Signal Processing, 2021
This paper mainly investigates the multi-user coordinated anti-jamming problem in clustering communication networks. In such kinds of networks, there exist multiple clusters and multiple users who communicate with their receivers simultaneously. Besides,
Yifan Xu   +6 more
doaj   +1 more source

An iALM-ICA-based Anti-Jamming DS-CDMA Receiver for LMS Systems

open access: yes, 2018
We consider a land mobile satellite communication system using spread spectrum techniques where the uplink is exposed to MT jamming attacks, and the downlink is corrupted by multi-path fading channels. We proposes an anti-jamming receiver, which exploits
Jung, Hyoyoung   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy