Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5)
  • Open Access

    ARTICLE

    Anti-Jamming Null Space Projection Beamforming Based on Symbiotic Radio

    Baofeng Ji1,2,3,4,*, Yifan Liu1,2,3,4, Tingpeng Li1, Ling Xing2, Weixing Wang2, Shahid Mumtaz5, Xiaolong Shang6, Wanying Liu2, Congzheng Han4

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 679-689, 2024, DOI:10.32604/cmes.2023.028667

    Abstract With the development of information technology, more and more devices are connected to the Internet through wireless communication to complete data interconnection. Due to the broadcast characteristics of wireless channels, wireless networks have suffered more and more malicious attacks. Physical layer security has received extensive attention from industry and academia. MIMO is considered to be one of the most important technologies related to physical layer security. Through beamforming technology, messages can be transmitted to legitimate users in an offset direction that is as orthogonal as possible to the interference channel to ensure the reception SINR by legitimate users. Combining the… More >

  • Open Access

    ARTICLE

    Received Power Based Unmanned Aerial Vehicles (UAVs) Jamming Detection and Nodes Classification Using Machine Learning

    Waleed Aldosari*

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1253-1269, 2023, DOI:10.32604/cmc.2023.036111

    Abstract This paper presents a machine-learning method for detecting jamming UAVs and classifying nodes during jamming attacks on Wireless Sensor Networks (WSNs). Jamming is a type of Denial of Service (DoS) attack and intentional interference where a malicious node transmits a high-power signal to increase noise on the receiver side to disrupt the communication channel and reduce performance significantly. To defend and prevent such attacks, the first step is to detect them. The current detection approaches use centralized techniques to detect jamming, where each node collects information and forwards it to the base station. As a result, overhead and communication costs… More >

  • Open Access

    ARTICLE

    A Locality-Sensitive Hashing-Based Jamming Detection System for IoT Networks

    P. Ganeshkumar*, Talal Albalawi

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5943-5959, 2022, DOI:10.32604/cmc.2022.030388

    Abstract

    Internet of things (IoT) comprises many heterogeneous nodes that operate together to accomplish a human friendly or a business task to ease the life. Generally, IoT nodes are connected in wireless media and thus they are prone to jamming attacks. In the present scenario jamming detection (JD) by using machine learning (ML) algorithms grasp the attention of the researchers due to its virtuous outcome. In this research, jamming detection is modelled as a classification problem which uses several features. Using one/two or minimum number of features produces vague results that cannot be explained. Also the relationship between the feature and… More >

  • Open Access

    ARTICLE

    VANET Jamming and Adversarial Attack Defense for Autonomous Vehicle Safety

    Haeri Kim1, Jong-Moon Chung1,2,*

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3589-3605, 2022, DOI:10.32604/cmc.2022.023073

    Abstract The development of Vehicular Ad-hoc Network (VANET) technology is helping Intelligent Transportation System (ITS) services to become a reality. Vehicles can use VANETs to communicate safety messages on the road (while driving) and can inform their location and share road condition information in real-time. However, intentional and unintentional (e.g., packet/frame collision) wireless signal jamming can occur, which will degrade the quality of communication over the channel, preventing the reception of safety messages, and thereby posing a safety hazard to the vehicle's passengers. In this paper, VANET jamming detection applying Support Vector Machine (SVM) machine learning technology is used to classify… More >

  • Open Access

    ARTICLE

    Impact of Tactical Parameters of Aircraft on Jamming Effectiveness of Surface-Source IR Decoy

    Shenbo Li1,*, Qi Tong1, Chaozhe Wang1

    CMES-Computer Modeling in Engineering & Sciences, Vol.118, No.2, pp. 425-446, 2019, DOI:10.31614/cmes.2019.03936

    Abstract As the platform for surface-source infrared decoys, the target aircraft is the aim of attacks in air-to-air combat. It can quickly and accurately evaluate the jamming effectiveness of the surface-source IR decoy in various states of motion is important for enhancing the security of the aircraft. This paper proposes a model of surface-source IR decoy, and compares and analyzes simulated and measured infrared images of diffusion. A system to assess the effectiveness of the jamming of the surface-source IR decoy, target aircraft, and infrared guided missile called “Trinity” is established. Simulations were conducted to assess the impact of flight height,… More >

Displaying 1-10 on page 1 of 5. Per Page