Clustering-based energy-efficient self-healing strategy for WSNs under jamming attacks

N López-Vilos, C Valencia-Cordero, RD Souza… - Sensors, 2023 - mdpi.com
The Internet of Things (IoT) is a key technology to interconnect the real and digital worlds,
enabling the development of smart cities and services. The timely collection of data is …

Spectrum awareness for cognitive radios supported by radio environment maps: Zonal approach

P Kaniewski, J Romanik, E Golan, K Zubel - Applied Sciences, 2021 - mdpi.com
In this paper, we present the concept of the Radio Environment Map (REM) designed to
ensure electromagnetic situational awareness of cognitive radio networks. The map …

An efficient localization and avoidance method of jammers in vehicular ad hoc networks

I Almomani, M Ahmed, D Kosmanos, A Alkhayer… - IEEE …, 2022 - ieeexplore.ieee.org
Jamming is a terrifying attack that could harm 802.11 p-based vehicular communications by
occupying the communication channels by overwhelming the network with jamming packets …

Distributed extended Kalman filtering based techniques for 3-D UAV jamming localization

W Aldosari, M Moinuddin, AJ Aljohani, UM Al-Saggaf - Sensors, 2020 - mdpi.com
Wireless networks are vulnerable to jamming attacks. Jamming in wireless communication
becomes a major research problem due to ease in Unmanned Aerial Vehicle (UAV) …

Heuristic search based localization in mobile computational grid

DP Sahu, K Singh, M Manju, D Taniar… - IEEE …, 2019 - ieeexplore.ieee.org
In recent years, the number of cell phones in society has increased drastically and they are
getting popular due to their computational ability and adaptability. Resource provisioning is …

AIGSA-based multi-jammer localization in wireless networks

X Wei, T Wang - Applied Soft Computing, 2021 - Elsevier
Jamming attacks, which exploit the shared and openness nature of the wireless mediums,
are one of the major threats to wireless networks since they may significantly degrade the …

Classification and Source Location Indication of Jamming Attacks Targeting UAVs via Multi-output Multiclass Machine Learning Modeling

M Alkhatib, M McCormick, L Williams… - 2024 IEEE …, 2024 - ieeexplore.ieee.org
This paper introduces machine learning (ML) as a solution for the detection and range
localization of jamming attacks targeting the global positioning system (GPS) technology …

An approximate factorization approach to multi-jammer location and range estimation from peer-to-peer connectivity measurements

P Krishnamurthy, F Khorrami, R Kumar - Computer Networks, 2021 - Elsevier
The localization (ie, location and range) of communication jammers in an area of operation
of mobile agents is considered. The jammers are operated by adversaries to disrupt/jam …

[PDF][PDF] An Efficient Localization and Avoidance Method of Jammers in Vehicular Ad Hoc Networks

D KOSMANOS, A ALKHAYER - academia.edu
Jamming is a terrifying attack that could harm 802.11 p-based vehicular communications by
occupying the communication channels by overwhelming the network with jamming packets …

[PDF][PDF] Health Monitoring and Fault Detection of Spacecraft Attitude Control Thrusters

D Kolano - dannykolano.com
As the cost of mass to orbit decreases and launch cadence increases thanks to
improvements in launch vehicle technology, the relative expense of the payload itself …