Anti-Jamming 기반전술통신기술

이두호, 고병훈, 김광순 - 한국통신학회지(정보와통신), 2007 - dbpia.co.kr
최근 들어 차세대 전술통신 체계인 전술 종합 정보 통신체계 (TICN: tactical information
communication network) 구축 사업이 진행되고 있다. 전술통신 환경에서 고속의 데이터 통신을 …

군통신에서의재밍(Jamming) 기술

JH Kim, EC Kim, JM Lee - Information and Communications …, 2009 - koreascience.kr
최근 전자전 (EW: Electronic Warfare) 은 현대전의 핵심으로 자리매김하고 있다. 전자전에서
재밍 (Jamming) 은 적군의 통신을 교란시키는 전자공격 (EA: Electronic Attack) 을 의미하는 …

[图书][B] Novel techniques for thwarting communication jamming in wireless networks

M Strasser - 2009 - research-collection.ethz.ch
A major challenge in securing wireless applications and services is the inherent vulnerability
of radio transmissions to communication jamming Denial-of-Service (DoS) attacks. This …

Jamming attacks and anti-jamming strategies in wireless networks: A comprehensive survey

H Pirayesh, H Zeng - IEEE communications surveys & tutorials, 2022 - ieeexplore.ieee.org
Wireless networks are a key component of the telecommunications infrastructure in our
society, and wireless services become increasingly important as the applications of wireless …

Digital filter design for jamming mitigation in 802.15. 4 communication

B DeBruhl, P Tague - 2011 Proceedings of 20th International …, 2011 - ieeexplore.ieee.org
Jamming attackers can dramatically increase attack efficiency and stealth by randomly or
periodically cycling the jamming transmission on and off, attacks respectively known as …

Data Encapsulation To Prevent Jamming Attacks In Wireless Networks

IT Aziz, SK Yadav - International Journal of Computer …, 2013 - search.proquest.com
The open nature of the wireless medium leaves it vulnerable to intentional interference
attacks, typically referred to as jamming. This intentional interference with wireless …

Multi-regional anti-jamming communication scheme based on transfer learning and Q learning

C Han, Y Niu - KSII Transactions on Internet and Information …, 2019 - koreascience.kr
The smart jammer launches jamming attacks which degrade the transmission reliability. In
this paper, smart jamming attacks based on the communication probability over different …

A combined approach for distinguishing different types of jamming attacks against wireless networks

L Wang, AM Wyglinski - Proceedings of 2011 IEEE Pacific Rim …, 2011 - ieeexplore.ieee.org
In this paper, we devised a combined approach to distinguish different types of jamming
attacks against wireless networks. Based on the shared characteristics of the wireless …

[PDF][PDF] Implementation of cryptography based methods to prevent selective jamming attacks for true communication in wireless network [EB/OL]

RK Chakrawarti, S Choubey - ijtrm.com
An absolute solution to selective jamming would be the encryption of transmitted packets
with a static key. This is the encryption of packets with packet header. For broadcast …

Time series analysis for jamming attack detection in wireless networks

M Cheng, Y Ling, WB Wu - GLOBECOM 2017-2017 IEEE …, 2017 - ieeexplore.ieee.org
Due to the open nature of wireless communication medium, wireless networks are
susceptible to jamming attacks. Jammers interfere with the legitimate nodes by sending …