Articles with "jamming attacks" as a keyword



Photo from archive.org

Throughput Analysis of Smart Buildings-oriented Wireless Networks under Jamming Attacks

Sign Up to like & get
recommendations!
Published in 2019 at "Mobile Networks and Applications"

DOI: 10.1007/s11036-019-01481-7

Abstract: Internet of Things (IoT) makes possible diverse smart applications through incorporating information from various sensors and enabling interoperability among different control systems. Adopting IoT in smart building paradigm enables efficient design, control, and management of… read more here.

Keywords: networks jamming; smart buildings; buildings oriented; wireless networks ... See more keywords
Photo from wikipedia

Control of Vehicular Platoons: Stochastic Robustness Against Jamming Attacks

Sign Up to like & get
recommendations!
Published in 2020 at "IFAC-PapersOnLine"

DOI: 10.1016/j.ifacol.2020.12.1528

Abstract: Abstract Control of a platoon of vehicles subject to jamming attacks is addressed in this paper. Because of jamming attacks, some communicated information and radio data are assumed to be lost or delayed in a… read more here.

Keywords: control vehicular; control; stochastic robustness; jamming attacks ... See more keywords
Photo from wikipedia

Observer-based H∞ control for cyber-physical systems encountering DoS jamming attacks: An attack-tolerant approach.

Sign Up to like & get
recommendations!
Published in 2020 at "ISA transactions"

DOI: 10.1016/j.isatra.2019.12.014

Abstract: In this paper, considering two typical attack strategies of a DoS jammer, a new kind of H∞ control problem is studied for Cyber-Physical Systems (CPSs) with different transmission mechanism encountering DoS jamming attacks. By defining… read more here.

Keywords: attack strategies; control; cyber physical; dos jamming ... See more keywords
Photo by susangkomen3day from unsplash

Event-triggered quantized H∞ control for networked control systems in the presence of denial-of-service jamming attacks

Sign Up to like & get
recommendations!
Published in 2019 at "Nonlinear Analysis: Hybrid Systems"

DOI: 10.1016/j.nahs.2019.03.005

Abstract: Abstract The problem of event-triggered quantized H ∞ control of networked control systems (NCSs) under denial-of-service (DoS) jamming attacks is investigated in this paper. Firstly, a new resilient event-triggering transmission scheme is proposed to lighten… read more here.

Keywords: control; event triggered; quantized control; jamming attacks ... See more keywords
Photo from wikipedia

Characterization of IEEE 802.11 Communications and Detection of Low-Power Jamming Attacks in Noncontrolled Environment Based on a Clustering Study

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Systems Journal"

DOI: 10.1109/jsyst.2020.3045365

Abstract: Wireless connections are more and more used in different applications and in public areas for services to consumers but also for handling (sometimes) sensitive communications (for instance, in railway systems or for remote video monitoring… read more here.

Keywords: study; power jamming; jamming attacks; low power ... See more keywords
Photo by cokdewisnu from unsplash

Situational Awareness of Chirp Jamming Threats to GNSS Based on Supervised Machine Learning

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Aerospace and Electronic Systems"

DOI: 10.1109/taes.2021.3135014

Abstract: The presence of malicious jamming attacks is disruptive for global navigation satellite system (GNSS) applications requiring high robustness. The situational awareness aims to timely detect the jamming attacks and characterize the information of the jamming… read more here.

Keywords: chirp jamming; situational awareness; machine learning; jamming attacks ... See more keywords
Photo from wikipedia

Cognitive Networks With In-Band Full-Duplex Radios: Jamming Attacks and Countermeasures

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Transactions on Cognitive Communications and Networking"

DOI: 10.1109/tccn.2019.2933816

Abstract: Although in-band full-duplex (IBFD) radios promise to double the throughput of a wireless link, they are more vulnerable to jamming attacks than their out-of-band full-duplex (OBFD) counterparts. For two communicating OBFD nodes, a jammer needs… read more here.

Keywords: full duplex; jamming attacks; band full; ibfd radios ... See more keywords
Photo by miguelherc96 from unsplash

Model-Free Adaptive Resilient Control for Nonlinear CPSs With Aperiodic Jamming Attacks.

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE transactions on cybernetics"

DOI: 10.1109/tcyb.2022.3219987

Abstract: The problem of the model-free adaptive resilient control (MFARC) for nonlinear cyber-physical systems (CPSs) suffered from aperiodic jamming attacks is investigated in this article. First, the MFARC framework subject to aperiodic jamming attacks is established,… read more here.

Keywords: free adaptive; control; jamming attacks; model free ... See more keywords
Photo by pabloheimplatz from unsplash

Resilient H∞ Filtering for Event-Triggered Networked Systems Under Nonperiodic DoS Jamming Attacks

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Transactions on Systems, Man, and Cybernetics: Systems"

DOI: 10.1109/tsmc.2019.2896249

Abstract: This paper focuses on the resilient ${H_{\infty }}$ filter design for event-triggered networked systems subject to nonperiodic denial-of-service (DoS) jamming attacks. In this paper, a new resilient event-triggered transmission strategy is first proposed to improve… read more here.

Keywords: event triggered; inline formula; nonperiodic dos; jamming attacks ... See more keywords
Photo from academic.microsoft.com

A Game Theoretic Approach to Modelling Jamming Attacks in Delay Tolerant Networks

Sign Up to like & get
recommendations!
Published in 2017 at "Defence Science Journal"

DOI: 10.14429/dsj.67.10051

Abstract: Cyberspace plays a prominent role in our social, economic and civic welfare and cyber security issues are of paramount importance today. Growing reliance of the intertwined military and civilian applications on wireless computer networks makes… read more here.

Keywords: game; delay tolerant; theoretic approach; game theoretic ... See more keywords