Articles with "reactive jammer" as a keyword



Photo by sarahdorweiler from unsplash

FSK-Based Reactive Jammer Piggybacking

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Communications Letters"

DOI: 10.1109/lcomm.2016.2615900

Abstract: The complexity and sophistication of communications jamming will continue to increase over time. The traditional approach to jammer mitigation is to harden radios, often sacrificing communications performance for more advanced jamming protection. To provide an… read more here.

Keywords: based reactive; fsk based; reactive jammer; jammer piggybacking ... See more keywords
Photo from wikipedia

Enhanced Index Modulation-Based Frequency Hopping: Resist Power-Correlated Reactive Jammer

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Wireless Communications Letters"

DOI: 10.1109/lwc.2022.3142253

Abstract: Reactive jammer has emerged as a relatively intelligent jamming with low energy cost and high jamming efficiency. Moreover, the jammer can obtain the power-correlated reactive jamming via the cooperation with a malicious user, which imposes… read more here.

Keywords: correlated reactive; power; power correlated; enhanced index ... See more keywords

“Advancing Secretly by an Unknown Path”: A Reinforcement Learning-Based Hidden Strategy for Combating Intelligent Reactive Jammer

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Wireless Communications Letters"

DOI: 10.1109/lwc.2022.3165633

Abstract: This letter investigates the problem of combating the intelligent reactive jammer through a deep reinforcement learning (DRL) based hidden strategy. Existing anti-jamming researches always assume a capacity-limited adversary which is non-reactive or only launches attacks… read more here.

Keywords: hidden strategy; reactive jammer; based hidden; intelligent reactive ... See more keywords
Photo from wikipedia

Maximize resource utilization based channel access model with presence of reactive jammer for underwater wireless sensor network

Sign Up to like & get
recommendations!
Published in 2020 at "International Journal of Electrical and Computer Engineering"

DOI: 10.11591/ijece.v10i3.pp3284-3294

Abstract: Underwater sensor networks (UWSNs) are vulnerable to jamming attacks. Especially, reactive jamming which emerged as a greatest security threat to UWSNs. Reactive jammer are difficult to be removed, defended and identified. Since reactive jammer can… read more here.

Keywords: reactive jammer; model; sensor; maximize resource ... See more keywords