Search results for "Jamming"
showing 10 items of 12 documents
Survey of Cyber Threats in Air Traffic Control and Aircraft Communications Systems
2018
Air traffic control systems based on the ADS-B standard have been widely adopted in civil aviation to the point that they are now considered the de facto standard. ADS-B provides major benefits to airports and airlines by increasing the safety of air traffic management and control and allowing more flights to travel near busy airports. However, the ADS-B technology lacks sufficient security measures. The ADS-B system is vulnerable and exposed to cyberattacks. We survey the potential known threats and attacks against ADS-B and assess the potential cybersecurity threats to air traffic management and control. The widespread use of ADS-B and the lack of security features in it, i.e., all the AD…
A Hierarchical Detection and Response System to Enhance Security Against Lethal Cyber-Attacks in UAV Networks
2018
International audience; Unmanned aerial vehicles (UAVs) networks have not yet received considerable research attention. Specifically, security issues are a major concern because such networks, which carry vital information, are prone to various attacks. In this paper, we design and implement a novel intrusion detection and response scheme, which operates at the UAV and ground station levels, to detect malicious anomalies that threaten the network. In this scheme, a set of detection and response techniques are proposed to monitor the UAV behaviors and categorize them into the appropriate list (normal, abnormal, suspect, and malicious) according to the detected cyber-attack. We focus on the m…
A Comprehensive Survey on Cooperative Relaying and Jamming Strategies for Physical Layer Security
2019
Physical layer security (PLS) has been extensively explored as an alternative to conventional cryptographic schemes for securing wireless links. Many studies have shown that the cooperation between the legitimate nodes of a network can significantly enhance their secret communications performance, relative to the noncooperative case. Motivated by the importance of this class of PLS systems, this paper provides a comprehensive survey of the recent works on cooperative relaying and jamming techniques for securing wireless transmissions against eavesdropping nodes, which attempt to intercept the transmissions. First, it provides a in-depth overview of various secure relaying strategies and sch…
Monte Carlo Simulations of Growth Kinetics and Phase Transitions at Interfaces: Some Recent Results
1991
ABSTRACTIn the first part Monte Carlo studies of the kinetics of multilayer adsorption (without screening) are described. The approach to the jamming coverage in each layer is asymptotically exponential. The jamming coverages approach the infinite-layer limit value according to a power law. In the second part, studies of phase transitions in two dimensional fluids are reviewed. With a combination of Monte Carlo and finite size scaling block analysis techniques, accurate values are obtained for the critical temperatures, coexistence densities and the compressibilities of an adsorbed fluid layer in an NVT ensemble.
Entry and espionage with noisy signals
2014
Abstract We analyze the effect of industrial espionage on entry deterrence. We consider a monopoly incumbent who may expand capacity to deter entry, and a potential entrant who owns an Intelligence System. The Intelligence System (IS) generates a noisy signal based on the incumbentʼs actions. The potential entrant uses this signal to decide whether or not to enter the market. The incumbent may signal-jam to manipulate the likelihood of the noisy signals and hence affect the entrantʼs decisions. If the precision of the IS is commonly known, the incumbent benefits from his rivalʼs espionage. Actually, he benefits more the higher is the precision of the IS while the spying entrant is worse off…
Duopoly signal jamming
1993
This paper examines a repeated duopoly market with heterogeneous outputs. Firms have (common) prior beliefs over the values of an unknown parameter of each firm's demand curve. Firms cannot observe rivals' quantities, but can observe market prices, which are subject to random disturbances and hence provide noisy information that firms use to update their beliefs concerning the unknown parameters' values. Each firm can potentially signal jam, or strategically vary its output level in order to manipulate the distribution of likely market prices and hence the likely inferences drawn by the opponent. We find that the opportunity to signal-jam introduces two conflicting effects, arising out of t…
Collective Effects in Random Sequential Adsorption of Diffusing Hard Squares
1992
We study by Monte Carlo computer simulations random sequential adsorption (RSA) with diffusional relaxation, of lattice hard squares in two dimensions. While for RSA without diffusion the coverage approaches its maximum jamming value (large-time fractional coverage) exponentially, added diffusion allows the deposition process to proceed to the full coverage. The approach to the full coverage is consistent with the t**(-1/2) power law reminiscent of the equilibrium cluster coarsening in models with nonconserved order-parameter dynamics.
Continuum limit in random sequential adsorption.
1991
We develop analytical estimates of the late-stage (long-time) asymptotic behavior of the coverage in the D-dimensional lattice models of irreversible deposition of hypercube-shaped particles. Our results elucidate the crossover from the exponential time dependence for the lattice case to the power-law behavior with a multiplicative logarithmic factor, in the continuum deposition. Numerical Monte Carlo results are reported for the two-dimensional (2D) deposition, both lattice and continuum. Combined with the exact 1D results, they are used to test the general theoretical expectations for the late-stage deposition kinetics. New accurate estimates of the jamming coverages in 2D rule out some e…
Preface: Special Issue on Structure in Glassy and Jammed Systems
2016
This special issue presents new developments in our understanding of the role of structure in dynamical arrest and jamming. Articles highlight local geometric motifs and other forms of amorphous order, in experiment, computer simulation and theory.
UAV-Aided Multi-Antenna Covert Communication Against Multiple Wardens
2021
In this paper, we propose a UAV-aided covert communication scheme assisted by a multi-antenna jammer to maximize the transmission rate between a ground transmitter and a UAV receiver against several randomly distributed wardens. The transmitter adopts the maximum ratio transmission, while the jammer zero-forces its transmitted signal at the UAV to disturb the monitoring at wardens without interfering the legitimate transmission. First, we analyze the detection performance and derive the optimal threshold for each warden to minimize its detection outage probability (DOP). Then, with the worst situation in which all wardens set their respective optimal thresholds to achieve the minimum global…