Search results for "Jamming"

showing 10 items of 12 documents

Survey of Cyber Threats in Air Traffic Control and Aircraft Communications Systems

2018

Air traffic control systems based on the ADS-B standard have been widely adopted in civil aviation to the point that they are now considered the de facto standard. ADS-B provides major benefits to airports and airlines by increasing the safety of air traffic management and control and allowing more flights to travel near busy airports. However, the ADS-B technology lacks sufficient security measures. The ADS-B system is vulnerable and exposed to cyberattacks. We survey the potential known threats and attacks against ADS-B and assess the potential cybersecurity threats to air traffic management and control. The widespread use of ADS-B and the lack of security features in it, i.e., all the AD…

021110 strategic defence & security studies020301 aerospace & aeronauticsComputer sciencebusiness.industryAir traffic managementControl (management)0211 other engineering and technologiesCivil aviationComputerApplications_COMPUTERSINOTHERSYSTEMSJamming02 engineering and technologyAir traffic controlCommunications systemComputer securitycomputer.software_genre0203 mechanical engineeringWirelessbusinesscomputerDe facto standard
researchProduct

A Hierarchical Detection and Response System to Enhance Security Against Lethal Cyber-Attacks in UAV Networks

2018

International audience; Unmanned aerial vehicles (UAVs) networks have not yet received considerable research attention. Specifically, security issues are a major concern because such networks, which carry vital information, are prone to various attacks. In this paper, we design and implement a novel intrusion detection and response scheme, which operates at the UAV and ground station levels, to detect malicious anomalies that threaten the network. In this scheme, a set of detection and response techniques are proposed to monitor the UAV behaviors and categorize them into the appropriate list (normal, abnormal, suspect, and malicious) according to the detected cyber-attack. We focus on the m…

Ad hoc networksMonitoringAnomaly-based intrusion detection systemWireless ad hoc networkComputer science[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]UAVMobile computing[ INFO.INFO-CR ] Computer Science [cs]/Cryptography and Security [cs.CR]JammingComputerApplications_COMPUTERSINOTHERSYSTEMS02 engineering and technologyIntrusion detection systemAnomaly detection and rules-based intrusion detection techniquesIDSBlack hole (networking)Computer securitycomputer.software_genreMobile communicationUnmanned aerial vehicles[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR][INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]0202 electrical engineering electronic engineering information engineeringFalse positive paradoxOverhead (computing)Intrusion detectionElectrical and Electronic Engineering020206 networking & telecommunicationsComputer Science ApplicationsHuman-Computer InteractionControl and Systems Engineeringintrusion detection system020201 artificial intelligence & image processingcyber-attacksIntrusion prevention systemcomputerSoftware
researchProduct

A Comprehensive Survey on Cooperative Relaying and Jamming Strategies for Physical Layer Security

2019

Physical layer security (PLS) has been extensively explored as an alternative to conventional cryptographic schemes for securing wireless links. Many studies have shown that the cooperation between the legitimate nodes of a network can significantly enhance their secret communications performance, relative to the noncooperative case. Motivated by the importance of this class of PLS systems, this paper provides a comprehensive survey of the recent works on cooperative relaying and jamming techniques for securing wireless transmissions against eavesdropping nodes, which attempt to intercept the transmissions. First, it provides a in-depth overview of various secure relaying strategies and sch…

BeamformingComputer scienceJammingCryptography5G-tekniikka02 engineering and technologylangaton tiedonsiirto0203 mechanical engineering0202 electrical engineering electronic engineering information engineeringWirelessElectrical and Electronic Engineeringtietoturvabusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSPhysical layer020206 networking & telecommunications020302 automobile design & engineeringEavesdropping5G communicationsphysical layer security (PLS)jamming techniquesrelaying protocolsKey (cryptography)business5Glangattomat verkotComputer network
researchProduct

Monte Carlo Simulations of Growth Kinetics and Phase Transitions at Interfaces: Some Recent Results

1991

ABSTRACTIn the first part Monte Carlo studies of the kinetics of multilayer adsorption (without screening) are described. The approach to the jamming coverage in each layer is asymptotically exponential. The jamming coverages approach the infinite-layer limit value according to a power law. In the second part, studies of phase transitions in two dimensional fluids are reviewed. With a combination of Monte Carlo and finite size scaling block analysis techniques, accurate values are obtained for the critical temperatures, coexistence densities and the compressibilities of an adsorbed fluid layer in an NVT ensemble.

Condensed Matter::Soft Condensed MatterPhase transitionMaterials scienceMonte Carlo methodDynamic Monte Carlo methodJammingStatistical physicsKinetic Monte CarloPower lawScalingMonte Carlo molecular modelingMRS Proceedings
researchProduct

Entry and espionage with noisy signals

2014

Abstract We analyze the effect of industrial espionage on entry deterrence. We consider a monopoly incumbent who may expand capacity to deter entry, and a potential entrant who owns an Intelligence System. The Intelligence System (IS) generates a noisy signal based on the incumbentʼs actions. The potential entrant uses this signal to decide whether or not to enter the market. The incumbent may signal-jam to manipulate the likelihood of the noisy signals and hence affect the entrantʼs decisions. If the precision of the IS is commonly known, the incumbent benefits from his rivalʼs espionage. Actually, he benefits more the higher is the precision of the IS while the spying entrant is worse off…

Economics and Econometricsbusiness.industrymedia_common.quotation_subjectRadio jammingEspionagePublic relationsComputer securitycomputer.software_genreInformation asymmetryIndustrial espionageQuality (business)Deterrence theoryBusinessMonopolycomputerPrivate information retrievalFinancemedia_commonGames and Economic Behavior
researchProduct

Duopoly signal jamming

1993

This paper examines a repeated duopoly market with heterogeneous outputs. Firms have (common) prior beliefs over the values of an unknown parameter of each firm's demand curve. Firms cannot observe rivals' quantities, but can observe market prices, which are subject to random disturbances and hence provide noisy information that firms use to update their beliefs concerning the unknown parameters' values. Each firm can potentially signal jam, or strategically vary its output level in order to manipulate the distribution of likely market prices and hence the likely inferences drawn by the opponent. We find that the opportunity to signal-jam introduces two conflicting effects, arising out of t…

MicroeconomicsEconomics and EconometricsOrder (exchange)business.industryDemand curveRadio jammingEconomicsMarket priceDistribution (economics)Almost surelybusinessDuopolyPublic financeEconomic Theory
researchProduct

Collective Effects in Random Sequential Adsorption of Diffusing Hard Squares

1992

We study by Monte Carlo computer simulations random sequential adsorption (RSA) with diffusional relaxation, of lattice hard squares in two dimensions. While for RSA without diffusion the coverage approaches its maximum jamming value (large-time fractional coverage) exponentially, added diffusion allows the deposition process to proceed to the full coverage. The approach to the full coverage is consistent with the t**(-1/2) power law reminiscent of the equilibrium cluster coarsening in models with nonconserved order-parameter dynamics.

PhysicsCondensed Matter (cond-mat)High Energy Physics - Lattice (hep-lat)Monte Carlo methodFOS: Physical sciencesStatistical and Nonlinear PhysicsJammingCondensed MatterCondensed Matter PhysicsFull coveragePower lawRandom sequential adsorptionHigh Energy Physics - LatticeExponential growthLattice (order)Statistical physicsDeposition process
researchProduct

Continuum limit in random sequential adsorption.

1991

We develop analytical estimates of the late-stage (long-time) asymptotic behavior of the coverage in the D-dimensional lattice models of irreversible deposition of hypercube-shaped particles. Our results elucidate the crossover from the exponential time dependence for the lattice case to the power-law behavior with a multiplicative logarithmic factor, in the continuum deposition. Numerical Monte Carlo results are reported for the two-dimensional (2D) deposition, both lattice and continuum. Combined with the exact 1D results, they are used to test the general theoretical expectations for the late-stage deposition kinetics. New accurate estimates of the jamming coverages in 2D rule out some e…

PhysicsRandom sequential adsorptionLogarithmLattice (order)Monte Carlo methodCrossoverMultiplicative functionJammingStatistical physicsExponential functionPhysical review. B, Condensed matter
researchProduct

Preface: Special Issue on Structure in Glassy and Jammed Systems

2016

This special issue presents new developments in our understanding of the role of structure in dynamical arrest and jamming. Articles highlight local geometric motifs and other forms of amorphous order, in experiment, computer simulation and theory.

Statistics and ProbabilityComputer scienceStructure (category theory)Statistical and Nonlinear PhysicsJamming02 engineering and technology021001 nanoscience & nanotechnology01 natural sciencesAmorphous solidOrder (business)0103 physical sciencesStatistical physicsStatistics Probability and Uncertainty010306 general physics0210 nano-technologyJournal of Statistical Mechanics: Theory and Experiment
researchProduct

UAV-Aided Multi-Antenna Covert Communication Against Multiple Wardens

2021

In this paper, we propose a UAV-aided covert communication scheme assisted by a multi-antenna jammer to maximize the transmission rate between a ground transmitter and a UAV receiver against several randomly distributed wardens. The transmitter adopts the maximum ratio transmission, while the jammer zero-forces its transmitted signal at the UAV to disturb the monitoring at wardens without interfering the legitimate transmission. First, we analyze the detection performance and derive the optimal threshold for each warden to minimize its detection outage probability (DOP). Then, with the worst situation in which all wardens set their respective optimal thresholds to achieve the minimum global…

Transmission (telecommunications)Computer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSTransmitterMulti antennaReal-time computingCovert communicationComputerApplications_COMPUTERSINOTHERSYSTEMSJammingData_CODINGANDINFORMATIONTHEORYOutage probabilityTransmitter power outputSignalICC 2021 - IEEE International Conference on Communications
researchProduct