Jamming Detection and Mitigation in Wireless Broadcast Networks
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2012, Vol 1, Issue 6
Abstract
Wireless communication systems are often susceptible to the jamming attack where adversaries attempt to overpower transmitted signals by injecting a high level of noise. Jamming is difficult to mitigate in broadcast networks because transmitting and receiving are inherently symmetric operations: A user that possesses the key to decode a transmission can also use that key to jam the transmission.We describe a code tree system that provides input to the physical layer and helps the physical layer circumvent jammers. In our system, the transmitter has more information than any proper subset of receivers. Each receiver cooperates with the transmitter to detect any jamming that affects that receiver. In the resulting system, each benign user is guaranteed to eliminate the impact of the attacker after some finite number of losses with arbitrarily high probability. We show that any system that relies on only using spreading code, and no other physical factors, to mitigate jamming must use at least codes, where is the number of jammers. We then propose an optimized scheme that is power-efficient: Each transmission is sent on at most codes simultaneously. Finally, we demonstrate that our scheme approaches the best possible performance by performing an extensive analysis of the system using both eventdriven ns-2 and chip-accurate MATLAB simulations.
Authors and Affiliations
V V S NARAYANA MURTHY KAMINI, Samula Annapurna, M Vamsi Krishna
Voice and Gesture Based Electric-Powered Wheelchair Using ARM
A voice and gesture based system has been developed to control a wheelchair using voice commands and moment of hand i.e. Mems sensor is connected to hand. The system is divided into two main components: speech recogni...
Improved Diversity with Limited Feed back for more than two users
We consider interference cancellation for a system with more than two users when users know each other channels. The goal is to utilize multiple antennas to cancel the interference without sacrificing the diversity or...
Image Compression through Data Representation in Frequency Domain
Data compression is a very important field these days. You can find it in any web page, network devices, application files etc. Its importance has grown during the years as a necessity of storage and time of transpor...
Transmission Power Control in Wireless ad hoc Networks
In ad hoc wireless networks packets are relayed over multiple hops to reach their destination. In order to operate ad hoc networks several protocols, for media access control, power control, routing, and transport ar...
Recent Issues and Its Quick Fixes for Various Data Repositories
The aim of this study was to assess the issues and their quick fixes of databases. But the database accuracy has a trickle down effect in most implementations. This paper proposes the overall guidance about the techni...