Security vulnerabilities of cyberphysical unmanned aircraft systems

RM Fouda - IEEE Aerospace and Electronic Systems …, 2018 - ieeexplore.ieee.org
Unmanned aerial vehicles have rapidly become the air vehicle of choice across many
industries in the global market, with the Federal Aviation Administration (FAA) predicting no …

Performance analysis and evaluation of RF jamming in IoT networks

AS Ali, M Baddeley, L Bariah, MA Lopez… - … 2022-2022 IEEE …, 2022 - ieeexplore.ieee.org
Jamming attacks, as a form of a denial-of-service attack, significantly degrade the
performance of wireless communication systems and can lead to significant overhead in …

Prioritized secondary user access control in cognitive radio networks

H Wang, YD Yao, S Peng - IEEE Access, 2018 - ieeexplore.ieee.org
In cognitive radio networks, a secondary user access control (SUAC) technique has been
utilized to improve network management and system security, in which a jamming signal is …

Jamrf: Performance analysis, evaluation, and implementation of rf jamming over wi-fi

AS Ali, M Baddeley, L Bariah, MA Lopez… - IEEE …, 2022 - ieeexplore.ieee.org
Jamming attacks significantly degrade the performance of wireless communication systems
and can lead to significant overhead in terms of re-transmissions and increased power …

[HTML][HTML] The research of interference recognition method in multi-nodes cooperative frequency-hopping communication based on time–frequency image analysis and …

Q Zhao, S Han, CJ Guo - Physical Communication, 2024 - Elsevier
Interference recognition has a significant and irreplaceable importance in keeping battlefield
communication reliability and securing information safety. However, the existing recognition …

Secondary user access control in cognitive radio networks

H Wang, YD Yao, X Zhang, H Li - IEEE Journal on Selected …, 2016 - ieeexplore.ieee.org
Spectrum sharing and aggregation among authorized secondary users (A-SUs) are
important tasks in operating effective cognitive radio networks. Furthermore, in protecting …

Performance of mimo ieee802. 11n wlan in presence of qpsk jammer with inphase/quadrature origin offsets

EM Shaheen - Wireless Personal Communications, 2020 - Springer
In this paper a novel jamming technique is presented. The idea of the proposed jamming
technique is based on adding inphase and quadrature impairments to the jamming signal …

Spectral efficiency comparison of asynchronous MC-CDMA, MC DS-CDMA and MT-CDMA with carrier frequency offset

J Ahmed - Arabian Journal for Science and Engineering, 2019 - Springer
Multicarrier code-division multiple access (MC-CDMA), multicarrier direct-sequence CDMA
(MC DS-CDMA) and multitone CDMA (MT-CDMA) are three flavors of spread spectrum …

Исследование алгоритма синхронизации ПСП для систем связи с многочастотными сигналами с помощью компьютерного моделирования

ВИ Лойко, ФГ Хисамов, МВ Милованов… - Политематический …, 2015 - cyberleninka.ru
Целью данной работы является экспериментальное исследование алгоритма
синхронизации ПСП для систем связи с многочастотными сигналами MC-DS-CDMA, не …

Secondary user access control with MassiveMIMO in cognitive radio networks

H Wang, YD Yao, H Li, H Xia - 2019 IEEE International …, 2019 - ieeexplore.ieee.org
We consider the problem of secondary user access control (SUAC) in cognitive radio (CR)
networks with the massive multiple-input multiple-output (MIMO) technique, where a primary …