References in periodicals archive ?
The detection of jamming in this approach is BS centric, where the collection of data, processing and decision making are done by BS to make the decision whether the node is jammed or not.
The work in [20] considered, passing attack notification messages out of a jammed region by creation of wormhole links between sensor nodes, one of which resides out of the jammed area.
In the system configuration, the black nodes denote CHs, the white nodes denote CMs, the yellow nodes denote jammed CMs and the red node denotes jammer node.
From the simulation result, it is observed that the CH21 identifies that the members M1, M2 and M3 are jammed and the members M4 and M5 are not jammed.
Therefore by using the mean PDR of jammed member as reference value, the classification of jamming is performed (All the T-Tests have been performed by using samples obtained from our simulation).
Jammer energy-focusing is called "power management," and it can only be as good as the information available about the jammed receiver.
In order for power management to be effective, it is necessary to continue to receive the signals containing the information about the receiver being jammed. This process is called "look through" and is most directly accomplished by stopping the jamming for brief periods to allow the look-through receiver to "take a peek." A spirited discussion about look-through periods persists among the receiver and jammer experts developing integrated EW systems.
which means that the communications link being jammed will be able to function up to a distance of 4.5 km against the jamming.
This solution is adequate in a low-density threat environment when only a small number of emitters must be jammed. However, the leakage of power from the jammer into the receiver within the frequency bands where the jammer is radiating tends to desensitize the receiver.