Filters








5,990 Hits in 4.6 sec

Security Issues of Low Power Wide Area Networks in the Context of LoRa Networks [article]

Debraj Basu, Tianbo Gu, Prasant Mohapatra
<span title="2020-06-30">2020</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
A primary security concern of LPWAN technology is the attacks that block legitimate communication between nodes resulting in scenarios like loss of packets, delayed packet arrival, and skewed packet reaching  ...  LoRa (Long Range) is a promising wireless radio access technology that supports long-range communication at low data rates and low power consumption.  ...  It will require a cross-layer approach to detect and take action against the different attack vectors. VI.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2006.16554v1">arXiv:2006.16554v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/az7wtxeujzhzhelsxvdih5suki">fatcat:az7wtxeujzhzhelsxvdih5suki</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200722043017/https://arxiv.org/pdf/2006.16554v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/d3/13/d313b4e66b2880a8c631008eba588c421d138e3f.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2006.16554v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Survey on Attacks Pertaining to Wireless Mesh Networks and Approach towards Counter Measures

Seema Devi, Sandeep Dalal
<span title="2016-09-15">2016</span> <i title="Foundation of Computer Science"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/b637noqf3vhmhjevdfk3h5pdsu" style="color: black;">International Journal of Computer Applications</a> </i> &nbsp;
Some attacks that TCP / IP model, are performed at different layers of security challenges, analyzing the counter remedies and protection mechanisms in place various attacks listed.  ...  different layers of security challenges, analyzing the counter remedies and protection mechanisms in place various attacks listed.  ...  INTRODUCTION Wireless Mesh Networking is an emerge technology.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5120/ijca2016911662">doi:10.5120/ijca2016911662</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/5bafhogvoraw5mg3o33iw3oeme">fatcat:5bafhogvoraw5mg3o33iw3oeme</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180602234837/https://www.ijcaonline.org/archives/volume149/number12/devi-2016-ijca-911662.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/39/08/3908ff0a5df7c399cf13ee49b5be8b04760ddde0.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5120/ijca2016911662"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Handling Cross-Layer Attacks Using Neighbors Monitoring Scheme and Swarm Intelligence in MANET

G. Indirani, K. Selvakumar
<span title="2012-01-10">2012</span> <i title="Association of Technology and Science"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/lhvdmzuqxreinc3m4ancngr4qi" style="color: black;">International Journal of Computer Applications Technology and Research</a> </i> &nbsp;
Wormhole attack, black hole attack, Byzantine attack, information disclosure and resource consumption attack are some of the examples of active attacks.  ...  It is further classified into two categories of attacks such as internal and external attack.  The internal attacks are performed by the compromised nodes that belong to the network.  The external attacks  ...  Using this network-centric interpretation of jamming attacks, a network designer can attain a greater understanding of the potential threat of jamming.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.7753/ijcatr0201.1009">doi:10.7753/ijcatr0201.1009</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/geueh6mw6bfp3prrankm3bb2jm">fatcat:geueh6mw6bfp3prrankm3bb2jm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180602071724/http://www.ijcat.com/archives/volume2/issue1/ijcatr02011009.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/95/96/95960d033c00f0b9ea5577abc1672964d13a847a.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.7753/ijcatr0201.1009"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Digital image synthesizers: are enemy sensors really seeing what's there?

P.E. Pace, D.J. Fouts, D.P. Zulaica
<span title="">2006</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/o3n5syj5djffzj6il626tqaxli" style="color: black;">IEEE Aerospace and Electronic Systems Magazine</a> </i> &nbsp;
This paper describes an alldigital image synthesizer technique capable of generating realistic false-target images for counter-targeting using modern digital radio frequency memory technology.  ...  High-resolution imaging sensors such as the inverse synthetic aperture radar perform this action in the most effective way and are especially useful against low radar cross section targets.  ...  Currently, counter lock-on actions consist of electronic attack (jamming), distraction chaff and seduction chaff, as well as decoy repeaters.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/maes.2006.1599134">doi:10.1109/maes.2006.1599134</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/xarvtf6e75culp6xqfjczn5wta">fatcat:xarvtf6e75culp6xqfjczn5wta</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200322160431/https://nps.edu/documents/106819106/0/Digital_Synthesizer_Pace.pdf/dc529f9b-84ba-4320-ac4d-20d0c0749b5c" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f3/06/f306d15d98ed53efdee34189e00c3db12b309368.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/maes.2006.1599134"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Redundancy offset narrow spectrum

Sang-Yoon Chang, Yih-Chun Hu, Jerry Chiang, Soo-Young Chang
<span title="">2013</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/ffxehijsqbcojj7ruvtzb2ptva" style="color: black;">Proceedings of the 11th ACM international symposium on Mobility management and wireless access - MobiWac &#39;13</a> </i> &nbsp;
Randomization is an effective technique for availability against such attacks; for instance, spread spectrum technology randomizes the channel access to counter jamming.  ...  Redundancy Offset Narrow Spectrum (RONS) offers a narrow spectrum technology that bypasses the spreading cost and effectively counters correlated jamming and further helps ensuring confidentiality.  ...  We introduce a novel physical-layer technology, Redundancy Offset Narrow Spectrum (RONS), that effectively counters both passive and active wireless attacks.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2508222.2508233">doi:10.1145/2508222.2508233</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/mobiwac/ChangHCC13.html">dblp:conf/mobiwac/ChangHCC13</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/fwx733nbnrdh7iync7f7nvymuq">fatcat:fwx733nbnrdh7iync7f7nvymuq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180824034712/http://yihchun.com/papers/mobiwac13.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/a4/11/a4112a3690a05580d96e848330fcae68de37cf39.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2508222.2508233"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Design and Fabrication of Anti-Drone System with Interdiction Method

Veeramanikandan R, Faisal Hussain Mughloo, Katariya Sagar Bhikubhai
<span title="2021-12-30">2021</span> <i title="Tejass Publishers"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/s7xsrjol7bcyjpobqp3ahbu3ja" style="color: black;">IJIREEICE</a> </i> &nbsp;
In this paper, a comprehensive technology utilized for drone surveillance implemented to the existing anti drone systems.  ...  A counter drone system includes a cueing sensor to detect the presence of an object wherein the cueing sensor cues the presence of a target drone.  ...  Crackers: Designed to act like a gun trigger system for counter attack the targeted drone. It is a efficient method for counter attacking enemy drone into our respective surveillance territory.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.17148/ijireeice.2021.91203">doi:10.17148/ijireeice.2021.91203</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/yaizrpl46vg2fo22tlimwmsiu4">fatcat:yaizrpl46vg2fo22tlimwmsiu4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220202222313/https://ijireeice.com/wp-content/uploads/2021/12/IJIREEICE.2021.91203.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/22/11/22111148e5cccbe1197db14ded65cf40e44c59ea.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.17148/ijireeice.2021.91203"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Counter Remotely Piloted Aircraft Systems

Marian Buric, Geert De Cubber
<span title="2017-06-01">2017</span> <i title="Zenodo"> Zenodo </i> &nbsp;
An effective Counter Remotely Aircraft System is a major objective of many researchers and industries entities.  ...  Their activity is strongly impelled by the operational requirements of the Law Enforcement Authorities and naturally follows both the course of the latest terrorist events and technological developments  ...  An effective C-RPAS need to be versatile and set off its strategies accordingly to the type of attacks (e.g., singular or swarm attacks).  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5281/zenodo.1115502">doi:10.5281/zenodo.1115502</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ujrz4ue2nzafdeow52ej3iqkgu">fatcat:ujrz4ue2nzafdeow52ej3iqkgu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20201225063424/https://zenodo.org/record/1115502/files/Counter%20Remotely%20Piloted%20Aircraft%20Systems.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/87/92/87923c8bef65e0298256fcbdacae5859ee83c795.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5281/zenodo.1115502"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> zenodo.org </button> </a>

A Review of Counter-UAS Technologies for Cooperative Defensive Teams of Drones

Vittorio Ugo Castrillo, Angelo Manco, Domenico Pascarella, Gabriella Gigante
<span title="2022-03-01">2022</span> <i title="MDPI AG"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/ycpqunwwuja6beynxtnfswzqgy" style="color: black;">Drones</a> </i> &nbsp;
For this purpose, the paper evaluates the concept of a multiplatform counter-UAS system (CUS), based mainly on a team of mini drones acting as a cooperative defensive system.  ...  In order to provide the basis for implementing such a system, we present a review of the available technologies for sensing, mitigation and command and control systems that generally comprise a CUS, focusing  ...  This technology is typically used for ground-based counter-UAS platforms, but no airborne commercial products have been found.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/drones6030065">doi:10.3390/drones6030065</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/bpnk3izp5vf3zcvvoeg3kf5n34">fatcat:bpnk3izp5vf3zcvvoeg3kf5n34</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220503185122/https://mdpi-res.com/d_attachment/drones/drones-06-00065/article_deploy/drones-06-00065.pdf?version=1646121421" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/c4/cb/c4cb65acdee08e2c5a43d243121d498789b38de2.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/drones6030065"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> mdpi.com </button> </a>

Defense against Lion Attack in Cognitive Radio Systems using the Markov Decision Process Approach

Khadijeh Afhamisisi, Hadi Shahriar Shahhoseini, Ehsan Meamari
<span title="2014-01-01">2014</span> <i title="Walter de Gruyter GmbH"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/dtsa6utot5cnhmu3fz7fv6b4su" style="color: black;">Frequenz</a> </i> &nbsp;
The Lion attack uses PUE or jamming attack in physical layer to disrupt TCP protocol in transport layer.  ...  There are several potential security challenges for cognitive radio like Jamming, PUE and Lion attack. Lion attack is multi layer attacks that has effected on two layers.  ...  RELATED WORK In this section, first we review PUE and Jamming attack which are base of the Lion attack, and then describe the main lack in the prediction counter attacks of Lion which is missing strategy  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1515/freq-2013-0048">doi:10.1515/freq-2013-0048</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/juyw6ijxlnc53kxkasid4edm34">fatcat:juyw6ijxlnc53kxkasid4edm34</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200321015613/https://arxiv.org/ftp/arxiv/papers/1912/1912.12172.pdf" title="fulltext PDF download [not primary version]" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <span style="color: #f43e3e;">&#10033;</span> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1515/freq-2013-0048"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> degruyter.com </button> </a>

Contemporary GPS Security Mechanisms

<span title="2019-12-14">2019</span> <i title="Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/cj3bm7tgcffurfop7xzswxuks4" style="color: black;">VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE</a> </i> &nbsp;
As the attacks on GPS have increased so the review of GPS security plays a vital role in research. This paper looks at different spoofing generation methods.  ...  This paper focusses on the current anti-jamming and anti-spoofing GPS mechanisms. This paper presents a comprehensive analysis of all the techniques along with the pros and cons of each method.  ...  in technology which has increased the jamming and spoofing attacks.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.35940/ijitee.b1064.1292s19">doi:10.35940/ijitee.b1064.1292s19</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/maxmyocjhrfjlgomogj72m6kry">fatcat:maxmyocjhrfjlgomogj72m6kry</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220323025040/https://www.ijitee.org/wp-content/uploads/papers/v9i2S/B10641292S19.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/a8/88/a888d8119f0cb27060ad209e8df011465ae9248f.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.35940/ijitee.b1064.1292s19"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Anomaly Spectrum Usage Detection in Multihop Cognitive Radio Networks: A Cross-Layer Approach

Lijun Qian, Xiangfang Li, Shuangqing Wei
<span title="">2013</span> <i title="Engineering and Technology Publishing"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/x35svotye5crdo2d6qzxuyyq7m" style="color: black;">Journal of Communications</a> </i> &nbsp;
However, at the same time, the use of cognitive radios further complicates the security problems in wireless networks and introduces additional challenges for a counter measure.  ...  Due to the intelligence of the attackers, many of the attacks may be stealthy by nature, such as the anomalous spectrum usage attacks, which usually cannot be detected only using information from one layer  ...  Another prime example is stealthy jamming attacks.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.12720/jcm.8.4.259-266">doi:10.12720/jcm.8.4.259-266</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/mnfmf2kfxva6rctz3sn3cnq7ji">fatcat:mnfmf2kfxva6rctz3sn3cnq7ji</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170809060927/http://www.jocm.us/uploadfile/2013/0425/20130425115139677.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/7c/ef/7cef8e89e383ae96024453bb3b509d16b4e867e4.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.12720/jcm.8.4.259-266"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

A Survey onadvances in security threats and its counter measures in cognitive radio networks

D Ganesh, T Pavan Kumar
<span title="2018-03-19">2018</span> <i title="Science Publishing Corporation"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/piy2nrvrjrfcfoz5nmre6zwa4i" style="color: black;">International Journal of Engineering &amp; Technology</a> </i> &nbsp;
Cognitive radio is a promising wireless communication technology that improves spectrum utilization and offers many benefits for internet users.  ...  In this survey we address various attacks in different layers , new threats and challenges that Cognitive networks face, current available solutions to address layer attacks.  ...  Jamming Distruption Attack In Cognitive Radio, one can perform Jamming during data transmission.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14419/ijet.v7i2.8.10465">doi:10.14419/ijet.v7i2.8.10465</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/m2bswlvdgrcwjefgt3uecxmkry">fatcat:m2bswlvdgrcwjefgt3uecxmkry</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180721040746/https://www.sciencepubco.com/index.php/ijet/article/download/10465/3775" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/b2/86/b286733175063a36f6d45395584a86392259e422.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14419/ijet.v7i2.8.10465"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Fighting the Locusts: Implementing Military Countermeasures Against Drones and Drone Swarms

Matthieu J. Guitton
<span title="">2021</span> <i title="Scandinavian Military Studies"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/5d6ww3uxwfdethjhgecyqsmkny" style="color: black;">Scandinavian Journal of Military Studies</a> </i> &nbsp;
technology mastered only by a few nations.  ...  SCANDINAVIAN JOURNAL OF MILITARY STUDIES Guitton: Fighting the Locusts 27 attack, U.S. authorities asserted that the attacks originated from Iran (Said, Malsin & Donati 2019).  ...  Drones are susceptible to GPS spoofing, GPS attacks, jamming, dronespecific malware ("maldrones"), and wireless attacks (Kerns et al. 2014) .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.31374/sjms.53">doi:10.31374/sjms.53</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/bp6cd2casreczjswkxorghhsba">fatcat:bp6cd2casreczjswkxorghhsba</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210121183148/https://sjms.nu/articles/10.31374/sjms.53/galley/96/download/" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/2a/74/2a7459772cf1f6f12805d39d06b01161df0b000a.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.31374/sjms.53"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Networking of Tracking Radars of Two Different SAM Weapons to Protect the Missile in Intensive Jamming Environment

G. Kumaraswamy Rao, Sreehari Rao, Sudhir Kumar Chaudhuri
<span title="2017-12-18">2017</span> <i title="Defence Scientific Information and Documentation Centre"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/sbz4qubtlrhx5a2wpmby2l2qfu" style="color: black;">Defence Science Journal</a> </i> &nbsp;
A project was undertaken to overcome the jamming vulnerability of Pechora aiming to design and develop an electronic counter counter measure system.  ...  When jamming (x band) is employed by enemy aircraft the Low blow radar failed to provide target coordinates.  ...  (iii) Complex EW jamming attacks by enemy can be defeated.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14429/dsj.68.10993">doi:10.14429/dsj.68.10993</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/eb66xd4ur5erzadjdlzek2oope">fatcat:eb66xd4ur5erzadjdlzek2oope</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20181030045136/http://publications.drdo.gov.in/ojs/index.php/dsj/article/download/10993/6077" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/82/c0/82c0850c813425c6bb83f749a55c1492b2801910.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14429/dsj.68.10993"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Security of Underwater and Air-Water Wireless Communication [article]

Waqas Aman, Saif Al-Kuwari, Ambrish Kumar, Muhammad Mahboob Ur Rahman
<span title="2022-03-05">2022</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
Specifically, we provide a detailed literature review of the various kinds of active and passive attacks which hamper the confidentiality, integrity, authentication and availability of both underwater  ...  The first part of the paper is essentially a primer on underwater and A-W WCNs whereby we outline the benefits and drawbacks of the three promising underwater and A-W candidate technologies: radio frequency  ...  System Attacks considered Countermeasures proposed Security properties ad- Architecture dressed [142] (2019) Multi-nodes Jamming Channel access model based on cross- Availability UWASN with layer design  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2203.02667v1">arXiv:2203.02667v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/zel57ds3ibdplddim6eqcmzh5a">fatcat:zel57ds3ibdplddim6eqcmzh5a</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220309115851/https://arxiv.org/pdf/2203.02667v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/90/13/901300e975c34381d1c0743e95db5746d1a14a0f.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2203.02667v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 5,990 results