Abstract:
With the widespread use of the Internet, reducing power consumption to extend network lifetime while maintaining the communication connectivity and covering the target region completely has become one of the most important challenges in designing future Internet networks. After the comparison of some existing methods, such as measuring networks state and evaluating flow-jamming attack on network flow, we present a new form of network traffic flows, in which end systems or hosts have three basic states: on, off and asleep. In this paper, we first give a brief review on the existing techniques, and particularly consider ldquoresearch on architecturerdquo as a process rather than an event. Then, we propose a framework for initial exploration of supporting selective connectivity, whereby a host or a router can choose whether to be ldquoconnectedrdquo or ldquodisconnectedrdquo. The proposed approach is formulated as an optimization problem for both selective connectivity and resource exhaustion in Internet. We show that this technique is able to provide a foundation for design of future protocols to improve the actual Internet architecture.Effective suppression of inadvertent or deliberate jamming signals is crucial to ensure reliable wireless communication. However, as demonstrated in this paper, when the transmitted jamming signals are highly correlated, and especially when the correlation coefficient varies, nullifying the jamming signals can be challenging. Unlike existing techniques that often assume uncorrelated jamming signals or non-zero but constant correlation, we analyze the impact of the non-zero and varying correlations between transmitted jamming signals on the suppression of the jamming signals. Specifically, we observe that by varying the correlation coefficients between transmitted jamming signals, jammers can “virtually change” the jamming channels hence their nullspace, even when these channels do not physically change. This makes most jamming suppression techniques that rely on steering receiving beams towards the nullspace of jamming channels no longer applicable. To tackle the problem, we develop techniques to effectively track the jamming nullspace and correspondingly update receiving beams. Monte Carlo simulations show that our proposed techniques can suppress/nullify jamming signals for all considered scenarios with non-zero and varying correlation coefficients amongst transmitted jamming signals.
Uncorrelated
Near-far problem
Cite
Citations (7)
We study experimentally the jamming phenomenon of granular flow of monodisperse disks of $D\phantom{\rule{0ex}{0ex}}=\phantom{\rule{0ex}{0ex}}5\mathrm{mm}$ diameter in a two-dimensional hopper with opening $R$. The jamming probability $J(d)$ is measured where $d\ensuremath{\equiv}R/D$. We found that $J(d)$ decreases from 1 to zero when $d$ increases from 2 to 5. From observing the disk configurations of the arch in the jamming events, the jamming probability can be explained quantitatively by treating the arch as the trajectory of a restricted random walker.
Granular matter
Cite
Citations (395)
We consider jamming that occurs for the flow of dry granular materials from a hopper as the outlet size, D, is reduced relative to the particle size, d. We propose and test a model based on the simple idea that the probability of jamming on a short time, dt, is a constant, τ. This leads to the prediction that the probability of surviving until time t without jamming is an exponentially decaying function, Ps(t) = exp(−t/τ). The important physical question is what determines τ? Experiments to date have confirmed the exponential character of the survival probability. Work in progress characterizes τ(D, d), fluctuations and their possible relation to the jamming process.
Constant (computer programming)
Cite
Citations (23)
An efficient multilayer general area router, named V4, for MCM and dense PCB designs is presented. The unique feature of the V4 router is that it uses no more than four vias to route every net and yet produces high quality routing solutions. A number of combinatorial optimization techniques are used in the router to produce high quality routing solutions in polynomial time. As a result, it is independent of net ordering, runs much faster, and has far less memory requirement compared to other multilayer general area routers. The router was tested on several examples, including two industrial MCM designs. Compared with the 3-D maze router, on average the V4 router uses 2% less wire length, 31% fewer vias, and runs 26 times faster. Compared with the SLICE router, on average the V4 router uses 4% less wire length and runs 4.6 times faster.< >
One-armed router
Core router
Metrics
Cite
Citations (7)
The electronic jamming power assignment problem is studied for mixed formation of the electronic warfare aircraft and fighter aircraft in cooperative air combat.A computing model of electronic jamming neutralization distance is established based on the jamming power conditions.The combat superiority model for jamming neutralization distance is built.And the rewarding function for jamming distance is gained.An electronic jamming power assignment model is established based on the maximum of the rewarding function value.Finally,a model validation simulation is given,the result shows that the power assignment model is reasonable and can reach an optimal jamming effect.
Electronic warfare
Electronic countermeasure
Cite
Citations (2)
We analyze the role of jamming as a means to increase the security of wireless systems. Specifically, we characterize the impact of cooperative/friendly jamming on the secrecy outage probability of a quasi-static wiretap fading channel. We introduce jamming coverage and jamming efficiency as security metrics, and evaluate the performance of three different jamming strategies that rely on various levels of channel state information. The analysis provides insight for the design of optimal jamming configurations and indicates that one jammer is not enough to maximize both metrics simultaneously.
Channel state information
Near-far problem
Cite
Citations (57)
Jamming has long been a problem in wireless communications, but with recent advances in adaptive jamming, adaptive anti-jamming, and other advanced physical layer security techniques, it is hard to understand whether we can keep the jammer at bay. In this work, we consider this problem and introduce a game-theoretic framework which gives us a tool to analyze the complex adaptive jamming and anti-jamming space. To illustrate the strengths and weaknesses in intelligent jamming and anti-jamming techniques, we present a straightforward two-player instance and analyze a number of possible jamming and anti-jamming techniques.
Near-far problem
Cite
Citations (4)
The characteristics of combined sweep and barrage jamming of RCIED activation messages comparing to pure sweep and pure barrage jamming are presented in this paper. It is proved when combined jamming is advantageous over other two other jamming methods as also when it gives no benefits. The activation and jamming signal characteristics when combined jamming is especially effective are emphasized in the paper. The combined jamming performances are determined on the base of originally developed and verified simulation program.
Near-far problem
Cite
Citations (3)
In this paper, we study the jamming aided physical layer security of the intelligent reflecting surface (IRS) assisted communication system in the presence of an eavesdropper. We aim to prove that the optimally designed jamming strategy is beneficial for the IRS assisted secure transmission. Specifically, we first derive the successful and secret transmission probability (SSP) in the closed form. Then we maximize the SSP by optimizing the jamming power allocation. When the number of the IRS elements or the total transmit power increases, less jamming power is required. It is also found that the jamming location and its corresponding optimal jamming power follow a certain quantitative relation, especially when the number of the IRS elements or the total transmit power is large. Finally, simulations are provided to validate our analytical derivations.
Transmitter power output
Cite
Citations (0)
Aiming at the task of penetration in the case of single plane to multi-target,a jamming strategy including the choice of jamming occasion,the choice of the jamming mode and the jamming power allocation is proposed.After giving the models of jamming occasion and jamming mode,the paper mainly analyzes the method of jamming power allocation,builds the model of threat level evaluation based on the inference algorithm of Bayesian networks,then works out the different threat weights of multi-target and presents the jamming power allocation method based on threat level evaluation finally.The simulation results show that this method can use the limited jamming resources adequately,reduce the hostile threat effectively and increase the penetration probability of parent planes.
Mode (computer interface)
Cite
Citations (2)