Distribute the message over the network using another frequency and timing technique to circumvent the jammers

Padmaja, P. (57189218099) and E Justin Sophia, I. (57320736000) and Charan, Sai Hari (56045333800) and Kumar, Sunil Senthil (57220592072) and Somu, K. (57196425299) and Lingala, Thirupathi (57222668272) (2021) Distribute the message over the network using another frequency and timing technique to circumvent the jammers.

Full text not available from this repository.

Abstract

The next wireless communication paradigm for network devices is mobile ad-hoc systems. In contrast to conventional mobile networks, networks will not have a wired connection. Providers ultimately rely on one another to maintain the network. The major uses for ad hoc networks remain the tactical military as well as other safety-sensitive activities. Its susceptibility to Denial-of-Service (DOS) assaults is one major problem in developing such systems. In this document, one kind of DOS assault, dubbed Jamming, is considered. An interference in lawful wireless technology is the goal of jamming. A jammer could do this by both avoiding transmitting a transmission from the true mobile user or through blocking valid packets from just being received. In this work, researchers present a novel way of measuring problematic areas to identify quite an assault. © 2021 Elsevier B.V., All rights reserved.

Item Type: Article
Subjects: Immunology and Microbiology > Microbiology
Divisions: Engineering and Technology > Vinayaka Mission's Kirupananda Variyar Engineering College, Salem > Electronics & Communication Engineering
Depositing User: Unnamed user with email techsupport@mosys.org
Last Modified: 11 Dec 2025 05:50
URI: https://vmuir.mosys.org/id/eprint/4564

Actions (login required)

View Item
View Item