2020
DOI: 10.3390/s20226405
|View full text |Cite
|
Sign up to set email alerts
|

Distributed Extended Kalman Filtering Based Techniques for 3-D UAV Jamming Localization

Abstract: Wireless networks are vulnerable to jamming attacks. Jamming in wireless communication becomes a major research problem due to ease in Unmanned Aerial Vehicle (UAV) launching and blocking of communication channels. Jamming is a subset of Denial of Service Attack (DoS) and an intentional interference where the malicious node disrupts the wireless communication by increasing the noise at the receiver node through transmission interference signal towards the target channel. In this work, the considered jammer is … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 30 publications
0
2
0
Order By: Relevance
“…where the P r (N, AP) is the total power received by the AP and S is the spoofing signal. To estimate the (t prop ) between two nodes in presence of a spoofer, we extended the concept of the distance ratio β, which was described in [38], to estimate the ToA at different points.…”
Section: Feature Extraction Processmentioning
confidence: 99%
“…where the P r (N, AP) is the total power received by the AP and S is the spoofing signal. To estimate the (t prop ) between two nodes in presence of a spoofer, we extended the concept of the distance ratio β, which was described in [38], to estimate the ToA at different points.…”
Section: Feature Extraction Processmentioning
confidence: 99%
“…Due to the increasing dependence on the network, UAV systems are more vulnerable to malicious cyberattacks. At the same time, the issue of secure consensus control has also attracted extensive attention of scholars [30][31][32][33][34][35][36][37][38][39][40]. Under known and unknown acceleration of targets, in order to address the issue of collaborative siege and simultaneous assault, two collaborative guidance laws based on multiple attackers encircling the target region were proposed in [30].…”
Section: Introductionmentioning
confidence: 99%