2013
DOI: 10.5626/jcse.2013.7.3.187
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of Security Mechanisms with Direct Sequence Spread Spectrum Signals

Abstract: Security has long been a challenging problem in wireless networks, mainly due to its broadcast nature of communication. This opens up simple yet effective measures to thwart useful communications between legitimate radios. Spread spectrum technologies, such as direct sequence spread spectrum (DSSS), have been developed as effective countermeasures against, for example, jamming attacks. This paper surveys previous research on securing a DSSS channel even further, using physical layer attributes-keyless DSSS mec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 24 publications
(19 citation statements)
references
References 21 publications
0
19
0
Order By: Relevance
“…Inside the jammer area, the hearing range of the wireless devices is analyzed using the technique proposed in [182]. In [189], [190], cancellation and the usage of different parts of the spectrum are introduced for neutralizing the jammer signals, whereas some attempt to estimate the position of the jammer for further action. Some of them have utilized autonomic computing [157]- [159] to detect jammer's location.…”
Section: B Autonomic Approachesmentioning
confidence: 99%
“…Inside the jammer area, the hearing range of the wireless devices is analyzed using the technique proposed in [182]. In [189], [190], cancellation and the usage of different parts of the spectrum are introduced for neutralizing the jammer signals, whereas some attempt to estimate the position of the jammer for further action. Some of them have utilized autonomic computing [157]- [159] to detect jammer's location.…”
Section: B Autonomic Approachesmentioning
confidence: 99%
“…Individual mobile devices select the combination of their strategies (A, ). At the global level, they dynamically adjust their strategies A at each Δ using (11). At the lower level, they decide on their -LDP values at each Δ according to (7)-(8).…”
Section: Main Steps Of Proposed Multilevel Mcs Control Schemementioning
confidence: 99%
“…Therefore, privacy protection mechanism has been considered an essential requirement for the MCS system. However, until now, the principal privacy issue in the MCS system has not yet been well addressed; few existing work systematically investigates the privacy protection problem considering the tradeoff between privacy preservation and sensed data accuracy [8][9][10][11].…”
Section: Introductionmentioning
confidence: 99%
“…WHAs on routing protocol that produces dose directly on the network layer and indirectly on other layers of network that affect availability and integrity of routing packets. In typical DSSS technique, spreads the modulated signal by spreading signal is generated from a Pseudo-Noise (PN) sequence running periodically at a much higher rate than the original data signal for securing physical layer of the network against jamming DOS attacks [35]. In this paper, the transmission and reception turnaround latency for UMTS and WLAN radios have been specified as 25μs and 2μs, respectively.…”
Section: ) Snauth_speripv2 With Direct Sequence Spread Spectrum (Dsss)mentioning
confidence: 99%