Now days, wireless technologies has becomes more popular and affordable. In every field e.g. government sector, education, business, military, medical etc. use of wireless network have been increased which enables broad class of new applications. These applications make work easier and faster but one threat which is harmful i.e. jamming attack. The wireless jammer continually emits a radio signal along the same frequency that the wireless nodes use. Jamming technology generally does not discriminate between desirable and undesirable communication. A jammer can block all radio communication on any device that operates on radio frequencies within its range which create nuisance in our critical communication services. Most reliable solution to avoid nuisance is detection and localization of wireless jammer which helps to take further security actions. This project aims to detect wireless jammer and find the location of wireless jammer by experimental setup
%0 Journal Article
%1 Shripati_2015
%A Kadam, Swati Shripati
%A Patil, Y. M.
%D 2015
%I Auricle Technologies, Pvt., Ltd.
%J International Journal on Recent and Innovation Trends in Computing and Communication
%K detection jammer localization wireless
%N 1
%P 365--367
%R 10.17762/ijritcc2321-8169.150173
%T Detection and Localization of Wireless Jammer using XBee module
%U http://dx.doi.org/10.17762/ijritcc2321-8169.150173
%V 3
%X Now days, wireless technologies has becomes more popular and affordable. In every field e.g. government sector, education, business, military, medical etc. use of wireless network have been increased which enables broad class of new applications. These applications make work easier and faster but one threat which is harmful i.e. jamming attack. The wireless jammer continually emits a radio signal along the same frequency that the wireless nodes use. Jamming technology generally does not discriminate between desirable and undesirable communication. A jammer can block all radio communication on any device that operates on radio frequencies within its range which create nuisance in our critical communication services. Most reliable solution to avoid nuisance is detection and localization of wireless jammer which helps to take further security actions. This project aims to detect wireless jammer and find the location of wireless jammer by experimental setup
@article{Shripati_2015,
abstract = {Now days, wireless technologies has becomes more popular and affordable. In every field e.g. government sector, education, business, military, medical etc. use of wireless network have been increased which enables broad class of new applications. These applications make work easier and faster but one threat which is harmful i.e. jamming attack. The wireless jammer continually emits a radio signal along the same frequency that the wireless nodes use. Jamming technology generally does not discriminate between desirable and undesirable communication. A jammer can block all radio communication on any device that operates on radio frequencies within its range which create nuisance in our critical communication services. Most reliable solution to avoid nuisance is detection and localization of wireless jammer which helps to take further security actions. This project aims to detect wireless jammer and find the location of wireless jammer by experimental setup},
added-at = {2015-08-03T09:42:13.000+0200},
author = {Kadam, Swati Shripati and Patil, Y. M.},
biburl = {https://www.bibsonomy.org/bibtex/2b8d1f171269e7fd034c8dda6b70bc87f/ijritcc},
doi = {10.17762/ijritcc2321-8169.150173},
interhash = {033eed5cbdfb35b56d74a10f73ac2b31},
intrahash = {b8d1f171269e7fd034c8dda6b70bc87f},
journal = {International Journal on Recent and Innovation Trends in Computing and Communication},
keywords = {detection jammer localization wireless},
month = {january},
number = 1,
pages = {365--367},
publisher = {Auricle Technologies, Pvt., Ltd.},
timestamp = {2015-08-03T09:42:13.000+0200},
title = {Detection and Localization of Wireless Jammer using {XBee} module},
url = {http://dx.doi.org/10.17762/ijritcc2321-8169.150173},
volume = 3,
year = 2015
}