Data files were used in support of the research paper titled "“Experimentation Framework for Wireless Communication Systems under Jamming Scenarios" which has been submitted to the IET Cyber-Physical Systems: Theory & Applications journal. Authors: Marko Jacovic, Michael J. Liston, Vasil Pano, Geoffrey Mainland, Kapil R. Dandekar Contact: krd26@drexel.edu --------------------------------------------------------------------------------------------- Top-level directories correspond to the case studies discussed in the paper. Each includes the sub-directories: logs, parsers, rayTracingEmulation, results. -------------------------------- logs: - data logs collected from devices under test - 'defenseInfrastucture' contains console ...
Debugging wireless communication problems in a field installation is difficult, disruptive, and cost...
Wireless Sensor networks are one of the most extensively used technologies in our day to day lives; ...
Dense, unmanaged IEEE 802.11 deployments tempt saboteurs into launching jamming attacks by injecting...
The broadcast nature of wireless communications makes them vulnerable to denial-of-service attacks. ...
Data files were used in support of the research paper titled “Mitigating RF Jamming Attacks at the P...
This dataset includes physical-layer radio information (IQ samples) acquired from indoor communicati...
The increased use of Wireless Sensor Networks (WSN) for geolocation has led to an increased reliance...
openThis paper aims to illustrate the laboratory experience carried out during March-July 2023 at Ho...
The goal of this thesis is to identify and evaluate weaknesses in the rendezvous process for Cogniti...
Abstract Wireless communication devices must be protected from malicious threats, including active j...
The goal of this project was to show that communication with a cellular base station and user equipm...
The use of commercial off-the-shelf (COTS) technologies in military environment is attractive, but i...
The aim of this research is to demonstrate and evaluate the ability to eavesdrop and interfere with ...
Since the inception of the 802.11 standard in 1999, WLANs, which used to be exceptional, became a ma...
AbstractA mobile ad hoc network is a group of mobile hosts that depends on wireless network interfac...
Debugging wireless communication problems in a field installation is difficult, disruptive, and cost...
Wireless Sensor networks are one of the most extensively used technologies in our day to day lives; ...
Dense, unmanaged IEEE 802.11 deployments tempt saboteurs into launching jamming attacks by injecting...
The broadcast nature of wireless communications makes them vulnerable to denial-of-service attacks. ...
Data files were used in support of the research paper titled “Mitigating RF Jamming Attacks at the P...
This dataset includes physical-layer radio information (IQ samples) acquired from indoor communicati...
The increased use of Wireless Sensor Networks (WSN) for geolocation has led to an increased reliance...
openThis paper aims to illustrate the laboratory experience carried out during March-July 2023 at Ho...
The goal of this thesis is to identify and evaluate weaknesses in the rendezvous process for Cogniti...
Abstract Wireless communication devices must be protected from malicious threats, including active j...
The goal of this project was to show that communication with a cellular base station and user equipm...
The use of commercial off-the-shelf (COTS) technologies in military environment is attractive, but i...
The aim of this research is to demonstrate and evaluate the ability to eavesdrop and interfere with ...
Since the inception of the 802.11 standard in 1999, WLANs, which used to be exceptional, became a ma...
AbstractA mobile ad hoc network is a group of mobile hosts that depends on wireless network interfac...
Debugging wireless communication problems in a field installation is difficult, disruptive, and cost...
Wireless Sensor networks are one of the most extensively used technologies in our day to day lives; ...
Dense, unmanaged IEEE 802.11 deployments tempt saboteurs into launching jamming attacks by injecting...