Loading...
Search for: jamming-attacks
0.008 seconds

    Robust relay beamforming against jamming attack

    , Article IEEE Communications Letters ; Volume 22, Issue 2 , February , 2018 , Pages 312-315 ; 10897798 (ISSN) Maleki Sadr, M. A ; Ahmadian Attari, M ; Amiri, R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    In this letter, we surpass the jamming effect and also estimate the jamming channel state information by using the Kalman filtering approach. Furthermore, we design a closed-form beamforming weight for maximizing the achievable rate subject to the condition that the total relays power transmission would be below a predefined threshold level, which is formulated as a quadratically constrained quadratic program. Simulation results show the efficient performance of the proposed method for different destruction powers of the jammer by achieving the Cramér-Rao lower bound. © 1997-2012 IEEE  

    Robust relay beamforming against jamming attack

    , Article IEEE Communications Letters ; 2017 ; 10897798 (ISSN) Maleki Sadr, M. A ; Ahmadian Attari, M ; Amiri, R ; Sharif University of Technology
    Abstract
    In this letter, we surpass the jamming effect and also estimate the jamming channel state information by using Kalman filtering (KF) approach. Furthermore, we design a closed-form beamforming weight for maximizing the achievable rate subject to the condition that the total relays power transmission would be below a predefined threshold level, which is formulated as a Quadratically Constrained Quadratic Program (QCQP). Simulation results show efficient performance of the proposed method for different destruction powers of jammer by achieving the Cramer Rao Lower Bound (CRLB). IEEE