dc.contributor.author | Skokowski, Paweł | en_GB |
dc.contributor.author | Kelner, Jan M. | en_GB |
dc.contributor.author | Malon, Krzysztof | en_GB |
dc.contributor.author | Maślanka, Krzysztof | en_GB |
dc.contributor.author | Birutis, Agnius | en_GB |
dc.contributor.author | Vazquez, Miguel A. | en_GB |
dc.contributor.author | Saha, Souradip | en_GB |
dc.contributor.author | Low, Warren | en_GB |
dc.contributor.author | Czapiewska, Agnieszka | en_GB |
dc.contributor.author | Magiera, Jarosław | en_GB |
dc.contributor.author | Rajchowski, Piotr | en_GB |
dc.contributor.author | Ambroziak, Sławomir | en_GB |
dc.date.accessioned | 2022-12-19T10:11:29Z | |
dc.date.accessioned | 2022-12-21T08:23:26Z | |
dc.date.available | 2022-12-19T10:11:29Z | |
dc.date.available | 2022-12-21T08:23:26Z | |
dc.date.issued | 2022-09-22 | |
dc.identifier.citation | Skokowski, Kelner, Malon, Maślanka, Birutis A, Vazquez, Saha, Low, Czapiewska, Magiera, Rajchowski, Ambroziak. Jamming and Jamming Mitigation for Selected 5G Military Scenarios. Procedia Computer Science. 2022;205:258-267 | en_GB |
dc.identifier.uri | http://hdl.handle.net/20.500.12242/3122 | |
dc.description | Skokowski, Paweł; Kelner, Jan M.; Malon, Krzysztof; Maślanka, Krzysztof; Birutis, Agnius; Vazquez, Miguel A.; Saha, Souradip; Low, Warren; Czapiewska, Agnieszka; Magiera, Jarosław; Rajchowski, Piotr; Ambroziak, Sławomir.
Jamming and Jamming Mitigation for Selected 5G Military Scenarios. Procedia Computer Science 2022 ;Volum 205. s. 258-267 | en_GB |
dc.description.abstract | This paper presents jamming and jamming mitigation techniques, which can be used in relation to emerging military systems based on fifth-generation (5G) technology. Nowadays, 5G technology provides incremental improvements over Long Term Evolution (LTE) networks resulting in the enhancement of civilian communications. Considering enormous possible applications of this new technology, it is feasible to use them in military utilities. The authors want to introduce the most important aspects related to the 5G system vulnerability in the context of its use in military scenarios. We also present a quality analysis of adequate solutions for 5G to mitigate the jamming and improve the system immunity. The description of use case scenarios depicts how 5G applications can fit in typical use cases. | en_GB |
dc.language.iso | en | en_GB |
dc.subject | Jamming | en_GB |
dc.subject | 5G | en_GB |
dc.subject | Scenarioer | en_GB |
dc.subject | Militær kommunikasjon | en_GB |
dc.title | Jamming and Jamming Mitigation for Selected 5G Military Scenarios | en_GB |
dc.date.updated | 2022-12-19T10:11:29Z | |
dc.identifier.cristinID | 2091966 | |
dc.identifier.doi | https://doi.org/10.1016/j.procs.2022.09.027 | |
dc.source.issn | 1877-0509 | |
dc.type.document | Journal article | |
dc.relation.journal | Procedia Computer Science | |