Results 1 to 10 of about 1,051 (211)

Optimal Pilots for Anti-Eavesdropping Channel Estimation [PDF]

open access: yesIEEE Transactions on Signal Processing, 2020
Anti-eavesdropping channel estimation (ANECE) is a method that uses specially designed pilot signals to allow two or more full-duplex radio devices each with one or more antennas to estimate their channel state information (CSI) consistently and at the ...
Hua, Yingbo, Wu, Shuo, Zhu, Qiping
core   +4 more sources

Fountain Code-Based LT-SLT Anti-Eavesdropping Coding Design

open access: yesIEEE Access, 2023
In wireless communication wiretap channel, for the eavesdropper to obtain the legitimate receiver decoding rules situation, this paper proposes a LT-SLT fountain code anti-eavesdropping channel coding design.
Lizheng Wang   +3 more
doaj   +2 more sources

Multi-parameter m-complementary Golay sequences and transforms [PDF]

open access: yesКомпьютерная оптика, 2018
In this paper, we develop the family of Golay–Rudin–Shapiro (GRS) m-complementary many-parameter sequences and many-parameter Golay transforms. The approach is based on a new generalized iteration generating construction, associated with n unitary many ...
Valeri Labunets   +3 more
doaj   +5 more sources

Anti-Eavesdropping Scheme Based on Random Mapping for GSM-MBM Systems

open access: yesIEEE Access, 2020
Media-based modulation (MBM) is a recently proposed modulation scheme which has the advantages of increased spectral efficiency and improved performance.
Zhenzhen Gao   +3 more
doaj   +2 more sources

Anti-Eavesdropping by Exploiting the Space–Time Coupling in UANs

open access: yesJournal of Marine Science and Engineering
Due to the space–time coupling access, we find that anti-eavesdropping opportunities exist in underwater acoustic networks (UANs), where packets can be successfully received only by the intended receiver, but collide at the unintended receivers.
Yan Wang   +5 more
doaj   +2 more sources

A semantic secure communication approach for resource-constrained power IoT terminals [PDF]

open access: yes物联网学报
The training of semantic models typically consumes a large amount of energy and time, which hinders the implementation of semantic transmission on power Internet of things (IoT) terminals with limited resources.
YANG Huifeng   +5 more
doaj   +3 more sources

Intelligent reflecting surface backscatter-enabled physical layer security enhancement via deep reinforcement learning [PDF]

open access: yesPeerJ Computer Science
This article introduces a novel strategy for wireless communication security utilizing intelligent reflecting surfaces (IRS). The IRS is strategically deployed to mitigate jamming attacks and eavesdropper threats while improving signal reception for ...
Manzoor Ahmed   +7 more
doaj   +3 more sources

Intermittent Encryption Strategies for Anti-Eavesdropping Estimation

open access: yes
In this paper, an anti-eavesdropping estimation problem is investigated. A linear encryption scheme is utilized, which first linearly transforms innovation via an encryption matrix and then encrypts some components of the transformed innovation.
Chen, Bo   +4 more
core   +2 more sources

Predator experience enhances giraffe vigilance to oxpecker alarm calls [PDF]

open access: yesBMC Biology
Background Animals often benefit from the alarm calls of other species to detect danger, but how such cues are integrated into vigilance strategies remains unclear.
Anton Baotic, Georgine Szipl
doaj   +2 more sources

Key Synchronization Method Based on Negative Databases and Physical Channel State Characteristics of Wireless Sensor Network [PDF]

open access: yesSensors
Due to their inherent openness, wireless sensor networks (WSNs) are vulnerable to eavesdropping attacks. Addressing the issue of secure Internet Key Exchange (IKE) in the absence of reliable third parties like CA/PKI (Certificate Authority/Public Key ...
Haoyang Pu   +3 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy