Optimal Pilots for Anti-Eavesdropping Channel Estimation [PDF]
Anti-eavesdropping channel estimation (ANECE) is a method that uses specially designed pilot signals to allow two or more full-duplex radio devices each with one or more antennas to estimate their channel state information (CSI) consistently and at the ...
Hua, Yingbo, Wu, Shuo, Zhu, Qiping
core +4 more sources
Fountain Code-Based LT-SLT Anti-Eavesdropping Coding Design
In wireless communication wiretap channel, for the eavesdropper to obtain the legitimate receiver decoding rules situation, this paper proposes a LT-SLT fountain code anti-eavesdropping channel coding design.
Lizheng Wang +3 more
doaj +2 more sources
Multi-parameter m-complementary Golay sequences and transforms [PDF]
In this paper, we develop the family of Golay–Rudin–Shapiro (GRS) m-complementary many-parameter sequences and many-parameter Golay transforms. The approach is based on a new generalized iteration generating construction, associated with n unitary many ...
Valeri Labunets +3 more
doaj +5 more sources
Anti-Eavesdropping Scheme Based on Random Mapping for GSM-MBM Systems
Media-based modulation (MBM) is a recently proposed modulation scheme which has the advantages of increased spectral efficiency and improved performance.
Zhenzhen Gao +3 more
doaj +2 more sources
Anti-Eavesdropping by Exploiting the Space–Time Coupling in UANs
Due to the space–time coupling access, we find that anti-eavesdropping opportunities exist in underwater acoustic networks (UANs), where packets can be successfully received only by the intended receiver, but collide at the unintended receivers.
Yan Wang +5 more
doaj +2 more sources
A semantic secure communication approach for resource-constrained power IoT terminals [PDF]
The training of semantic models typically consumes a large amount of energy and time, which hinders the implementation of semantic transmission on power Internet of things (IoT) terminals with limited resources.
YANG Huifeng +5 more
doaj +3 more sources
Intelligent reflecting surface backscatter-enabled physical layer security enhancement via deep reinforcement learning [PDF]
This article introduces a novel strategy for wireless communication security utilizing intelligent reflecting surfaces (IRS). The IRS is strategically deployed to mitigate jamming attacks and eavesdropper threats while improving signal reception for ...
Manzoor Ahmed +7 more
doaj +3 more sources
Intermittent Encryption Strategies for Anti-Eavesdropping Estimation
In this paper, an anti-eavesdropping estimation problem is investigated. A linear encryption scheme is utilized, which first linearly transforms innovation via an encryption matrix and then encrypts some components of the transformed innovation.
Chen, Bo +4 more
core +2 more sources
Predator experience enhances giraffe vigilance to oxpecker alarm calls [PDF]
Background Animals often benefit from the alarm calls of other species to detect danger, but how such cues are integrated into vigilance strategies remains unclear.
Anton Baotic, Georgine Szipl
doaj +2 more sources
Key Synchronization Method Based on Negative Databases and Physical Channel State Characteristics of Wireless Sensor Network [PDF]
Due to their inherent openness, wireless sensor networks (WSNs) are vulnerable to eavesdropping attacks. Addressing the issue of secure Internet Key Exchange (IKE) in the absence of reliable third parties like CA/PKI (Certificate Authority/Public Key ...
Haoyang Pu +3 more
doaj +2 more sources

