Cooperative Jamming for Secure Communications in MIMO Relay Networks [PDF]
Secure communications can be impeded by eavesdroppers in conventional relay systems. This paper proposes cooperative jamming strategies for two-hop relay networks where the eavesdropper can wiretap the relay channels in both hops.
A. Lee Swindlehurst +2 more
core +1 more source
Cooperative Jamming of Multi UAVs to Netted Radar [PDF]
Abstract This paper analyzes the cooperative jamming problem of multi UAVs to netted radar, controls the given constraints, adopts the optimal control algorithm to analyze the movement law of UAVs in layers. Based on the single UAV track model, the cooperative jamming track model of multiple UAVs is established, and the optimal UAV track
Zhi Gao +6 more
openaire +1 more source
Strongly Secure Communications Over the Two-Way Wiretap Channel [PDF]
We consider the problem of secure communications over the two-way wiretap channel under a strong secrecy criterion. We improve existing results by developing an achievable region based on strategies that exploit both the interference at the eavesdropper ...
Matthieu R. Bloch +2 more
core +1 more source
Cooperative Jamming in MIMO ad-hoc networks [PDF]
In this work, we investigate cooperative jamming schemes for the transmission of confidential messages in ad-hoc networks. By letting mobile units (the helpers) in the vicinity of a legitimate receiver send out jamming signals while a transmitter communicates with the receiver, an environment that is hostile to any eavesdroppers can be established ...
Jianqi Wang, A. Lee Swindlehurst
openaire +1 more source
Secure Cooperative Transmission Against Jamming-Aided Eavesdropper for ARQ Based Wireless Networks
Secure the cooperative transmission is studied for an automatic repeat request (ARQ)-based wireless network against a jamming-aided eavesdropper.
Dawei Wang +4 more
doaj +1 more source
Cooperative Awareness in Cognitive Wireless Networks for Jamming Control
In cognitive wireless networks, opportunistic network devices can be programmed to take advantage of licence holders' idle times and dynamically adjust their operating parameters to improve transmissions. For this to be successful, these idle periods must be reliably detected.
Mendes, Andre C. +2 more
openaire +2 more sources
Cooperative secure transmission against collusive eavesdroppers in Internet of Things
As Internet of Things (IoT) has boomed in recent years, many security issues have also been exposed. Focusing on physical layer security in wireless Internet of Things network communication, a series of security methods have been widely studied ...
Xin Fan, Yan Huo
doaj +1 more source
Common security issues and challenges in wireless sensor networks and IEEE 802.11 wireless mesh networks [PDF]
Both Wireless Mesh Network (WMN) and Wireless Sensor Network (WSN) are multi-hop wireless networks. WMN is an emerging community based integrated broadband wireless network which ensures high bandwidth ubiquitous internet provision to users, while, WSN ...
Loo, KK, Naeem, T
core +1 more source
GCI Fusion-Based Anti-Deception Jamming Algorithm for Distributed Radar [PDF]
Aiming at the anti-jamming problem of distributed radar against multiple false targets, an anti-jamming algorithm based on data level fusion is proposed. Firstly, the cardinalized probability hypothesis density (CPHD) filter based on random finite set is
Zhu Yongfeng, Da Kai, Yang Ye
doaj +1 more source
Robust Secure Transmission in MISO Channels Based on Worst-Case Optimization [PDF]
This paper studies robust transmission schemes for multiple-input single-output (MISO) wiretap channels. Both the cases of direct transmission and cooperative jamming with a helper are investigated with imperfect channel state information (CSI) for the ...
Huang, Jing, Swindlehurst, A. Lee
core +1 more source

