Results 231 to 240 of about 15,405 (257)
Some of the next articles are maybe not open access.
Optimal cooperative jamming for security
2011 - MILCOM 2011 Military Communications Conference, 2011In this paper, based on a cooperative jamming scheme, the design of the optimal covariance matrix of the artificial noise produced by a helper that maximizes the secret rate between a source and legitimate destination pair in the presence of multiple eavesdroppers is addressed.
null Han-Ting Chiang, James S. Lehnert
openaire +1 more source
LDPC-based coded cooperative jamming codes
2012 IEEE Information Theory Workshop, 2012We present a practical coded cooperative jamming scheme for the problem of secure communications over the two-way wiretap channel. We design low-density parity-check (LDPC) based codes whose codewords interfere at the eavesdropper's terminal, thus providing secrecy.
Alexandre J. Pierrot, Matthieu R. Bloch
openaire +1 more source
Uncoordinated Cooperative Jamming for Secret Communications
IEEE Transactions on Information Forensics and Security, 2013We consider a Gaussian wiretap channel model with a single-antenna source, destination and eavesdropper. The communication is assisted by multiple multiantenna helpers that transmit noise to confound the eavesdropper. First, we consider a nulling scheme, in which each helper independently transmits noise, designed to maximize the system secrecy rate ...
null Shuangyu Luo +2 more
openaire +1 more source
Cooperative Antijamming Relaying for Control Channel Jamming in Vehicular Networks
IEEE Transactions on Vehicular Technology, 2017Radio Frequency jamming attacks constitute a major threat to the availability of the vehicular networks. In particular, if the control channel is under persistent jamming attacks, the victim vehicles may fail to receive the safety related messages from the Road Side Unit, which can possibly cause tremendous economic loss and claim human lives.
Pengwenlong Gu +4 more
openaire +1 more source
Optimal Cooperative Relaying and Jamming for Secure Communication
IEEE Wireless Communications Letters, 2015This letter considers joint cooperative beamforming and jamming schemes in a cooperative relay network where distributed relay nodes perform cooperative beamforming. The problem of interest is to keep the eavesdropper’s signal to interference and noise ratio (SINR) as low as possible while maintaining the legitimate receiver’s SINR requirement ...
Alotaibi, Esa Rfaiay, Hamdi, Khairi
openaire +2 more sources
Cooperative Jamming Algorithm Based on Trust Update
2020 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), 2020To deal with the security challenges and optimize the system communication quality, this paper focuses on introducing the concept of social networks to improve the physical layer security of D2D networks. The paper transforms the social relationship between nodes into a trust relationship. The node who is communicating can use free trusted D2D users as
Weifeng Lu +3 more
openaire +1 more source
Controllable Positioning Service With UAV-Enabled Cooperative Jamming
IEEE Wireless Communications Letters, 2021Positioning services in cellular networks are at risk of being abused by unauthorized users, which may severely damage the interests of operators and legitimate users. In this letter, multiple unmanned aerial vehicles (UAVs) are employed as mobile jammers to disrupt the positioning services at unauthorized users, thereby enhancing the controllability ...
Zijie Wang +4 more
openaire +1 more source
Relay selection for optimized cooperative jamming scheme
2015 23rd European Signal Processing Conference (EUSIPCO), 2015In this paper, we study the problem of secure dualhop transmission in the presence of an eavesdropper, where a secrecy-enhanced relay selection as well as a destination cooperation are presented to prevent the source information from being eavesdropped.
Asma Mabrouk +2 more
openaire +1 more source
UAV-Aided Secure Communications With Cooperative Jamming
IEEE Transactions on Vehicular Technology, 2018This paper investigates unmanned aerial vehicle (UAV) enabled secure communication systems where a mobile UAV wishes to send confidential messages to multiple ground users. To improve the security performance, a cooperative UAV is additionally considered that transmits the jamming signal.
Hoon Lee +3 more
openaire +2 more sources
Cooperative Jamming for Secrecy of Wireless Communications
2018 International Conference on Networking and Network Applications (NaNA), 2018This paper explores cooperative jamming for security in wireless networks. No location data of eavesdropper is available, meanwhile no constraint on the figures of eavesdroppers is posited. A cooperative jamming approach is introduced for jamming the eavesdroppers any location in the system, even through the eavesdroppers are established quite adjacent
Baihe Ma +3 more
openaire +1 more source

