Results 21 to 30 of about 15,405 (257)
UAV-Enabled Cooperative Jamming for Covert Communications
This work employs an unmanned aerial vehicle (UAV) as a jammer to aid a covert communication from a transmitter Alice to a receiver Bob, where the UAV transmits artificial noise (AN) with random power to deliberately create interference to a warden Willie.
Rao, Hangmei +4 more
openaire +2 more sources
Secure Swarm UAV-Assisted Communications With Cooperative Friendly Jamming
This article proposes a cooperative friendly jamming framework for swarm unmanned aerial vehicle (UAV)-assisted amplify-and-forward (AF) relaying networks with wireless energy harvesting. Due to the limited energy of the UAVs, we develop a collaborative time-switching relaying protocol which allows the UAVs to collaborate to harvest wireless energy ...
Hanh Dang-Ngoc +6 more
openaire +2 more sources
Analysis of cooperative jamming against pulse compression radar based on CFAR
One important issue in radar jamming is the effect of inaccuracies in the radar position, which leads to a number of false targets entering the reference window of the constant false alarm ratio (CFAR) detector to reduce greatly.
Xiang Liu, Dongsheng Li
doaj +1 more source
Energy Efficient Secure Communication Model against Cooperative Eavesdropper
In a wiretap channel system model, the jammer node adopts the energy-harvesting signal as artificial noise (jamming signal) against the cooperative eavesdroppers.
Akashkumar Rajaram +3 more
doaj +1 more source
Vulnerability analysis of satellite-based synchronized smart grids monitoring systems [PDF]
The large-scale deployment of wide-area monitoring systems could play a strategic role in supporting the evolution of traditional power systems toward smarter and self-healing grids. The correct operation of these synchronized monitoring systems requires
Ahmed faheem Zobaa +19 more
core +1 more source
This paper investigates the cooperative anti-jamming distributed channel selection problem in UAV communication networks. Considering the existence of malicious jamming and co-channel interference, we design an interference-aware cooperative anti-jamming
Yifan Xu +5 more
doaj +1 more source
Strongly Secure Communications Over the Two-Way Wiretap Channel [PDF]
We consider the problem of secure communications over the two-way wiretap channel under a strong secrecy criterion. We improve existing results by developing an achievable region based on strategies that exploit both the interference at the eavesdropper ...
Matthieu R. Bloch +2 more
core +1 more source
Secure UAV Communication With Cooperative Jamming and Trajectory Control [PDF]
This paper presents a new cooperative jamming approach to secure the unmanned aerial vehicle (UAV) communication by leveraging jamming from other nearby UAVs to defend against the eavesdropping. In particular, we consider a two-UAV scenario when one UAV transmitter delivers the confidential information to a ground node (GN), and the other UAV jammer ...
Canhui Zhong, Jianping Yao, Jie Xu
openaire +2 more sources
This paper investigates physical layer security analysis of cooperative non-orthogonal multiple access (NOMA) communication system. A virtual full-duplex (VFD) relaying scheme with an untrusted amplify-and-forward (AF) half-duplex (HD) relay and a ...
Weidong Guo, Yuxi Liu
doaj +1 more source
Critical scaling for yield is independent from distance to isostaticity [PDF]
Using discrete element simulations, we demonstrate that critical behavior for yielding in soft disk and sphere packings is independent of distance to isostaticity over a wide range of dimensionless pressures.
Clark, Abram H., Thompson, Jacob D.
core +2 more sources

