Results 31 to 40 of about 15,405 (257)

A secure transmission method based on cooperative jamming for correlated main and wiretap channels

open access: yesDianxin kexue, 2021
A secure transmission method was proposed based on cooperative jamming to reduce the secrecy loss caused by the correlation between main and wiretap channels and to improve the secrecy.Considering that the existing methods of cooperative jamming focused ...
Sai XU, Shuai HAN, Weixiao MENG
doaj   +2 more sources

Null-Steering Beamforming for Enhancing the Physical Layer Security of Non-Orthogonal Multiple Access System

open access: yesIEEE Access, 2019
This paper addresses enhancing the physical layer security of a downlink non-orthogonal multiple access systems. The proposed scheme consists of a base station, multiple legitimate users, and an eavesdropper.
Yamen Alsaba   +2 more
doaj   +1 more source

Optimal distributed cooperative jamming resource allocation for multi‐missile threat scenario

open access: yesIET Radar, Sonar & Navigation, 2022
Jamming resources allocation (JRA) is an essential task in clustered combat environments. Especially in cases with multiple threats, efficient JRA is imperative for protecting key assets.
Zhaodong Wu   +3 more
doaj   +1 more source

Stuck in Traffic (SiT) Attacks: A Framework for Identifying Stealthy Attacks that Cause Traffic Congestion [PDF]

open access: yes, 2012
Recent advances in wireless technologies have enabled many new applications in Intelligent Transportation Systems (ITS) such as collision avoidance, cooperative driving, congestion avoidance, and traffic optimization.
Atia, George, Guirguis, Mina
core   +2 more sources

Secure Communication with a Wireless-Powered Friendly Jammer [PDF]

open access: yes, 2014
In this paper, we propose to use a wireless-powered friendly jammer to enable secure communication between a source node and destination node, in the presence of an eavesdropper. We consider a two-phase communication protocol with fixed-rate transmission.
Durrani, Salman   +3 more
core   +2 more sources

Physical layer security with uncoordinated helpers implementing cooperative jamming [PDF]

open access: yes2012 IEEE 7th Sensor Array and Multichannel Signal Processing Workshop (SAM), 2012
4 pages, 4 figures ...
Luo, Shuangyu   +2 more
openaire   +2 more sources

STBC-Enabled Secure Wireless Transmission With Cooperative Devices Under Imperfect CSI of Destination

open access: yesIEEE Access, 2023
In this work, we investigate a practical secure multiple-input single-output (MISO) wireless transmission of information from a source to a destination assisted by cooperative devices. In the first phase, a space-time block code (STBC) is employed; thus,
Tianji Shen, Yuto Hama, Hideki Ochiai
doaj   +1 more source

Cooperative Anti-jamming Method of Data Link Based on Adaptive Threshold [PDF]

open access: yesJisuanji gongcheng, 2018
In order to enhance the anti-jamming capability of data link in low Signal to Noise Ratio(SNR) environment,this paper improves the energy detection method based on invariable threshold and proposes an adaptive threshold anti-jamming method based on ...
YANG Mu,CHEN Changxing,LING Yunfei,LIN Xing,WANG Xiaodong
doaj   +1 more source

Securing Downlink Non-Orthogonal Multiple Access Systems by Trusted Relays

open access: yes, 2018
A downlink single-input single-output non-orthogonal multiple access system is considered in which a base station (BS) is communicating with two legitimate users in the presence of an external eavesdropper.
Arafa, Ahmed   +3 more
core   +1 more source

Cooperative Secure Transmission by Exploiting Social Ties in Random Networks

open access: yes, 2018
Social awareness and social ties are becoming increasingly popular with emerging mobile and handheld devices. Social trust degree describing the strength of the social ties has drawn lots of research interests in many fields in wireless communications ...
Han, Z.   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy