Results 31 to 40 of about 15,405 (257)
A secure transmission method based on cooperative jamming for correlated main and wiretap channels
A secure transmission method was proposed based on cooperative jamming to reduce the secrecy loss caused by the correlation between main and wiretap channels and to improve the secrecy.Considering that the existing methods of cooperative jamming focused ...
Sai XU, Shuai HAN, Weixiao MENG
doaj +2 more sources
This paper addresses enhancing the physical layer security of a downlink non-orthogonal multiple access systems. The proposed scheme consists of a base station, multiple legitimate users, and an eavesdropper.
Yamen Alsaba +2 more
doaj +1 more source
Optimal distributed cooperative jamming resource allocation for multiāmissile threat scenario
Jamming resources allocation (JRA) is an essential task in clustered combat environments. Especially in cases with multiple threats, efficient JRA is imperative for protecting key assets.
Zhaodong Wu +3 more
doaj +1 more source
Stuck in Traffic (SiT) Attacks: A Framework for Identifying Stealthy Attacks that Cause Traffic Congestion [PDF]
Recent advances in wireless technologies have enabled many new applications in Intelligent Transportation Systems (ITS) such as collision avoidance, cooperative driving, congestion avoidance, and traffic optimization.
Atia, George, Guirguis, Mina
core +2 more sources
Secure Communication with a Wireless-Powered Friendly Jammer [PDF]
In this paper, we propose to use a wireless-powered friendly jammer to enable secure communication between a source node and destination node, in the presence of an eavesdropper. We consider a two-phase communication protocol with fixed-rate transmission.
Durrani, Salman +3 more
core +2 more sources
Physical layer security with uncoordinated helpers implementing cooperative jamming [PDF]
4 pages, 4 figures ...
Luo, Shuangyu +2 more
openaire +2 more sources
In this work, we investigate a practical secure multiple-input single-output (MISO) wireless transmission of information from a source to a destination assisted by cooperative devices. In the first phase, a space-time block code (STBC) is employed; thus,
Tianji Shen, Yuto Hama, Hideki Ochiai
doaj +1 more source
Cooperative Anti-jamming Method of Data Link Based on Adaptive Threshold [PDF]
In order to enhance the anti-jamming capability of data link in low Signal to Noise Ratio(SNR) environment,this paper improves the energy detection method based on invariable threshold and proposes an adaptive threshold anti-jamming method based on ...
YANG Mu,CHEN Changxing,LING Yunfei,LIN Xing,WANG Xiaodong
doaj +1 more source
Securing Downlink Non-Orthogonal Multiple Access Systems by Trusted Relays
A downlink single-input single-output non-orthogonal multiple access system is considered in which a base station (BS) is communicating with two legitimate users in the presence of an external eavesdropper.
Arafa, Ahmed +3 more
core +1 more source
Cooperative Secure Transmission by Exploiting Social Ties in Random Networks
Social awareness and social ties are becoming increasingly popular with emerging mobile and handheld devices. Social trust degree describing the strength of the social ties has drawn lots of research interests in many fields in wireless communications ...
Han, Z. +4 more
core +1 more source

