Results 51 to 60 of about 15,368 (178)

Joint beamforming and cooperative jamming for secure transmission in multi-antenna decode-and-forward relaying sensor networks: A greedy switching strategy

open access: yesInternational Journal of Distributed Sensor Networks, 2017
In wireless sensor networks, sensor nodes are deployed to collect data and deliver the sensed information to a base station in a wireless manner. Due to the broadcast nature of wireless sensor communications, relay-sensor-based secure transmission ...
Zhi Lin   +6 more
doaj   +1 more source

Performance Metric Analysis for a Jamming Detection Mechanism under Collaborative and Cooperative Schemes in Industrial Wireless Sensor Networks

open access: yesSensors, 2021
The emergence of Industry 4.0 technologies, such as the Internet of Things (IoT) and Wireless Sensor Networks (WSN), has prompted a reconsideration of methodologies for network security as well as reducing operation and maintenance costs, especially at ...
Alejandro Cortés-Leal   +4 more
doaj   +1 more source

Jamming Transition of Point-to-Point Traffic Through Cooperative Mechanisms

open access: yes, 2012
We study the jamming transition of two-dimensional point-to-point traffic through cooperative mechanisms using computer simulation. We propose two decentralized cooperative mechanisms which are incorporated into the point-to-point traffic models ...
Huang D.   +5 more
core   +1 more source

A cooperative jamming decision-making method based on multi-agent reinforcement learning

open access: yesAutonomous Intelligent Systems
Electromagnetic jamming is a critical countermeasure in defense interception scenarios. This paper addresses the complex electromagnetic game involving multiple active jammers and radar systems by proposing a multi-agent reinforcement learning-based ...
Bingchen Cai   +4 more
doaj   +1 more source

Full-pulse Multi-jammer Cooperative Jamming Method for Active-passive Radar Composite Detection

open access: yesLeida xuebao
In an increasingly complex electromagnetic environment, the composite detection of active-passive radar, with its excellent complementary advantages, has become an important working mode for enhancing the combat capability and anti-interference ...
Wen JIANG   +6 more
doaj   +1 more source

Adsorption of a binary mixture of monomers with nearest-neighbour cooperative effects

open access: yes, 2005
A model for the adsorption of a binary mixture on a one-dimensional infinite lattice with nearest neighbour cooperative effects is considered. The particles of the two species are both monomers but differ in the repulsive interaction experienced by them ...
A Prados   +4 more
core   +1 more source

Cooperative Jamming Resource Allocation with Joint Multi-Domain Information Using Evolutionary Reinforcement Learning

open access: yesRemote Sensing
Addressing the formidable challenges posed by multiple jammers jamming multiple radars, which arise from spatial discretization, many degrees of freedom, numerous model input parameters, and the complexity of constraints, along with a multi-peaked ...
Qi Xin, Zengxian Xin, Tao Chen
doaj   +1 more source

Based on virtual beamforming cooperative jamming with Stackelberg game for physical layer security in the heterogeneous wireless network

open access: yesEURASIP Journal on Wireless Communications and Networking, 2018
The physical layer security technology is a technical scheme developed in recent years to solve the problem of information security transmission in wireless communication networks.
Shuanglin Huang, Li Zhu, Sanjun Liu
doaj   +1 more source

Correlated Jamming in a Joint Source Channel Communication System

open access: yes, 2014
We study correlated jamming in joint source-channel communication systems. An i.i.d. source is to be communicated over a memoryless channel in the presence of a correlated jammer with non-causal knowledge of user transmission.
Budkuley, Amitalok J.   +2 more
core   +1 more source

Physical-Layer Security Against Smart Eavesdroppers: Exploiting Full-Duplex Receivers

open access: yesIEEE Access, 2018
As many security solutions integrated with various technologies have been proposed against eavesdropping attacks, technical advances for adversaries can also pose a serious security threat. This paper considers a problem of smart eavesdropping attacks on
Jongyeop Kim   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy