Results 61 to 70 of about 15,368 (178)
Cooperative Jamming and Relay Selection for Covert Communications
This paper investigates the covert communications via cooperative jamming and relay selection in a wireless relay system, where a source intends to transmit a message to its destination with the help of a selected relay, and a warden attempts to detect the existence of wireless transmissions from both the source and relay, while friendly jammers send ...
Gao, Chan +4 more
openaire +2 more sources
Intelligent Jamming Strategy for Wireless Communications Based on Game Theory
This paper explores the scenario that a jammer attacks an intelligent transmitter which can sense and adapt to the jamming environment. Given the non-cooperative relationship between the transmitter and the jammer, two main challenges are addressed in ...
Yongcheng Li +3 more
doaj +1 more source
On Maximizing the Secrecy Rate in a Cooperative Wireless Network using Friendly Jammers
In this paper, the security of two-phase relaying system with multiple intermediate nodes in the presence of a malicious eavesdropper is investigated.
Mohammad Hatami, Hamid Behroozi
doaj
Asymptotically optimal cooperative jamming for physical layer security
Design of effective cooperative jamming (CJ) algorithm is studied in this paper to maximize the achievable secrecy rate when the total transmit power of the source and multiple trusted terminals is constrained. Recently, the same problem was studied in [1] and an optimal algorithm was proposed involving a one-dimensional exhaustive searching.
Jun Yang +5 more
openaire +1 more source
Secure communication in cooperative networks using cooperative jamming techniques
74
openaire +1 more source
Research Prospect of Anti-Jamming Strategy for the Satellite Internet
As an important infrastructure of the national information system, the satellite internet is of great signifi cance to the national security.Thus, it needs to ensure the validity and reliability of the data transmission in the hostile jamming environment.
Chen HAN, Aijun LIU, Kang AN
doaj +2 more sources
Jamming resource allocation is an important step in implementing cooperative jamming. Traditional jamming resource allocation considers only the reduction of enemy radar detection performance but ignores the problem of mutual interference in the ...
A. Tianjian Yang +4 more
doaj +1 more source
The inherent vulnerability of wireless communication necessitates strategies to enhance its security, particularly in the face of jamming attacks. This paper uses the collaborations of multiple sensing nodes (SNs) in the wireless network to present a cooperative anti-jamming approach (CAJ) designed to neutralize the impact of jamming attacks.
Amir Mehrabian, Georges Kaddoum
openaire +2 more sources
Joint optimization of beamforming and power allocation for DAJ‐based untrusted relay networks
Destination‐assisted jamming (DAJ) is usually used to protect confidential information against untrusted relays and eavesdroppers in wireless networks. In this paper, a DAJ‐based untrusted relay network with multiple antennas installed is presented.
Rugui Yao +4 more
doaj +1 more source
Legitimate Monitoring via Cooperative Relay and Proactive Jamming
With the development of communication technologies, many suspicious communication technologies have also been greatly improved. Therefore, one single monitor may not be able to afford in a monitoring process. In this paper, we propose a wireless communication system using two legitimate monitors for cooperative monitoring program, in which the signals ...
Min Zhu +3 more
openaire +2 more sources

