Results 61 to 70 of about 15,368 (178)

Cooperative Jamming and Relay Selection for Covert Communications

open access: yes, 2023
This paper investigates the covert communications via cooperative jamming and relay selection in a wireless relay system, where a source intends to transmit a message to its destination with the help of a selected relay, and a warden attempts to detect the existence of wireless transmissions from both the source and relay, while friendly jammers send ...
Gao, Chan   +4 more
openaire   +2 more sources

Intelligent Jamming Strategy for Wireless Communications Based on Game Theory

open access: yesIEEE Access
This paper explores the scenario that a jammer attacks an intelligent transmitter which can sense and adapt to the jamming environment. Given the non-cooperative relationship between the transmitter and the jammer, two main challenges are addressed in ...
Yongcheng Li   +3 more
doaj   +1 more source

On Maximizing the Secrecy Rate in a Cooperative Wireless Network using Friendly Jammers

open access: yesInternational Journal of Information and Communication Technology Research, 2016
In this paper, the security of two-phase relaying system with multiple intermediate nodes in the presence of a malicious eavesdropper is investigated.
Mohammad Hatami, Hamid Behroozi
doaj  

Asymptotically optimal cooperative jamming for physical layer security

open access: yesJournal of Communications and Networks, 2016
Design of effective cooperative jamming (CJ) algorithm is studied in this paper to maximize the achievable secrecy rate when the total transmit power of the source and multiple trusted terminals is constrained. Recently, the same problem was studied in [1] and an optimal algorithm was proposed involving a one-dimensional exhaustive searching.
Jun Yang   +5 more
openaire   +1 more source

Research Prospect of Anti-Jamming Strategy for the Satellite Internet

open access: yes天地一体化信息网络, 2022
As an important infrastructure of the national information system, the satellite internet is of great signifi cance to the national security.Thus, it needs to ensure the validity and reliability of the data transmission in the hostile jamming environment.
Chen HAN, Aijun LIU, Kang AN
doaj   +2 more sources

Research on adaptive scheduling strategy of cooperative jamming resources for the anti-netted radar system

open access: yesAIP Advances
Jamming resource allocation is an important step in implementing cooperative jamming. Traditional jamming resource allocation considers only the reduction of enemy radar detection performance but ignores the problem of mutual interference in the ...
A. Tianjian Yang   +4 more
doaj   +1 more source

Enhancing Resilience Against Jamming Attacks: A Cooperative Anti-Jamming Method Using Direction Estimation

open access: yesIEEE Transactions on Communications
The inherent vulnerability of wireless communication necessitates strategies to enhance its security, particularly in the face of jamming attacks. This paper uses the collaborations of multiple sensing nodes (SNs) in the wireless network to present a cooperative anti-jamming approach (CAJ) designed to neutralize the impact of jamming attacks.
Amir Mehrabian, Georges Kaddoum
openaire   +2 more sources

Joint optimization of beamforming and power allocation for DAJ‐based untrusted relay networks

open access: yesETRI Journal, 2018
Destination‐assisted jamming (DAJ) is usually used to protect confidential information against untrusted relays and eavesdroppers in wireless networks. In this paper, a DAJ‐based untrusted relay network with multiple antennas installed is presented.
Rugui Yao   +4 more
doaj   +1 more source

Legitimate Monitoring via Cooperative Relay and Proactive Jamming

open access: yesIEEE Access, 2019
With the development of communication technologies, many suspicious communication technologies have also been greatly improved. Therefore, one single monitor may not be able to afford in a monitoring process. In this paper, we propose a wireless communication system using two legitimate monitors for cooperative monitoring program, in which the signals ...
Min Zhu   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy