Results 1 to 10 of about 4,330 (158)
Proactive Eavesdropping via Jamming in NOMA Network [PDF]
Recently, non-orthogonal multiple access (NOMA) has been considered as a promising technique in 5G network, and many investigations have addressed on the physical layer security to improve the security performance.
Tung Pham Huu +4 more
doaj +2 more sources
Proactive eavesdropping in UAV-aided mobile relay systems [PDF]
This paper studies a new wireless surveillance scenario, where a legitimate monitor attempts to eavesdrop on the dubious messages forwarded by an unmanned aerial vehicle (UAV)-aided suspicious relay.
Haiquan Lu +4 more
doaj +2 more sources
Proactive Eavesdropping Performance for Integrated Satellite–Terrestrial Relay Networks
This work investigates the proactive eavesdropping based legitimate surveillance for integrated satellite-terrestrial relay networks with multiple proactive monitors.
Zheping Wu +6 more
doaj +2 more sources
With the emergence of advanced communication technologies such as infrastructure-free communication networks, the need for proactive eavesdropping which can constantly monitor and intervene in the communication network is growing.
Young-Jun Yoon +5 more
doaj +1 more source
Power and Location Optimization of Full-Duplex Relay for Proactive Eavesdropping Networks
This work investigates the proactive eavesdropping through a friendly full-duplex (FD) relay and a legitimate monitor over the wireless-powered suspicious communication network, where one suspect source performs energy harvesting (EH) from one dedicated ...
Rui Ma +4 more
doaj +1 more source
A novel approach to quality-of-service provisioning in trusted relay Quantum Key Distribution networks [PDF]
In recent years, noticeable progress has been made in the development of quantum equipment, reflected through the number of successful demonstrations of Quantum Key Distribution (QKD) technology. Although they showcase the great achievements of QKD, many
Fazio, Peppino +8 more
core +1 more source
Active eavesdropping detection: a novel physical layer security in wireless IoT
Considering the variety of Internet of Things (IoT) device types and access methods, it remains necessary to address the security challenges we currently encounter.
Mingfang Li, Zheng Dou
doaj +1 more source
This paper investigates a three‐node proactive eavesdropping system with the aid of intelligent reflecting surface (IRS), where a monitor tries to wiretap information and transmit jamming signals simultaneously to interfere with the suspicious link.
Jie Yang +3 more
doaj +1 more source
Security Threats and Mitigation Techniques in UAV Communications: A Comprehensive Survey
Unmanned aerial vehicles (UAVs) have been instrumental in enabling many new applications and services, including military and rescue operations, aerial surveillance, civilian applications, precision farming, as well as providing extensive wireless ...
Gaurav Kumar Pandey +3 more
doaj +1 more source
Spectrum sharing security and attacks in CRNs: a review [PDF]
Cognitive Radio plays a major part in communication technology by resolving the shortage of the spectrum through usage of dynamic spectrum access and artificial intelligence characteristics.
Alhakami, Wajdi +2 more
core +3 more sources

