Results 1 to 10 of about 4,330 (158)

Proactive Eavesdropping via Jamming in NOMA Network [PDF]

open access: yesIEEE Access, 2021
Recently, non-orthogonal multiple access (NOMA) has been considered as a promising technique in 5G network, and many investigations have addressed on the physical layer security to improve the security performance.
Tung Pham Huu   +4 more
doaj   +2 more sources

Proactive eavesdropping in UAV-aided mobile relay systems [PDF]

open access: yesEURASIP Journal on Wireless Communications and Networking, 2020
This paper studies a new wireless surveillance scenario, where a legitimate monitor attempts to eavesdrop on the dubious messages forwarded by an unmanned aerial vehicle (UAV)-aided suspicious relay.
Haiquan Lu   +4 more
doaj   +2 more sources

Proactive Eavesdropping Performance for Integrated Satellite–Terrestrial Relay Networks

open access: yesIEEE Open Journal of the Communications Society, 2023
This work investigates the proactive eavesdropping based legitimate surveillance for integrated satellite-terrestrial relay networks with multiple proactive monitors.
Zheping Wu   +6 more
doaj   +2 more sources

Proactive Eavesdropping With Adaptive Full-Duplex Jamming-Helping Method for Infrastructure-Free Relay Networks

open access: yesIEEE Access, 2023
With the emergence of advanced communication technologies such as infrastructure-free communication networks, the need for proactive eavesdropping which can constantly monitor and intervene in the communication network is growing.
Young-Jun Yoon   +5 more
doaj   +1 more source

Power and Location Optimization of Full-Duplex Relay for Proactive Eavesdropping Networks

open access: yesIEEE Access, 2020
This work investigates the proactive eavesdropping through a friendly full-duplex (FD) relay and a legitimate monitor over the wireless-powered suspicious communication network, where one suspect source performs energy harvesting (EH) from one dedicated ...
Rui Ma   +4 more
doaj   +1 more source

A novel approach to quality-of-service provisioning in trusted relay Quantum Key Distribution networks [PDF]

open access: yes, 2020
In recent years, noticeable progress has been made in the development of quantum equipment, reflected through the number of successful demonstrations of Quantum Key Distribution (QKD) technology. Although they showcase the great achievements of QKD, many
Fazio, Peppino   +8 more
core   +1 more source

Active eavesdropping detection: a novel physical layer security in wireless IoT

open access: yesEURASIP Journal on Advances in Signal Processing, 2023
Considering the variety of Internet of Things (IoT) device types and access methods, it remains necessary to address the security challenges we currently encounter.
Mingfang Li, Zheng Dou
doaj   +1 more source

Joint active and passive beamforming optimization for intelligent reflecting surface assisted proactive eavesdropping

open access: yesIET Communications, 2021
This paper investigates a three‐node proactive eavesdropping system with the aid of intelligent reflecting surface (IRS), where a monitor tries to wiretap information and transmit jamming signals simultaneously to interfere with the suspicious link.
Jie Yang   +3 more
doaj   +1 more source

Security Threats and Mitigation Techniques in UAV Communications: A Comprehensive Survey

open access: yesIEEE Access, 2022
Unmanned aerial vehicles (UAVs) have been instrumental in enabling many new applications and services, including military and rescue operations, aerial surveillance, civilian applications, precision farming, as well as providing extensive wireless ...
Gaurav Kumar Pandey   +3 more
doaj   +1 more source

Spectrum sharing security and attacks in CRNs: a review [PDF]

open access: yes, 2014
Cognitive Radio plays a major part in communication technology by resolving the shortage of the spectrum through usage of dynamic spectrum access and artificial intelligence characteristics.
Alhakami, Wajdi   +2 more
core   +3 more sources

Home - About - Disclaimer - Privacy