نتایج جستجو برای: destination based cooperative jamming
تعداد نتایج: 2998241 فیلتر نتایج به سال:
Network bandwidth denial of service (DoS) attacks seek to consume the available bandwidth or router resources at or near a target host or network, such that legitimate traffic cannot reach its destination. The primary means for achieving this goal by sending large traffic volumes (packet floods) that do not respect congestion control signals, such as that in the Transmission Control Protocol (T...
This article proposes a cooperative friendly jamming framework for swarm unmanned aerial vehicle (UAV)-assisted amplify-and-forward (AF) relaying networks with wireless energy harvesting. Due to the limited of UAVs, we develop collaborative time-switching protocol which allows UAVs collaborate harvest energy, relay information, and jam eavesdropper. To evaluate secrecy rate, derive outage proba...
Wireless ad hoc networks have been attracting more and more attentions in recent years from both academia and industry, because of their low deployment costs and broad applications. Due to the scarcity of the radio spectrum, supporting concurrent transmissions by exploiting the spatial frequency reuse gain is necessary to enhance spectrum utilization. On the other hand, cooperative communicatio...
In this paper, the secrecy performance of the two-user simultaneous wireless information and power transfer (SWIPT) sensor networks is studied and a novel secure transmission scheme of cooperative zero-forcing (ZF) jamming is proposed. The two sensors opportunistically conduct the SWIPT and cooperative ZF jamming, respectively, where the energy required for jamming the eavesdropper is provided ...
An incremental relaying protocol based on the adaptive decode-and-forward relaying scheme is presented for a cooperative wireless network with binary frequency-shift keying modulation. To reduce error propagation and satisfy biterror-rate (BER) requirement, the proposed protocol employs two thresholds. One threshold is used to select reliable relays: if a relay is requested to re-trnsmit, it wi...
The growth of wireless networks has been considerable over the last decades. Due to the broadcast nature of these networks, security issues have taken a critical role in today’s communications. A promising direction towards achieving secure communications is information theoretic secrecy, which is an approach exploiting the randomness of the channels to ensure secrecy. Based on this approach, t...
This paper studies the stability of remotely controlled and observed single-input controllable linear systems under power-constrained Pulse-Width Modulated (PWM) Denial-of-Service (DoS) signals. The effect of a DoS jamming signal is to corrupt the communication channels, thus preventing the data to be received at its destination. In this work, we first assume that the DoS signal is partially kn...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید