نتایج جستجو برای: based cooperative jamming
تعداد نتایج: 2985290 فیلتر نتایج به سال:
The reliability and transmission distance are generally limited for the wireless communications due to the severe channel fading. As an effective way to resist the channel fading, cooperative relaying is usually adopted in wireless networks where neighbouring nodes act as relays to help the transmission between the source and the destination. Most research works simply regard these cooperative ...
In emerging network systems, such as e-healthcare and smart grids, have been drawing increasing attention in both industry and academia. The broadcast nature of wireless channels unavoidably exposes such applications to jamming attacks. However, existing methods to characterize and detect jamming attacks cannot be applied directly to time-critical networks, whose communication traffic model dif...
Interrupted sampling repeater jamming (ISRJ) is an effective coherent jamming, which can induce false high-resolution range profile (HRRP) and image to greatly complicate the target detection and recognition of wideband radar. To counter ISRJ, an efficient filter is designed based on the time-frequency (TF) characteristic differences between target echo and ISRJ. Meanwhile, a feasible jamming s...
In this paper, we propose secure relaying transmission protocols using rateless codes, where a source sends encoded packets to two intended destinations via help of intermediate relays. Employing non-orthogonal multiple access, can be sent the at same time. addition, partial relay selection methods are studied enhance reliability data first and second hops. For protecting source-relay relay-des...
In this paper, the issue of path planning is addressed for unmanned air vehicles (UAVs) cooperative joint-forces electronic attack operating in a hostile environment. Specifically, the objective is to plan path to a target location in a way that minimizes exposure to threats while keeping fuel usage at acceptable levels. We consider a scenario where a group of UAVs flies in a close formation an...
This paper considers a novel scenario, where physical layer security issue is studied in unmanned aerial vehicles (UAVs)-assisted cognitive relay system. A secondary vehicle (SUAV) delivers information from multiple Internet of things (IoT) devices to user (SU) under the spectrum sharing with primary users (PUs). In processing transmission SUAV relay, eavesdropper (SE) wiretaps transmitted by U...
Motivated by recent developments in wireless communication, this thesis aims to characterize the secrecy performance in several types of typical wireless networks. Advanced techniques are designed and evaluated to enhance physical layer security in these networks with realistic assumptions, such as signal propagation loss, random node distribution and non-instantaneous channel state information...
We consider a land mobile satellite communication system using spread spectrum techniques where the uplink is exposed to MT jamming attacks, and the downlink is corrupted by multi-path fading channels. We proposes an anti-jamming receiver, which exploits inherent low-dimensionality of the received signal model, by formulating a robust principal component analysis (Robust PCA)-based recovery pro...
Energy-efficient design and secure communications are of crucial importance in wireless communication networks. However, the energy efficiency achieved by using physical layer security can be limited channel conditions. In order to tackle this problem, an intelligent reflecting surface (IRS) assisted multiple input single output (MISO) network with independent cooperative jamming is studied. Th...
Wireless communication is susceptible to radio interference and jamming attacks, which prevent the reception of communications. Most existing anti-jamming work does not consider the location information of radio interferers and jammers. However, this information can provide important insights for networks to manage its resource in different layers and to defend against radio interference. In th...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید