نتایج جستجو برای: based cooperative jamming

تعداد نتایج: 2985290  

Journal: :CoRR 2017
Hao Niu Yao Sun Kaoru Sezaki

The reliability and transmission distance are generally limited for the wireless communications due to the severe channel fading. As an effective way to resist the channel fading, cooperative relaying is usually adopted in wireless networks where neighbouring nodes act as relays to help the transmission between the source and the destination. Most research works simply regard these cooperative ...

2015
P. Sudha

In emerging network systems, such as e-healthcare and smart grids, have been drawing increasing attention in both industry and academia. The broadcast nature of wireless channels unavoidably exposes such applications to jamming attacks. However, existing methods to characterize and detect jamming attacks cannot be applied directly to time-critical networks, whose communication traffic model dif...

Journal: :EURASIP J. Adv. Sig. Proc. 2017
Wei Xiong Gong Zhang Wenbo Liu

Interrupted sampling repeater jamming (ISRJ) is an effective coherent jamming, which can induce false high-resolution range profile (HRRP) and image to greatly complicate the target detection and recognition of wideband radar. To counter ISRJ, an efficient filter is designed based on the time-frequency (TF) characteristic differences between target echo and ISRJ. Meanwhile, a feasible jamming s...

Journal: :IEEE Access 2021

In this paper, we propose secure relaying transmission protocols using rateless codes, where a source sends encoded packets to two intended destinations via help of intermediate relays. Employing non-orthogonal multiple access, can be sent the at same time. addition, partial relay selection methods are studied enhance reliability data first and second hops. For protecting source-relay relay-des...

2012
Yee Ming Chen Wen-Yuan Wu

In this paper, the issue of path planning is addressed for unmanned air vehicles (UAVs) cooperative joint-forces electronic attack operating in a hostile environment. Specifically, the objective is to plan path to a target location in a way that minimizes exposure to threats while keeping fuel usage at acceptable levels. We consider a scenario where a group of UAVs flies in a close formation an...

Journal: :Journal of Communications and Networks 2022

This paper considers a novel scenario, where physical layer security issue is studied in unmanned aerial vehicles (UAVs)-assisted cognitive relay system. A secondary vehicle (SUAV) delivers information from multiple Internet of things (IoT) devices to user (SU) under the spectrum sharing with primary users (PUs). In processing transmission SUAV relay, eavesdropper (SE) wiretaps transmitted by U...

2017
Weigang Liu

Motivated by recent developments in wireless communication, this thesis aims to characterize the secrecy performance in several types of typical wireless networks. Advanced techniques are designed and evaluated to enhance physical layer security in these networks with realistic assumptions, such as signal propagation loss, random node distribution and non-instantaneous channel state information...

2018
Hyoyoung Jung Jaewook Kang Tae Seok Lee Suil Kim Kiseon Kim

We consider a land mobile satellite communication system using spread spectrum techniques where the uplink is exposed to MT jamming attacks, and the downlink is corrupted by multi-path fading channels. We proposes an anti-jamming receiver, which exploits inherent low-dimensionality of the received signal model, by formulating a robust principal component analysis (Robust PCA)-based recovery pro...

Journal: :IEEE Transactions on Wireless Communications 2021

Energy-efficient design and secure communications are of crucial importance in wireless communication networks. However, the energy efficiency achieved by using physical layer security can be limited channel conditions. In order to tackle this problem, an intelligent reflecting surface (IRS) assisted multiple input single output (MISO) network with independent cooperative jamming is studied. Th...

Journal: :Wireless Networks 2011
Hongbo Liu Zhenhua Liu Yingying Chen Wenyuan Xu

Wireless communication is susceptible to radio interference and jamming attacks, which prevent the reception of communications. Most existing anti-jamming work does not consider the location information of radio interferers and jammers. However, this information can provide important insights for networks to manage its resource in different layers and to defend against radio interference. In th...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید