نتایج جستجو برای: destination based cooperative jamming

تعداد نتایج: 2998241  

Journal: :IEEE Access 2022

This paper investigates the secrecy performance of a power splitting-based simultaneous wireless information and transfer cooperative relay network in presence an eavesdropper. The is considered to operate full-duplex (FD) mode perform both energy harvesting decoding simultaneously. To accomplish that, assumed employ two rechargeable batteries, which switch between supplying charging at each tr...

Journal: :Iet Communications 2022

Unmanned aerial vehicles (UAVs) are widely used in wireless communication networks due to their rapid deployment and high mobility. However, practical scenarios, the existence of obstacles eavesdroppers will seriously interfere with quality UAV network produce a security risk. Thus, this paper combines reconfigurable intelligent surface (RIS) technology UAVs build secure network. Normally, rota...

2013
Shaoqing Wang Leiming Zhang Yuwu Yan Nan Fang Zhuang Jia

In wireless relaying networks, the traditional incremental cooperative relaying scheme (IR) could improve the system throughput enormously over fading channels by exploiting relay nodes to retransmit the source data packet to the destination. In order to enhance the system throughput over time-varying fading channels, this paper proposes an adaptive incremental cooperative relaying scheme (AIR)...

Journal: :Tsinghua Science & Technology 2021

In this paper, we design a friendly jammer selection scheme for the social Internet of Things (IoT). A typical IoT is composed cellular network with underlaying Device-to-Device (D2D) communications. our scheme, consider signal characteristics over physical layer and attribute information an application simultaneously. Using characteristics, one D2D gadgets selected as to improve secrecy perfor...

Journal: :International Journal of Distributed Sensor Networks 2019

Journal: :Inf. Comput. 2013
Cagatay Capar Dennis Goeckel Kenneth G. Paterson Elizabeth A. Quaglia Donald F. Towsley Murtaza Zafer

Security protocols operating over wireless channels can incur significant communication costs (e.g., energy, delay), especially under adversarial attacks unique to the wireless environment such as signal jamming, fake signal transmission, etc. Since wireless devices are resource constrained, it is important to optimize security protocols for wireless environments by taking into account their co...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید