نتایج جستجو برای: based cooperative jamming

تعداد نتایج: 2985290  

Journal: :CoRR 2013
Yuanyu Zhang Yulong Shen Hua Wang Xiaohong Jiang

Two-hop wireless network serves as the basic network model for the study of general wireless networks, while cooperative jamming is a promising scheme to achieve the physical layer security. This paper establishes a theoretical framework for the study of eavesdropper-tolerance capability (i.e., the exact maximum number of eavesdroppers that can be tolerated) in a two-hop wireless network, where...

2016
Zhen Li Tao Jing Liran Ma Yan Huo Jin Qian

The Internet of Things (IoT) is a significant branch of the ongoing advances in the Internet and mobile communications. The use of a large number of IoT devices makes the spectrum scarcity problem even more serious. The usable spectrum resources are almost entirely occupied, and thus, the increasing radio access demands of IoT devices cannot be met. To tackle this problem, the Cognitive Interne...

2015
K. Thiagarajan A. Veeraiah

This paper checks the correctness of our novel algorithm for secure, reliable and flexible transmission of big data in two-hop wireless networks using cooperative jamming scheme of attacker location unknown through Markovian process. Big data has to transmit in two-hop from source-to-relay and relay-to-destination node by deploying security in physical layer. Based on our novel algorithm, the n...

Journal: :CoRR 2017
Liang Xiao Guoan Han Donghua Jiang Hongzi Zhu Yanyong Zhang H. Vincent Poor

By using smart radio devices, a jammer can dynamically change its jamming policy based on opposing security mechanisms; it can even induce the mobile device to enter a specific communication mode and then launch the jamming policy accordingly. On the other hand, mobile devices can exploit spread spectrum and user mobility to address both jamming and interference. In this paper, a two-dimensiona...

Journal: :EURASIP Journal on Advances in Signal Processing 2018

Journal: :CoRR 2018
Fuhui Zhou Zheng Chu Haijian Sun Victor C. M. Leung

Cognitive radio (CR) and non-orthogonal multiple access (NOMA) are two promising technologies in the next generation wireless communication systems. The security of a NOMA CR network (CRN) is important but lacks of study. In this paper, a multiple-input single-output NOMA CRN relying on simultaneous wireless information and power transfer is studied. In order to improve the security of both the...

2015
Shuanglin HUANG Jianjun TAN

We employed node cooperation in a cooperative wireless network to achieve physical layerbased security. The case of a source-destination pair that works with the assistance of multiple cooperating nodes in the presence of an eavesdropper was considered in this study to improve the performance of secure wireless communications. A novel cooperative scheme, called the decode-and-forward plus coope...

Journal: :JACIC 2007
Mo Wei Genshe Chen Jose B. Cruz Leonard Haynes Khanh D. Pham Erik Blasch

Existing pursuer-evader (PE) game algorithms do not provide good real-time solutions for situations with the following complexities: (1) multi-pursuer multi-evader, (2) multiple evaders with superior control resources such as higher speeds, and (3) jamming confrontation between pursuers and evaders. This paper introduces a real-time decentralized approach, in which decentralization strategy red...

Journal: :IEEE Transactions on Vehicular Technology 2023

In this paper, the position control of multiple unmanned aerial vehicles, acting as cooperative jammers, is proposed to improve security level a legitimate ground transmission, where precoder designed nullify jamming signals at receiver. scenario, maximization weighted secrecy coverage, which measures efficiency over confined region, addressed by following multi armed bandit-based algorithm. Th...

2014
Zheng Wang Jingling Zhang Sheng-yong Chen

The cooperative game of global temperature lacks automaticity and emotional jamming. To solve this issue, an agent-based modelling method is developed based on Milinski’s noncooperative game experiments. In addition, genetic algorithm is used to improve the investment strategy of each agent. Simulations are carried out by designing different coding schemes, mutation schemes, and fitness functio...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید