نتایج جستجو برای: destination based cooperative jamming

تعداد نتایج: 2998241  

Journal: :CoRR 2013
Yuanyu Zhang Yulong Shen Hua Wang Xiaohong Jiang

Two-hop wireless network serves as the basic network model for the study of general wireless networks, while cooperative jamming is a promising scheme to achieve the physical layer security. This paper establishes a theoretical framework for the study of eavesdropper-tolerance capability (i.e., the exact maximum number of eavesdroppers that can be tolerated) in a two-hop wireless network, where...

2016
Yuling Zhang Qiuming Ma Gaohuan Lv

In this study, we propose a cooperative transmission framework based on Adaptive Modulation and Coding (AMC) cooperative food communication system in Multiple-Input Multiple-Output (MIMO) fading channels. We consider the scenario that consists of one source node, one relay node and one destination node, they all equipped with multiple antennas and employed the adaptive modulation and coding sch...

2016
Zhen Li Tao Jing Liran Ma Yan Huo Jin Qian

The Internet of Things (IoT) is a significant branch of the ongoing advances in the Internet and mobile communications. The use of a large number of IoT devices makes the spectrum scarcity problem even more serious. The usable spectrum resources are almost entirely occupied, and thus, the increasing radio access demands of IoT devices cannot be met. To tackle this problem, the Cognitive Interne...

Journal: :CoRR 2017
Liang Xiao Guoan Han Donghua Jiang Hongzi Zhu Yanyong Zhang H. Vincent Poor

By using smart radio devices, a jammer can dynamically change its jamming policy based on opposing security mechanisms; it can even induce the mobile device to enter a specific communication mode and then launch the jamming policy accordingly. On the other hand, mobile devices can exploit spread spectrum and user mobility to address both jamming and interference. In this paper, a two-dimensiona...

Journal: :EURASIP Journal on Advances in Signal Processing 2018

2005
Najem Moussa

We develop a two-dimensional cellular automaton (CA) as a simple model for agents moving from origins to destinations. Each agent moves towards an empty neighbor site corresponding to the minimal distance to its destination. The stochasticity or noise (p) is introduced in the model dynamics, through the uncertainty in estimating the distance from the destination. The friction parameter ”μ” is a...

Journal: :CoRR 2018
Fuhui Zhou Zheng Chu Haijian Sun Victor C. M. Leung

Cognitive radio (CR) and non-orthogonal multiple access (NOMA) are two promising technologies in the next generation wireless communication systems. The security of a NOMA CR network (CRN) is important but lacks of study. In this paper, a multiple-input single-output NOMA CRN relying on simultaneous wireless information and power transfer is studied. In order to improve the security of both the...

Journal: :Iet Communications 2022

In view of the diverse jamming environment, single-level anti-jamming method faces some challenges such as poor timeliness, high cost and effect. this paper, routing delay, overhead diversified threats are comprehensively considered. addition, a cross-layer is proposed in scenario busy satellite Internet communication. The involves two levels: link-layer based on path repair network-layer recon...

In this paper, an unmanned aerial vehicle (UAV) assisted cooperative communication system is studied, wherein a source transmits information to the destination through an energy harvesting decode-and-forward UAV. It is assumed that the UAV can freely move in between the source-destination pair to set up line of sight communications with the both nodes. Since the battery of the UAV may be limite...

2017
Harsh Pratap Singh Rashmi Singh

Mobile ad hoc network (MANETs) is an infrastructure-less/self-configurable system in which every node carries on as host or router and every node can participate in the transmission of packets. Because of its dynamic behaviour such system is more susceptible against various sorts of security threats, for example, Black hole, Wormhole , Jamming , Sybil, Byzantine attack and so on which may block...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید