نتایج جستجو برای: destination based cooperative jamming
تعداد نتایج: 2998241 فیلتر نتایج به سال:
Two-hop wireless network serves as the basic network model for the study of general wireless networks, while cooperative jamming is a promising scheme to achieve the physical layer security. This paper establishes a theoretical framework for the study of eavesdropper-tolerance capability (i.e., the exact maximum number of eavesdroppers that can be tolerated) in a two-hop wireless network, where...
In this study, we propose a cooperative transmission framework based on Adaptive Modulation and Coding (AMC) cooperative food communication system in Multiple-Input Multiple-Output (MIMO) fading channels. We consider the scenario that consists of one source node, one relay node and one destination node, they all equipped with multiple antennas and employed the adaptive modulation and coding sch...
The Internet of Things (IoT) is a significant branch of the ongoing advances in the Internet and mobile communications. The use of a large number of IoT devices makes the spectrum scarcity problem even more serious. The usable spectrum resources are almost entirely occupied, and thus, the increasing radio access demands of IoT devices cannot be met. To tackle this problem, the Cognitive Interne...
By using smart radio devices, a jammer can dynamically change its jamming policy based on opposing security mechanisms; it can even induce the mobile device to enter a specific communication mode and then launch the jamming policy accordingly. On the other hand, mobile devices can exploit spread spectrum and user mobility to address both jamming and interference. In this paper, a two-dimensiona...
We develop a two-dimensional cellular automaton (CA) as a simple model for agents moving from origins to destinations. Each agent moves towards an empty neighbor site corresponding to the minimal distance to its destination. The stochasticity or noise (p) is introduced in the model dynamics, through the uncertainty in estimating the distance from the destination. The friction parameter ”μ” is a...
Cognitive radio (CR) and non-orthogonal multiple access (NOMA) are two promising technologies in the next generation wireless communication systems. The security of a NOMA CR network (CRN) is important but lacks of study. In this paper, a multiple-input single-output NOMA CRN relying on simultaneous wireless information and power transfer is studied. In order to improve the security of both the...
In view of the diverse jamming environment, single-level anti-jamming method faces some challenges such as poor timeliness, high cost and effect. this paper, routing delay, overhead diversified threats are comprehensively considered. addition, a cross-layer is proposed in scenario busy satellite Internet communication. The involves two levels: link-layer based on path repair network-layer recon...
In this paper, an unmanned aerial vehicle (UAV) assisted cooperative communication system is studied, wherein a source transmits information to the destination through an energy harvesting decode-and-forward UAV. It is assumed that the UAV can freely move in between the source-destination pair to set up line of sight communications with the both nodes. Since the battery of the UAV may be limite...
Mobile ad hoc network (MANETs) is an infrastructure-less/self-configurable system in which every node carries on as host or router and every node can participate in the transmission of packets. Because of its dynamic behaviour such system is more susceptible against various sorts of security threats, for example, Black hole, Wormhole , Jamming , Sybil, Byzantine attack and so on which may block...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید