نتایج جستجو برای: based cooperative jamming
تعداد نتایج: 2985290 فیلتر نتایج به سال:
We explore the influence of cooperative jamming on covert communication for integrated satellite–terrestrial relay networks (ISTRN) in this article, where one full-duplex is utilized to support communications and acts as a jammer confuse eavesdroppers. A scheme first proposed efficiently achieve specific scenario. Further, probability detection error (PDE) derived. Subsequently, minimum PDE cal...
In this paper, we conduct a cross-layer analysis of both the jamming capability of the cognitiveradio-based jammers and the anti-jamming capability of the cognitive radio networks (CRN). We use a Markov chain to model the CRN operations in spectrum sensing, channel access and channel switching under jamming. With various jamming models, the jamming probabilities and the throughputs of the CRN a...
Aiming at studying the jamming methods of Link16 system, the anti-jamming techniques adopted by Link16 are studied and a simulation model is established in the paper. Based on the conventional static multi-tone interference which is used frequently at present, a new dynamic jamming method named Frequency Hopping Collision (FHC) interference is put forward. The features and jamming performance o...
Covert communication can hide the legitimate transmission from unauthorized eavesdropping. Benefiting deployment flexibility, unmanned aerial vehicles (UAVs) be utilized to enhance confidentiality. In this correspondence, we consider a covert network with aid of full-duplex UAV relay, which is employed help and confuse warden. The warden adopts radiometer detect transmission. We first find opti...
This paper investigates the secrecy performance of a power splitting-based simultaneous wireless information and transfer cooperative relay network in presence an eavesdropper. The is considered to operate full-duplex (FD) mode perform both energy harvesting decoding simultaneously. To accomplish that, assumed employ two rechargeable batteries, which switch between supplying charging at each tr...
Unmanned aerial vehicles (UAVs) are widely used in wireless communication networks due to their rapid deployment and high mobility. However, practical scenarios, the existence of obstacles eavesdroppers will seriously interfere with quality UAV network produce a security risk. Thus, this paper combines reconfigurable intelligent surface (RIS) technology UAVs build secure network. Normally, rota...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید