Academic literature on the topic 'Cooperative jamming'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cooperative jamming.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Cooperative jamming"

1

Xu, Yifan, Guochun Ren, Jin Chen, Xiaobo Zhang, Luliang Jia, and Lijun Kong. "Interference-Aware Cooperative Anti-Jamming Distributed Channel Selection in UAV Communication Networks." Applied Sciences 8, no. 10 (October 14, 2018): 1911. http://dx.doi.org/10.3390/app8101911.

Full text
Abstract:
This paper investigates the cooperative anti-jamming distributed channel selection problem in UAV communication networks. Considering the existence of malicious jamming and co-channel interference, we design an interference-aware cooperative anti-jamming scheme for the purpose of maximizing users’ utilities. Moreover, the channel switching cost and cooperation cost are introduced, which have a great impact on users’ utilities. Users in the UAV group sense the co-channel interference signal energy to judge whether they are influenced by co-channel interference. When the received co-channel interference signal energy is lower than the co-channel interference threshold, users conduct channel selection strategies independently. Otherwise, users cooperate with each other and take joint actions with a cooperative anti-jamming pattern under the impact of co-channel interference. Aiming at the independent anti-jamming channel selection problem under no co-channel interference, a Markov decision process framework is introduced, whereas for the cooperative anti-jamming channel selection case under the influence of co-channel mutual interference, a Markov game framework is employed. Furthermore, motivated by Q-learning with a “cooperation-decision-feedback-adjustment” idea, we design an interference-aware cooperative anti-jamming distributed channel selection algorithm (ICADCSA) to obtain the optimal anti-jamming channel strategies for users in a distributed way. In addition, a discussion on the quick decision for UAVs is conducted. Finally, simulation results show that the proposed algorithm converges to a stable solution with which the UAV group can avoid malicious jamming, as well as co-channel interference effectively and can realize a quick decision in high mobility UAV communication networks.
APA, Harvard, Vancouver, ISO, and other styles
2

Fan, Xin, and Yan Huo. "Cooperative secure transmission against collusive eavesdroppers in Internet of Things." International Journal of Distributed Sensor Networks 16, no. 6 (June 2020): 155014772093346. http://dx.doi.org/10.1177/1550147720933464.

Full text
Abstract:
As Internet of Things (IoT) has boomed in recent years, many security issues have also been exposed. Focusing on physical layer security in wireless Internet of Things network communication, a series of security methods have been widely studied. Nevertheless, cooperative jamming methods in physical layer security to fight against collusive eavesdroppers have not been thoroughly studied yet. In this article, we study a cooperative-jamming-based physical layer secure transmission scheme for Internet of Things wireless networks in the presence of collusive eavesdroppers. We design a cooperative jamming strategy without knowing the channel state information of eavesdroppers. Considering the cooperation of multiple nodes with multiple antennas, this strategy can maximize the signal-to-interference-plus-noise ratio at an actuator (legitimate receiver). Meanwhile, the generated cooperative jamming signals can reduce the signal-to-interference-plus-noise ratio at eavesdroppers. To explore the theoretical security performance of our strategy, we perform a secrecy outage probability analysis and an asymptotic analysis. In the cases of cooperative jamming and without cooperative jamming, the closed-form expressions of the secrecy outage probability are deduced, and the influence of system parameters on the secrecy outage probability becomes more intuitive through a strict mathematical asymptotic behavior analysis. In addition, considering the energy limitation of Internet of Things devices, we propose a power allocation algorithm to minimize the total transmission power given the security requirements. The numerical results show the effectiveness of our schemes and are consistent with the theoretical analysis.
APA, Harvard, Vancouver, ISO, and other styles
3

Rajaram, Akashkumar, Dushnatha Nalin K. Jayakody, Rui Dinis, and Marko Beko. "Energy Efficient Secure Communication Model against Cooperative Eavesdropper." Applied Sciences 11, no. 4 (February 9, 2021): 1563. http://dx.doi.org/10.3390/app11041563.

Full text
Abstract:
In a wiretap channel system model, the jammer node adopts the energy-harvesting signal as artificial noise (jamming signal) against the cooperative eavesdroppers. There are two eavesdroppers in the wiretap channel: eavesdropper E1 is located near the transmitter and eavesdropper E2 is located near the jammer. The eavesdroppers are equipped with multiple antennas and employ the iterative block decision feedback equalization decoder to estimate the received signal, i.e., information signal at E1 and jamming signal at E2. It is assumed that E1 has the channel state information (CSI) of the channel between transmitter and E1, and similarly, E2 has the CSI of channel between jammer and E2. The eavesdroppers establish communication link between them and cooperate with each other to reduce the information signal interference at E2 and jamming signal interference at E1. The performance of decoders depends on the signal to interference plus noise ratio (SINR) of the received signal. The power of information signal is fixed and the power of the jamming signal is adjusted to improve the SINR of the received signal. This research work is solely focused on optimizing the jamming signal power to degrade the performance of cooperative eavesdroppers. The jamming signal power is optimized for the given operating SINR with the support of simulated results. The jamming signal power optimization leads to better energy conservation and degrades the performance of eavesdroppers.
APA, Harvard, Vancouver, ISO, and other styles
4

Wu, Yuandong, and Yan Huo. "A Survey of Cooperative Jamming-Based Secure Transmission for Energy-Limited Systems." Wireless Communications and Mobile Computing 2021 (January 15, 2021): 1–11. http://dx.doi.org/10.1155/2021/6638405.

Full text
Abstract:
Considering the ongoing development of various devices and rich applications in intelligent Internet of Things (IoT) systems, it is a crucial issue to solve secure transmission of legitimate signals for massive data sharing in the systems. Cooperative jamming-based physical layer security is explored to be a complement of conventional cryptographic schemes to protect private information. Yet, this method needs to solve a game between energy consumption and signal secure transmission. In this paper, we summarize the basics of cooperative jamming and universal security metrics. Using the metrics, we study a series of typical cooperative jamming strategies from two aspects, including power allocation and energy harvesting. Finally, we propose open issues and challenges of further works on cooperative jamming in an IoT system with energy constraints.
APA, Harvard, Vancouver, ISO, and other styles
5

Shuangyu Luo, Jiangyuan Li, and A. P. Petropulu. "Uncoordinated Cooperative Jamming for Secret Communications." IEEE Transactions on Information Forensics and Security 8, no. 7 (July 2013): 1081–90. http://dx.doi.org/10.1109/tifs.2013.2261060.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ye, Fang, Fei Che, and Lipeng Gao. "Multiobjective Cognitive Cooperative Jamming Decision-Making Method Based on Tabu Search-Artificial Bee Colony Algorithm." International Journal of Aerospace Engineering 2018 (December 9, 2018): 1–10. http://dx.doi.org/10.1155/2018/7490895.

Full text
Abstract:
For the future information confrontation, a single jamming mode is not effective due to the complex electromagnetic environment. Selecting the appropriate jamming decision to coordinately allocate the jamming resources is the development direction of the electronic countermeasures. Most of the existing studies about jamming decision only pay attention to the jamming benefits, while ignoring the jamming cost. In addition, the conventional artificial bee colony algorithm takes too many iterations, and the improved ant colony (IAC) algorithm is easy to fall into the local optimal solution. Against the issue, this paper introduces the concept of jamming cost in the cognitive collaborative jamming decision model and refines it as a multiobjective one. Furthermore, this paper proposes a tabu search-artificial bee colony (TSABC) algorithm to cognitive cooperative-jamming decision. It introduces the tabu list into the artificial bee colony (ABC) algorithm and stores the solution that has not been updated after a certain number of searches into the tabu list to avoid meeting them when generating a new solution, so that this algorithm reduces the unnecessary iterative process, and it is not easy to fall into a local optimum. Simulation results show that the search ability and probability of finding the optimal solution of the new algorithm are better than the other two. It has better robustness, which is better in the “one-to-many” jamming mode.
APA, Harvard, Vancouver, ISO, and other styles
7

Bagali, Sheetal, and R. Sundaraguru. "Maximize resource utilization based channel access model with presence of reactive jammer for underwater wireless sensor network." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 3 (June 1, 2020): 3284. http://dx.doi.org/10.11591/ijece.v10i3.pp3284-3294.

Full text
Abstract:
Underwater sensor networks (UWSNs) are vulnerable to jamming attacks. Especially, reactive jamming which emerged as a greatest security threat to UWSNs. Reactive jammer are difficult to be removed, defended and identified. Since reactive jammer can control and regulate (i.e., the duration of the jam signal) the probability of jamming for maintaining high vulnerability with low detection probability. The existing model are generally designed considering terrestrial wireless sensor networks (TWSNs). Further, these models are limited in their ability to detect jamming correctly, distinguish between the corrupted and uncorrupted parts of a packet, and be adaptive with the dynamic environment. Cooperative jamming model has presented in recent times to utilize resource efficiently. However, very limited work is carried out using cooperative jamming detection. For overcoming research challenges, this work present Maximize Resource Utilization based Channel Access (MRUCA). The MRUCA uses cross layer design for mitigating reactive jammer (i.e., MRUCA jointly optimizes the cooperative hopping probabilities and channel accessibility probabilities of authenticated sensor device). Along with channel, load capacity of authenticated sensor device is estimated to utilize (maximize) resource efficiently. Experiment outcome shows the proposed MRUCA model attain superior performance than state-of-art model in terms of packet transmission, BER and Detection rate.
APA, Harvard, Vancouver, ISO, and other styles
8

Lee, Hoon, Subin Eom, Junhee Park, and Inkyu Lee. "UAV-Aided Secure Communications With Cooperative Jamming." IEEE Transactions on Vehicular Technology 67, no. 10 (October 2018): 9385–92. http://dx.doi.org/10.1109/tvt.2018.2853723.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Li, An, and Nong Qu. "Secure Performance of an Untrusted AF Relay System with a Friendly Wireless Powered Jammer." Mobile Information Systems 2019 (January 2, 2019): 1–8. http://dx.doi.org/10.1155/2019/6968730.

Full text
Abstract:
We propose a jam-then-harvest protocol for dual-hop cooperative networks with an untrusted relay, where an external friendly jammer helps keep information secret from the untrusted relay by transmitting a priori jamming signal for the destination. In particular, the wireless powered jammer scavenges energy from the received forwarded signal and recovers its initial energy to perform jamming in next time slot. We analytically derive an exact expression of the probability of nonzero secrecy rate (PNSR) for the proposed jam-then-harvest protocol. For performance comparison, cooperative jamming with the constant power supply is provided as a lower bound benchmark. Our results show that the proposed protocol not only can achieve the secure communication but also can harvest the enough energy without a loss of performance in the low jamming power region.
APA, Harvard, Vancouver, ISO, and other styles
10

Stojanovski, Toni Draganov, and Ninoslav Marina. "Secure Wireless Communications via Cooperative Transmitting." Scientific World Journal 2014 (2014): 1–6. http://dx.doi.org/10.1155/2014/760175.

Full text
Abstract:
Information-theoretic secrecy is combined with cryptographic secrecy to create a secret-key exchange protocol for wireless networks. A network of transmitters, which already have cryptographically secured channels between them, cooperate to exchange a secret key with a new receiver at a random location, in the presence of passive eavesdroppers at unknown locations. Two spatial point processes, homogeneous Poisson process and independent uniformly distributed points, are used for the spatial distributions of transmitters and eavesdroppers. We analyse the impact of the number of cooperating transmitters and the number of eavesdroppers on the area fraction where secure communication is possible. Upper bounds on the probability of existence of positive secrecy between the cooperating transmitters and the receiver are derived. The closeness of the upper bounds to the real value is then estimated by means of numerical simulations. Simulations also indicate that a deterministic spatial distribution for the transmitters, for example, hexagonal and square lattices, increases the probability of existence of positive secrecy capacity compared to the random spatial distributions. For the same number of friendly nodes, cooperative transmitting provides a dramatically larger secrecy region than cooperative jamming and cooperative relaying.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Cooperative jamming"

1

Wu, Jingqi. "Cooperative Jamming in Wireless Networks - Turning Attacks into Privacy Protection." ScholarWorks@UNO, 2008. http://scholarworks.uno.edu/td/885.

Full text
Abstract:
Generally, collisions between packets are undesired in wireless networks. We design this scheme, Cooperative Jamming in Wireless Networks (CJWN), to make use of collision to protect secret DATA packets from being sniffed by a nearby eavesdropper. We are intending to greatly increase the Packet Error Rate (PER) at the eavesdropper when the PER at the receiver is maintained at an acceptable level. This scheme is not intended to completely take the place of various encryption/decryption schemes which are working based on successfully received packets. Adding CJWN to the popular CSMA/CA adopted in IEEE 802.11 will add more security even the key for encryption/decryption is already exposed. Because the overhead of CJWN is very big, we do not suggest using it on every transmission. When some secret packets have a high requirement of confidentiality, CJWN is worth trying at the cost of throughput performance and power.
APA, Harvard, Vancouver, ISO, and other styles
2

Pierrot, Alexandre Jean Louis J. "Coding techniques for multi-user physical layer security." Diss., Georgia Institute of Technology, 2015. http://hdl.handle.net/1853/53836.

Full text
Abstract:
The fast development of wireless networks, which are intrinsically exposed to eavesdropping, has created a growing concern for confidentiality. While classical cryptographic schemes require a key provided by the end-user, physical-layer security leverages the randomness of the physical communication medium as a source of secrecy. The main benefit of physical-layer security techniques is their relatively low cost and their ability to combine with any existing security mechanisms. This dissertation provides an analysis including the theoretical study of the two-way wiretap channel to obtain a better insight into how to design coding mechanisms, practical tests with experimental systems, and the design of actual codes. From a theoretical standpoint, the study confirms the benefits of combining several multi-user coding techniques including cooperative jamming, coded cooperative jamming and secret key generation. For these different mechanisms, the trade-off between reliability, secrecy and communication rate is clarified under a stringent strong secrecy metric. Regarding the design of practical codes, spatially coupled LDPC codes, which were originally designed for reliability, are modified to develop a coded cooperative jamming code. Finally, a proof-of-principle practical wireless system is provided to show how to implement a secret key generation system on experimental programmable radios. This testbed is then used to assess the realistic performance of such systems in terms of reliability, secrecy and rate.
APA, Harvard, Vancouver, ISO, and other styles
3

Lyamin, Nikita. "Performance evaluation of C-ACC/platooning under ITS-G5 communications." Licentiate thesis, Högskolan i Halmstad, Centrum för forskning om inbyggda system (CERES), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-32320.

Full text
Abstract:
Intelligent Transport Systems (ITS) are aiming to provide innovative services related to different modes of transport and traffic management, and enable various users to be better informed and make safer, more coordinated and smarter use of transport networks. Cooperative-ITS (C-ITS) support connectivity between vehicles, vehicles and roadside infrastructure, traffic signals as well as with other road users. In order to enable vehicular communications European Telecommunication Standards Institute (ETSI) delivered ITS-G5 -- a of set of C-ITS standards. Considering the goals of C-ITS, inter-vehicle communications should be reliable and efficient. In this thesis we study the performance, efficiency, and dependability of ITS-G5 communications for Cooperative adaptive cruise control (C-ACC) and platooning C-ITS applications. We provide an overview of currently available and ongoing standardization targeting communications in C-ACC/platooning. We study the performance of ITS-G5 beaconing in a C-ACC/platooning scenario, where we show that its performance may deteriorate when implemented in cooperative driving applications due to the kinematic-dependent design of the message triggering mechanism. We explain in detail the cause of this phenomenon and test it for a wide range of parameters. Also, we study the influence of different available ITS-G5 legitimate setups on the C-ACC/platooning fuel efficiency and demonstrate that proper communication setup may enhance fuel savings. This thesis also proposes a jamming denial-of-service attack detection algorithm for platooning. The main advantage of our detector is its short learning phase that not exceed a second and low detection delay of a few hundreds of milliseconds. Under some assumptions, the proposed algorithm demonstrates the ability to detect certain types of attacks with average probability above 0.9.
ACDC
APA, Harvard, Vancouver, ISO, and other styles
4

Lo, Brandon Fang-Hsuan. "Design and analysis of common control channels in cognitive radio ad hoc networks." Diss., Georgia Institute of Technology, 2013. http://hdl.handle.net/1853/50323.

Full text
Abstract:
Common control channels in cognitive radio (CR) ad hoc networks are spectrum resources temporarily allocated and commonly available to CR users for control message exchange. With no presumably available network infrastructure, CR users rely on cooperation to perform spectrum management functions. One the one hand, CR users need to cooperate to establish common control channels, but on the other hand, they need to have common control channels to facilitate such cooperation. This control channel problem is further complicated by primary user (PU) activities, channel impairments, and intelligent attackers. Therefore, how to reliably and securely establish control links in CR ad hoc networks is a challenging problem. In this work, a framework for control channel design and analysis is proposed to address control channel reliability and security challenges for seamless communication and spectral efficiency in CR ad hoc networks. The framework tackles the problem from three perspectives: (i) responsiveness to PU activities: an efficient recovery control channel method is devised to efficiently establish control links and extend control channel coverage upon PU's return while mitigating the interference with PUs, (ii) robustness to channel impairments: a reinforcement learning-based cooperative sensing method is introduced to improve cooperative gain and mitigate cooperation overhead, and (iii) resilience to jamming attacks: a jamming-resilient control channel method is developed to combat jamming under the impacts of PU activities and spectrum sensing errors by leveraging intrusion defense strategies. This research is particularly attractive to emergency relief, public safety, military, and commercial applications where CR users are highly likely to operate in spectrum-scarce or hostile environment.
APA, Harvard, Vancouver, ISO, and other styles
5

Tomek, Prokop. "Československá redakce Radio Free Europe: historie a vliv na československé dějiny." Doctoral thesis, 2012. http://www.nusl.cz/ntk/nusl-326941.

Full text
Abstract:
The disertation is focused on development and importance of the Czechoslovak desk of the Radio Free Europe in period between 1950 and 1994. This broadcasting have gained in time of strong censorship significant and till now unresearched importance. In February 1948 the Communist party took power in the Czechoslovakia. After that Czech and Slovak democratic politicians had left country to the West. They wanted to break the isolation of people living behind the Iron Curtain and promote restoration of democracy in their homeland. In 1949 was in the USA established the National Committee for Free Europe as fomally independent citizens association. As its most known activity had became the Radio Free Europe (RFE). This radio station had became an important tool for political strugle between two blocks in time of the Cold War. The basic qestion is what real position RFE broadcasting have reached in this struggle. The estabilishing of foreign broadcasting to the Czechoslovakia was very difficult task. RFE started its activity as exiles platform for purpose of liberation the Czechoslovakia from rule of the Communistic Party regime. The programming position of the RFE was in reality influented by american politicians and was depending on changing global political conditions as well. The unique position of...
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Cooperative jamming"

1

Commander, Clayton W., Panos M. Pardalos, Valeriy Ryabchenko, Sergey Sarykalin, Timofey Turko, and Stan Uryasev. "Robust Wireless Network Jamming Problems." In Optimization and Cooperative Control Strategies, 399–416. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-540-88063-9_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

He, Xiang, and Aylin Yener. "Cooperative Jamming: The Tale of Friendly Interference for Secrecy." In Securing Wireless Communications at the Physical Layer, 65–88. Boston, MA: Springer US, 2009. http://dx.doi.org/10.1007/978-1-4419-1385-2_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Xu, Zhifan, and Melike Baykal-Gürsoy. "A Cooperative Jamming Game in Wireless Networks Under Uncertainty." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 233–54. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-63086-7_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Fan, Jingjing, Yan Huo, Qinghe Gao, and Tao Jing. "A Social Relationship Enabled Cooperative Jamming Scheme for Wireless Communications." In Wireless Algorithms, Systems, and Applications, 97–108. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59016-1_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Fan, Xin, Liang Huang, Yan Huo, Chunqiang Hu, Yuqi Tian, and Jin Qian. "Space Power Synthesis-Based Cooperative Jamming for Unknown Channel State Information." In Wireless Algorithms, Systems, and Applications, 483–95. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-60033-8_42.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hou, Yantian, and Ming Li. "Enforcing Spectrum Access Rules in Cognitive Radio Networks through Cooperative Jamming." In Wireless Algorithms, Systems, and Applications, 440–53. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39701-1_36.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ma, Jing, Bin Shi, Fei Che, and Sitong Zhang. "Research on Evaluation Method of Cooperative Jamming Effect in Cognitive Confrontation." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 40–51. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-22971-9_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sharma, Shashibhushan, Sanjay Dhar Roy, and Sumit Kundu. "Physical Layer Security in Cognitive Cooperative Radio Network with Energy Harvesting DF Relay Assisted with Cooperative Jamming." In Lecture Notes in Electrical Engineering, 119–29. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-15-0829-5_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Luo, Yijie, Yang Yang, Yanlei Duan, and Zhengju Yang. "Joint D2D Cooperative Relaying and Friendly Jamming Selection for Physical Layer Security." In Machine Learning and Intelligent Communications, 115–26. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00557-3_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Al-Hashmy, Reham M., Mohamed AbdelRaheem, and Usama S. Mohmed. "Anti-jamming Cooperative Technique for Cognitive Radio Networks: A Stackelberg Game Approach." In Advances in Intelligent Systems and Computing, 750–59. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-31129-2_68.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Cooperative jamming"

1

Stanojev, Igor, and Aylin Yener. "Cooperative jamming via spectrum leasing." In 2011 International Symposium of Modeling and Optimization of Mobile, Ad Hoc, and Wireless Networks (WiOpt). IEEE, 2011. http://dx.doi.org/10.1109/wiopt.2011.5930026.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Han-Ting Chiang and James S. Lehnert. "Optimal cooperative jamming for security." In MILCOM 2011 - 2011 IEEE Military Communications Conference. IEEE, 2011. http://dx.doi.org/10.1109/milcom.2011.6127474.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wu, Keting, Dawei Wang, Ruonan Zhang, and Daosen Zhai. "Secure Cognitive Communication via Cooperative Jamming." In 2020 IEEE/CIC International Conference on Communications in China (ICCC). IEEE, 2020. http://dx.doi.org/10.1109/iccc49849.2020.9238993.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Pierrot, Alexandre J., and Matthieu R. Bloch. "LDPC-based coded cooperative jamming codes." In 2012 IEEE Information Theory Workshop (ITW 2012). IEEE, 2012. http://dx.doi.org/10.1109/itw.2012.6404716.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Gu, Pengwenlong, Cunqing Hua, Rida Khatoun, Yue Wu, and Ahmed Serhrouchni. "Cooperative Anti-Jamming Relaying for Control Channel Jamming in Vehicular Networks." In 2017 IEEE Global Communications Conference (GLOBECOM 2017). IEEE, 2017. http://dx.doi.org/10.1109/glocom.2017.8253978.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Wang, Jianqi, and A. Lee Swindlehurst. "Cooperative Jamming in MIMO ad-hoc networks." In 2009 Conference Record of the Forty-Third Asilomar Conference on Signals, Systems and Computers. IEEE, 2009. http://dx.doi.org/10.1109/acssc.2009.5469718.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Mabrouk, Asma, Kamel Tourki, and Noureddine Hamdi. "Relay selection for optimized cooperative jamming scheme." In 2015 23rd European Signal Processing Conference (EUSIPCO). IEEE, 2015. http://dx.doi.org/10.1109/eusipco.2015.7362350.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lun Dong, Zhu Han, Athina P. Petropulu, and H. Vincent Poor. "Cooperative jamming for wireless physical layer security." In 2009 IEEE/SP 15th Workshop on Statistical Signal Processing (SSP). IEEE, 2009. http://dx.doi.org/10.1109/ssp.2009.5278549.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ma, Baihe, Zhihong Liu, Yong Zeng, and Jianfeng Ma. "Cooperative Jamming for Secrecy of Wireless Communications." In 2018 International Conference on Networking and Network Applications (NaNA). IEEE, 2018. http://dx.doi.org/10.1109/nana.2018.8648704.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Lu, Weifeng, Zhihao Ren, Jia Xu, and Siguang Chen. "Cooperative Jamming Algorithm Based on Trust Update." In 2020 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC). IEEE, 2020. http://dx.doi.org/10.1109/cyberc49757.2020.00060.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Cooperative jamming"

1

Yunus, Sarıkaya, and Gürbüz Özgür. Enhancing wireless security via optimal cooperative jamming. Sabancı University, July 2012. http://dx.doi.org/10.5900/su_fens_wp.2012.19167.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Yunus, Sarıkaya, and Gürbüz Özgür. Enhancing wireless security via optimal cooperative jamming. Sabancı University, July 2012. http://dx.doi.org/10.5900/su_fens_wp.2012.19168.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sarıkaya, Yunus, Özgür Erçetin, and Özgür Gürbüz. Dynamic control for cooperative jamming with a non-altruistic node. Sabancı University, April 2014. http://dx.doi.org/10.5900/su_fens_wp.2014.24089.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography