To see the other types of publications on this topic, follow the link: Cooperative jamming.

Journal articles on the topic 'Cooperative jamming'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Cooperative jamming.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Xu, Yifan, Guochun Ren, Jin Chen, Xiaobo Zhang, Luliang Jia, and Lijun Kong. "Interference-Aware Cooperative Anti-Jamming Distributed Channel Selection in UAV Communication Networks." Applied Sciences 8, no. 10 (October 14, 2018): 1911. http://dx.doi.org/10.3390/app8101911.

Full text
Abstract:
This paper investigates the cooperative anti-jamming distributed channel selection problem in UAV communication networks. Considering the existence of malicious jamming and co-channel interference, we design an interference-aware cooperative anti-jamming scheme for the purpose of maximizing users’ utilities. Moreover, the channel switching cost and cooperation cost are introduced, which have a great impact on users’ utilities. Users in the UAV group sense the co-channel interference signal energy to judge whether they are influenced by co-channel interference. When the received co-channel interference signal energy is lower than the co-channel interference threshold, users conduct channel selection strategies independently. Otherwise, users cooperate with each other and take joint actions with a cooperative anti-jamming pattern under the impact of co-channel interference. Aiming at the independent anti-jamming channel selection problem under no co-channel interference, a Markov decision process framework is introduced, whereas for the cooperative anti-jamming channel selection case under the influence of co-channel mutual interference, a Markov game framework is employed. Furthermore, motivated by Q-learning with a “cooperation-decision-feedback-adjustment” idea, we design an interference-aware cooperative anti-jamming distributed channel selection algorithm (ICADCSA) to obtain the optimal anti-jamming channel strategies for users in a distributed way. In addition, a discussion on the quick decision for UAVs is conducted. Finally, simulation results show that the proposed algorithm converges to a stable solution with which the UAV group can avoid malicious jamming, as well as co-channel interference effectively and can realize a quick decision in high mobility UAV communication networks.
APA, Harvard, Vancouver, ISO, and other styles
2

Fan, Xin, and Yan Huo. "Cooperative secure transmission against collusive eavesdroppers in Internet of Things." International Journal of Distributed Sensor Networks 16, no. 6 (June 2020): 155014772093346. http://dx.doi.org/10.1177/1550147720933464.

Full text
Abstract:
As Internet of Things (IoT) has boomed in recent years, many security issues have also been exposed. Focusing on physical layer security in wireless Internet of Things network communication, a series of security methods have been widely studied. Nevertheless, cooperative jamming methods in physical layer security to fight against collusive eavesdroppers have not been thoroughly studied yet. In this article, we study a cooperative-jamming-based physical layer secure transmission scheme for Internet of Things wireless networks in the presence of collusive eavesdroppers. We design a cooperative jamming strategy without knowing the channel state information of eavesdroppers. Considering the cooperation of multiple nodes with multiple antennas, this strategy can maximize the signal-to-interference-plus-noise ratio at an actuator (legitimate receiver). Meanwhile, the generated cooperative jamming signals can reduce the signal-to-interference-plus-noise ratio at eavesdroppers. To explore the theoretical security performance of our strategy, we perform a secrecy outage probability analysis and an asymptotic analysis. In the cases of cooperative jamming and without cooperative jamming, the closed-form expressions of the secrecy outage probability are deduced, and the influence of system parameters on the secrecy outage probability becomes more intuitive through a strict mathematical asymptotic behavior analysis. In addition, considering the energy limitation of Internet of Things devices, we propose a power allocation algorithm to minimize the total transmission power given the security requirements. The numerical results show the effectiveness of our schemes and are consistent with the theoretical analysis.
APA, Harvard, Vancouver, ISO, and other styles
3

Rajaram, Akashkumar, Dushnatha Nalin K. Jayakody, Rui Dinis, and Marko Beko. "Energy Efficient Secure Communication Model against Cooperative Eavesdropper." Applied Sciences 11, no. 4 (February 9, 2021): 1563. http://dx.doi.org/10.3390/app11041563.

Full text
Abstract:
In a wiretap channel system model, the jammer node adopts the energy-harvesting signal as artificial noise (jamming signal) against the cooperative eavesdroppers. There are two eavesdroppers in the wiretap channel: eavesdropper E1 is located near the transmitter and eavesdropper E2 is located near the jammer. The eavesdroppers are equipped with multiple antennas and employ the iterative block decision feedback equalization decoder to estimate the received signal, i.e., information signal at E1 and jamming signal at E2. It is assumed that E1 has the channel state information (CSI) of the channel between transmitter and E1, and similarly, E2 has the CSI of channel between jammer and E2. The eavesdroppers establish communication link between them and cooperate with each other to reduce the information signal interference at E2 and jamming signal interference at E1. The performance of decoders depends on the signal to interference plus noise ratio (SINR) of the received signal. The power of information signal is fixed and the power of the jamming signal is adjusted to improve the SINR of the received signal. This research work is solely focused on optimizing the jamming signal power to degrade the performance of cooperative eavesdroppers. The jamming signal power is optimized for the given operating SINR with the support of simulated results. The jamming signal power optimization leads to better energy conservation and degrades the performance of eavesdroppers.
APA, Harvard, Vancouver, ISO, and other styles
4

Wu, Yuandong, and Yan Huo. "A Survey of Cooperative Jamming-Based Secure Transmission for Energy-Limited Systems." Wireless Communications and Mobile Computing 2021 (January 15, 2021): 1–11. http://dx.doi.org/10.1155/2021/6638405.

Full text
Abstract:
Considering the ongoing development of various devices and rich applications in intelligent Internet of Things (IoT) systems, it is a crucial issue to solve secure transmission of legitimate signals for massive data sharing in the systems. Cooperative jamming-based physical layer security is explored to be a complement of conventional cryptographic schemes to protect private information. Yet, this method needs to solve a game between energy consumption and signal secure transmission. In this paper, we summarize the basics of cooperative jamming and universal security metrics. Using the metrics, we study a series of typical cooperative jamming strategies from two aspects, including power allocation and energy harvesting. Finally, we propose open issues and challenges of further works on cooperative jamming in an IoT system with energy constraints.
APA, Harvard, Vancouver, ISO, and other styles
5

Shuangyu Luo, Jiangyuan Li, and A. P. Petropulu. "Uncoordinated Cooperative Jamming for Secret Communications." IEEE Transactions on Information Forensics and Security 8, no. 7 (July 2013): 1081–90. http://dx.doi.org/10.1109/tifs.2013.2261060.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ye, Fang, Fei Che, and Lipeng Gao. "Multiobjective Cognitive Cooperative Jamming Decision-Making Method Based on Tabu Search-Artificial Bee Colony Algorithm." International Journal of Aerospace Engineering 2018 (December 9, 2018): 1–10. http://dx.doi.org/10.1155/2018/7490895.

Full text
Abstract:
For the future information confrontation, a single jamming mode is not effective due to the complex electromagnetic environment. Selecting the appropriate jamming decision to coordinately allocate the jamming resources is the development direction of the electronic countermeasures. Most of the existing studies about jamming decision only pay attention to the jamming benefits, while ignoring the jamming cost. In addition, the conventional artificial bee colony algorithm takes too many iterations, and the improved ant colony (IAC) algorithm is easy to fall into the local optimal solution. Against the issue, this paper introduces the concept of jamming cost in the cognitive collaborative jamming decision model and refines it as a multiobjective one. Furthermore, this paper proposes a tabu search-artificial bee colony (TSABC) algorithm to cognitive cooperative-jamming decision. It introduces the tabu list into the artificial bee colony (ABC) algorithm and stores the solution that has not been updated after a certain number of searches into the tabu list to avoid meeting them when generating a new solution, so that this algorithm reduces the unnecessary iterative process, and it is not easy to fall into a local optimum. Simulation results show that the search ability and probability of finding the optimal solution of the new algorithm are better than the other two. It has better robustness, which is better in the “one-to-many” jamming mode.
APA, Harvard, Vancouver, ISO, and other styles
7

Bagali, Sheetal, and R. Sundaraguru. "Maximize resource utilization based channel access model with presence of reactive jammer for underwater wireless sensor network." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 3 (June 1, 2020): 3284. http://dx.doi.org/10.11591/ijece.v10i3.pp3284-3294.

Full text
Abstract:
Underwater sensor networks (UWSNs) are vulnerable to jamming attacks. Especially, reactive jamming which emerged as a greatest security threat to UWSNs. Reactive jammer are difficult to be removed, defended and identified. Since reactive jammer can control and regulate (i.e., the duration of the jam signal) the probability of jamming for maintaining high vulnerability with low detection probability. The existing model are generally designed considering terrestrial wireless sensor networks (TWSNs). Further, these models are limited in their ability to detect jamming correctly, distinguish between the corrupted and uncorrupted parts of a packet, and be adaptive with the dynamic environment. Cooperative jamming model has presented in recent times to utilize resource efficiently. However, very limited work is carried out using cooperative jamming detection. For overcoming research challenges, this work present Maximize Resource Utilization based Channel Access (MRUCA). The MRUCA uses cross layer design for mitigating reactive jammer (i.e., MRUCA jointly optimizes the cooperative hopping probabilities and channel accessibility probabilities of authenticated sensor device). Along with channel, load capacity of authenticated sensor device is estimated to utilize (maximize) resource efficiently. Experiment outcome shows the proposed MRUCA model attain superior performance than state-of-art model in terms of packet transmission, BER and Detection rate.
APA, Harvard, Vancouver, ISO, and other styles
8

Lee, Hoon, Subin Eom, Junhee Park, and Inkyu Lee. "UAV-Aided Secure Communications With Cooperative Jamming." IEEE Transactions on Vehicular Technology 67, no. 10 (October 2018): 9385–92. http://dx.doi.org/10.1109/tvt.2018.2853723.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Li, An, and Nong Qu. "Secure Performance of an Untrusted AF Relay System with a Friendly Wireless Powered Jammer." Mobile Information Systems 2019 (January 2, 2019): 1–8. http://dx.doi.org/10.1155/2019/6968730.

Full text
Abstract:
We propose a jam-then-harvest protocol for dual-hop cooperative networks with an untrusted relay, where an external friendly jammer helps keep information secret from the untrusted relay by transmitting a priori jamming signal for the destination. In particular, the wireless powered jammer scavenges energy from the received forwarded signal and recovers its initial energy to perform jamming in next time slot. We analytically derive an exact expression of the probability of nonzero secrecy rate (PNSR) for the proposed jam-then-harvest protocol. For performance comparison, cooperative jamming with the constant power supply is provided as a lower bound benchmark. Our results show that the proposed protocol not only can achieve the secure communication but also can harvest the enough energy without a loss of performance in the low jamming power region.
APA, Harvard, Vancouver, ISO, and other styles
10

Stojanovski, Toni Draganov, and Ninoslav Marina. "Secure Wireless Communications via Cooperative Transmitting." Scientific World Journal 2014 (2014): 1–6. http://dx.doi.org/10.1155/2014/760175.

Full text
Abstract:
Information-theoretic secrecy is combined with cryptographic secrecy to create a secret-key exchange protocol for wireless networks. A network of transmitters, which already have cryptographically secured channels between them, cooperate to exchange a secret key with a new receiver at a random location, in the presence of passive eavesdroppers at unknown locations. Two spatial point processes, homogeneous Poisson process and independent uniformly distributed points, are used for the spatial distributions of transmitters and eavesdroppers. We analyse the impact of the number of cooperating transmitters and the number of eavesdroppers on the area fraction where secure communication is possible. Upper bounds on the probability of existence of positive secrecy between the cooperating transmitters and the receiver are derived. The closeness of the upper bounds to the real value is then estimated by means of numerical simulations. Simulations also indicate that a deterministic spatial distribution for the transmitters, for example, hexagonal and square lattices, increases the probability of existence of positive secrecy capacity compared to the random spatial distributions. For the same number of friendly nodes, cooperative transmitting provides a dramatically larger secrecy region than cooperative jamming and cooperative relaying.
APA, Harvard, Vancouver, ISO, and other styles
11

TANG, Ling, Hao CHEN, and Jianhui WU. "Wireless Secure Communications via Cooperative Relaying and Jamming." IEICE Transactions on Communications E95.B, no. 9 (2012): 2774–84. http://dx.doi.org/10.1587/transcom.e95.b.2774.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Zhu, Min, Jianlin Mo, Naixue Xiong, and Jin Wang. "Legitimate Monitoring via Cooperative Relay and Proactive Jamming." IEEE Access 7 (2019): 40133–43. http://dx.doi.org/10.1109/access.2019.2904407.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Zhang, Guangchi, Jie Xu, Qingqing Wu, Miao Cui, Xueyi Li, and Fan Lin. "Wireless Powered Cooperative Jamming for Secure OFDM System." IEEE Transactions on Vehicular Technology 67, no. 2 (February 2018): 1331–46. http://dx.doi.org/10.1109/tvt.2017.2756877.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Krikidis, I., J. Thompson, and S. Mclaughlin. "Relay selection for secure cooperative networks with jamming." IEEE Transactions on Wireless Communications 8, no. 10 (October 2009): 5003–11. http://dx.doi.org/10.1109/twc.2009.090323.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Chu, Zheng, Huan X. Nguyen, Tuan Anh Le, Mehmet Karamanoglu, Enver Ever, and Adnan Yazici. "Secure Wireless Powered and Cooperative Jamming D2D Communications." IEEE Transactions on Green Communications and Networking 2, no. 1 (March 2018): 1–13. http://dx.doi.org/10.1109/tgcn.2017.2763826.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Alotaibi, Esa R., and Khairi A. Hamdi. "Optimal Cooperative Relaying and Jamming for Secure Communication." IEEE Wireless Communications Letters 4, no. 6 (December 2015): 689–92. http://dx.doi.org/10.1109/lwc.2015.2483496.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Gao, Zhi, Hao Sun, Fei Li, Sai Guo, Jianming Wang, Lei Fang, and Chaohui Zhao. "Cooperative Jamming of Multi UAVs to Netted Radar." Journal of Physics: Conference Series 1865, no. 2 (April 1, 2021): 022059. http://dx.doi.org/10.1088/1742-6596/1865/2/022059.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Wang, Zijie, Rongke Liu, Qirui Liu, Lincong Han, and Weiqing Mu. "Controllable Positioning Service With UAV-Enabled Cooperative Jamming." IEEE Wireless Communications Letters 10, no. 9 (September 2021): 1929–33. http://dx.doi.org/10.1109/lwc.2021.3086524.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Park, Ki-Hong, Tian Wang, and Mohamed-Slim Alouini. "On the Jamming Power Allocation for Secure Amplify-and-Forward Relaying via Cooperative Jamming." IEEE Journal on Selected Areas in Communications 31, no. 9 (September 2013): 1741–50. http://dx.doi.org/10.1109/jsac.2013.130908.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Wang, Dawei, Pinyi Ren, Qinghe Du, Li Sun, and Yichen Wang. "Downlink and Uplink Cooperative Transmission for Primary Secrecy Based Cognitive Radio Sensor Networks." International Journal of Distributed Sensor Networks 2015 (2015): 1–14. http://dx.doi.org/10.1155/2015/152851.

Full text
Abstract:
Aiming at allocating more licensed spectrum to wireless sensor nodes (SNs) under the constraint of the information security requirement of the primary system, in this paper, we propose a cooperative relaying and jamming secure transmission (CRJS) scheme in which SNs will relay primary message and jam primary eavesdrop concurrently with SN’s downlink and uplink information transmission in cognitive radio sensor networks (CRSNs). In our proposed CRJS scheme, SNs take advantages of physical layer secure technologies to protect the primary transmission and acquire some interference-free licensed spectrum as a reward. In addition, both decode-and-forward (DF) and amplify-and-forward (AF) relaying protocols are investigated in our proposed CRJS scheme. Our object is to maximize the transmission rate of SNs by optimal allocating of the relaying power, jamming power, and downlink and uplink transmit power under the target secure transmission rate requirement of the primary system. Moreover, two suboptimal algorithms are proposed to deal with these optimization problems. Furthermore, we analyze the transmission rate of SNs and allocate the relaying power, jamming power, and downlink and uplink transmit power for the asymptotic scenarios. Simulation results demonstrate the performance superiority of our developed strategy over conventional jamming scheme in terms of the transmission rate of WSN.
APA, Harvard, Vancouver, ISO, and other styles
21

Li, Zhen, Tao Jing, Yan Huo, and Jin Qian. "Achieving secure communications in multi-antenna cooperative cognitive radio networks using cooperative jamming." International Journal of Sensor Networks 22, no. 2 (2016): 100. http://dx.doi.org/10.1504/ijsnet.2016.079598.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Duy, Tran, Le Khan, Nguyen Binh, and Nguyen Nhat. "Intercept Probability Analysis of Cooperative Cognitive Networks Using Fountain Codes and Cooperative Jamming." EAI Endorsed Transactions on Industrial Networks and Intelligent Systems 8, no. 26 (April 13, 2021): 168229. http://dx.doi.org/10.4108/eai.26-1-2021.168229.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Sun, Hanming, Bin Duo, Zhengqiang Wang, Xiaochen Lin, and Changchun Gao. "Aerial Cooperative Jamming for Cellular-Enabled UAV Secure Communication Network: Joint Trajectory and Power Control Design." Sensors 19, no. 20 (October 14, 2019): 4440. http://dx.doi.org/10.3390/s19204440.

Full text
Abstract:
To improve the secrecy performance of cellular-enabled unmanned aerial vehicle (UAV) communication networks, this paper proposes an aerial cooperative jamming scheme and studies its optimal design to achieve the maximum average secrecy rate. Specifically, a base station (BS) transmits confidential messages to a UAV and meanwhile another UAV performs the role of an aerial jammer by cooperatively sending jamming signals to oppose multiple suspicious eavesdroppers on the ground. As the UAVs have the advantage of the controllable mobility, the objective is to maximize the worst-case average secrecy rate by the joint optimization of the two UAVs’ trajectories and the BS’s/UAV jammer’s transmit/jamming power over a given mission period. The objective function of the formulated problem is highly non-linear regarding the optimization variables and the problem has non-convex constraints, which is, in general, difficult to achieve a globally optimal solution. Thus, we divide the original problem into four subproblems and then solve them by applying the successive convex approximation (SCA) and block coordinate descent (BCD) methods. Numerical results demonstrate that the significantly better secrecy performance can be obtained by using the proposed algorithm in comparison with benchmark schemes.
APA, Harvard, Vancouver, ISO, and other styles
24

Huo, Yan, Yuqi Tian, Chunqiang Hu, Qinghe Gao, and Tao Jing. "A Location Prediction-Based Helper Selection Scheme for Suspicious Eavesdroppers." Wireless Communications and Mobile Computing 2017 (2017): 1–11. http://dx.doi.org/10.1155/2017/1832051.

Full text
Abstract:
This paper aims to improve security performance of data transmission with a mobile eavesdropper in a wireless network. The instantaneous channel state information (CSI) of the mobile eavesdropper is unknown to legitimate users during the communication process. Different from existing work, we intend to reduce power consumption of friendly jamming signals. Motivated by the goal, this work presents a location-based prediction scheme to predict where the eavesdropper will be later and to decide whether a friendly jamming measure should be selected against the eavesdropper. The legitimate users only take the measure when the prediction result shows that there will be a risk during data transmission. According to the proposed method, system power can be saved to a large degree. Particularly, we first derive the expression of the secrecy outage probability and set a secrecy performance target. After providing a Markov mobile model of an eavesdropper, we design a prediction scheme to predict its location, so as to decide whether to employ cooperative jamming or not, and then design a power allocation scheme and a fast suboptimal helper selection method to achieve targeted and efficient cooperative jamming. Finally, numerical simulation results demonstrate the effectiveness of the proposed schemes.
APA, Harvard, Vancouver, ISO, and other styles
25

Huang, Jing, and A. Lee Swindlehurst. "Cooperative Jamming for Secure Communications in MIMO Relay Networks." IEEE Transactions on Signal Processing 59, no. 10 (October 2011): 4871–84. http://dx.doi.org/10.1109/tsp.2011.2161295.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Hajimomeni, Mona, Kwihoon Kim, Hassan Aghaeinia, and Il-Min Kim. "Cooperative jamming polar codes for multiple-access wiretap channels." IET Communications 10, no. 4 (March 3, 2016): 407–15. http://dx.doi.org/10.1049/iet-com.2015.0624.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Liu, Yupeng, Jiangyuan Li, and Athina P. Petropulu. "Destination Assisted Cooperative Jamming for Wireless Physical-Layer Security." IEEE Transactions on Information Forensics and Security 8, no. 4 (April 2013): 682–94. http://dx.doi.org/10.1109/tifs.2013.2248730.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Tang, Ling, Hao Chen, and Qianmu Li. "Social Tie Based Cooperative Jamming for Physical Layer Security." IEEE Communications Letters 19, no. 10 (October 2015): 1790–93. http://dx.doi.org/10.1109/lcomm.2015.2462826.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Cao, Kuo, Yueming Cai, Yongpeng Wu, and Weiwei Yang. "Cooperative Jamming for Secure Communication With Finite Alphabet Inputs." IEEE Communications Letters 21, no. 9 (September 2017): 2025–28. http://dx.doi.org/10.1109/lcomm.2017.2716974.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Zhong, Canhui, Jianping Yao, and Jie Xu. "Secure UAV Communication With Cooperative Jamming and Trajectory Control." IEEE Communications Letters 23, no. 2 (February 2019): 286–89. http://dx.doi.org/10.1109/lcomm.2018.2889062.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Miao, Jiansong, and Ziyuan Zheng. "Cooperative Jamming for Secure UAV-Enabled Mobile Relay System." IEEE Access 8 (2020): 48943–57. http://dx.doi.org/10.1109/access.2020.2980242.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Moon, Jihwan, Hoon Lee, Changick Song, Sunho Lee, and Inkyu Lee. "Proactive Eavesdropping With Full-Duplex Relay and Cooperative Jamming." IEEE Transactions on Wireless Communications 17, no. 10 (October 2018): 6707–19. http://dx.doi.org/10.1109/twc.2018.2863287.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Moon, Jihwan, Hoon Lee, Changick Song, Seowoo Kang, and Inkyu Lee. "Relay-Assisted Proactive Eavesdropping With Cooperative Jamming and Spoofing." IEEE Transactions on Wireless Communications 17, no. 10 (October 2018): 6958–71. http://dx.doi.org/10.1109/twc.2018.2865305.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Yang, Jun, Il-Min Kim, and Dong In Kim. "Power-Constrained Optimal Cooperative Jamming for Multiuser Broadcast Channel." IEEE Wireless Communications Letters 2, no. 4 (August 2013): 411–14. http://dx.doi.org/10.1109/wcl.2013.050613.130216.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Guo, Wenbo, Hongzhi Zhao, and Youxi Tang. "Testbed for Cooperative Jamming Cancellation in Physical Layer Security." IEEE Wireless Communications Letters 9, no. 2 (February 2020): 240–43. http://dx.doi.org/10.1109/lwc.2019.2950303.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Li, Yupeng, Rongqing Zhang, Jianhua Zhang, and Liuqing Yang. "Cooperative Jamming via Spectrum Sharing for Secure UAV Communications." IEEE Wireless Communications Letters 9, no. 3 (March 2020): 326–30. http://dx.doi.org/10.1109/lwc.2019.2953725.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Anjos, Gustavo, Daniel Castanheira, Adão Silva, and Atílio Gameiro. "A Cooperative Jamming Technique to Protect a Two-User Broadcast Channel with Confidential Messages and an External Eavesdropper." Electronics 9, no. 3 (March 18, 2020): 496. http://dx.doi.org/10.3390/electronics9030496.

Full text
Abstract:
This work addresses the security of a two-user broadcast channel. The challenge of protecting a broadcast channel is associated with the necessity of securing the system, not only against eavesdropping attacks originating from external nodes, but also to ensure that the inside users do not eavesdrop on each other’s information. To address this issue, the present work proposes a cooperative jamming scheme that provides protection against eavesdropping attacks carried out simultaneously by inside users and external eavesdroppers. To achieve this goal, the developed scheme combines real interference alignment with a blind cooperative jamming technique defined in the literature. An information theoretical analysis shows that positive secure degrees of freedom are achievable using the proposed solution.
APA, Harvard, Vancouver, ISO, and other styles
38

Banawan, Karim, and Sennur Ulukus. "Secure Degrees of Freedom in Networks with User Misbehavior." Entropy 21, no. 10 (September 26, 2019): 945. http://dx.doi.org/10.3390/e21100945.

Full text
Abstract:
We investigate the secure degrees of freedom (s.d.o.f.) of three new channel models: broadcast channel with combating helpers, interference channel with selfish users, and multiple access wiretap channel with deviating users. The goal of introducing these channel models is to investigate various malicious interactions that arise in networks, including active adversaries. That is in contrast with the common assumption in the literature that the users follow a certain protocol altruistically and transmit both message-carrying and cooperative jamming signals in an optimum manner. In the first model, over a classical broadcast channel with confidential messages (BCCM), there are two helpers, each associated with one of the receivers. In the second model, over a classical interference channel with confidential messages (ICCM), there is a helper and users are selfish. By casting each problem as an extensive-form game and applying recursive real interference alignment, we show that, for the first model, the combating intentions of the helpers are neutralized and the full s.d.o.f. is retained; for the second model, selfishness precludes secure communication and no s.d.o.f. is achieved. In the third model, we consider the multiple access wiretap channel (MAC-WTC), where multiple legitimate users wish to have secure communication with a legitimate receiver in the presence of an eavesdropper. We consider the case when a subset of users deviate from the optimum protocol that attains the exact s.d.o.f. of this channel. We consider two kinds of deviation: when some of the users stop transmitting cooperative jamming signals, and when a user starts sending intentional jamming signals. For the first scenario, we investigate possible responses of the remaining users to counteract such deviation. For the second scenario, we use an extensive-form game formulation for the interactions of the deviating and well-behaving users. We prove that a deviating user can drive the s.d.o.f. to zero; however, the remaining users can exploit its intentional jamming signals as cooperative jamming signals against the eavesdropper and achieve an optimum s.d.o.f.
APA, Harvard, Vancouver, ISO, and other styles
39

Lei, Weijia, Ziwei Wang, and Hongjiang Lei. "Online joint power control for cooperative jamming systems with energy harvesting." International Journal of Distributed Sensor Networks 15, no. 11 (November 2019): 155014771988811. http://dx.doi.org/10.1177/1550147719888118.

Full text
Abstract:
To maximize the long-term time-averaged secrecy rate of an energy harvesting wireless communication system, an online power control algorithm based on the Lyapunov optimization framework is proposed. The system is composed of a source node, a cooperative jamming node, and two destination nodes. The source node and the jamming node are powered by the energy harvesting device. Information sent to the two destination nodes is mutually confidential. Using the Lyapunov optimization framework, the original stochastic optimization problem is transformed into a per-time-slot optimization problem, and the power of the signal and that of the artificial noise are determined based on the current system state such as the power level of the batteries and channel coefficients. The fairness between the two destination nodes is considered too. Simulation results demonstrate that the proposed algorithm can effectively utilize the harvested energy and significantly improve the long-term averaged secrecy rate.
APA, Harvard, Vancouver, ISO, and other styles
40

Li, Hai Long, Xia Ye, and Shi Qiang Jiang. "Method Resource of Electro-Optical Countermeasures and its Cooperation." Advanced Materials Research 462 (February 2012): 652–57. http://dx.doi.org/10.4028/www.scientific.net/amr.462.652.

Full text
Abstract:
A method to distribute the jamming resources of electro-optical countermeasures is introduced through taking method resource as a medium. With the restriction of the friend cooperation and incompatibility disposing, how to apply the method resource to the deployment of electro-optical countermeasures resources is discussed. The resource management procedure is formalized by Finite State Machine (FSM). And a cooperative resource operation system based on multi-agent system is put forward, which serves as a guidance for the realization of the distribution method.
APA, Harvard, Vancouver, ISO, and other styles
41

Li, Zhen, Tao Jing, Liran Ma, Yan Huo, and Jin Qian. "Worst-Case Cooperative Jamming for Secure Communications in CIoT Networks." Sensors 16, no. 3 (March 7, 2016): 339. http://dx.doi.org/10.3390/s16030339.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Gao, Qinghe, Yan Huo, Tao Jing, Liran Ma, Yingkun Wen, and Xiaoshuang Xing. "An Intermittent Cooperative Jamming Strategy for Securing Energy-Constrained Networks." IEEE Transactions on Communications 67, no. 11 (November 2019): 7715–26. http://dx.doi.org/10.1109/tcomm.2019.2937303.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Gu, Pengwenlong, Cunqing Hua, Rida Khatoun, Yue Wu, and Ahmed Serhrouchni. "Cooperative Antijamming Relaying for Control Channel Jamming in Vehicular Networks." IEEE Transactions on Vehicular Technology 67, no. 8 (August 2018): 7033–46. http://dx.doi.org/10.1109/tvt.2018.2825600.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Han, Biao, Jie Li, Jinshu Su, Minyi Guo, and Baokang Zhao. "Secrecy Capacity Optimization via Cooperative Relaying and Jamming for WANETs." IEEE Transactions on Parallel and Distributed Systems 26, no. 4 (April 1, 2015): 1117–28. http://dx.doi.org/10.1109/tpds.2014.2316155.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Zheng, Gan, Li-Chia Choo, and Kai-Kit Wong. "Optimal Cooperative Jamming to Enhance Physical Layer Security Using Relays." IEEE Transactions on Signal Processing 59, no. 3 (March 2011): 1317–22. http://dx.doi.org/10.1109/tsp.2010.2092774.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

El Shafie, Ahmed, Asma Mabrouk, Kamel Tourki, Naofal Al-Dhahir, and Ridha Hamila. "Securing Untrusted RF-EH Relay Networks Using Cooperative Jamming Signals." IEEE Access 5 (2017): 24353–67. http://dx.doi.org/10.1109/access.2017.2768508.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Xing, Hong, Kai-Kit Wong, Arumugam Nallanathan, and Rui Zhang. "Wireless Powered Cooperative Jamming for Secrecy Multi-AF Relaying Networks." IEEE Transactions on Wireless Communications 15, no. 12 (December 2016): 7971–84. http://dx.doi.org/10.1109/twc.2016.2610418.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Chen, Guang, Ziyue Tang, and Chang Zhou. "Modeling and Simulation of Three Distributed Cooperative Suppressive Jamming Modes." Journal of Physics: Conference Series 1302 (August 2019): 042022. http://dx.doi.org/10.1088/1742-6596/1302/4/042022.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Ding, Zhiguo, Kin K. Leung, Dennis L. Goeckel, and Don Towsley. "Opportunistic Relaying for Secrecy Communications: Cooperative Jamming vs. Relay Chatting." IEEE Transactions on Wireless Communications 10, no. 6 (June 2011): 1725–29. http://dx.doi.org/10.1109/twc.2011.040511.101694.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Dehghan, Mostafa, Dennis L. Goeckel, Majid Ghaderi, and Zhiguo Ding. "Energy Efficiency of Cooperative Jamming Strategies in Secure Wireless Networks." IEEE Transactions on Wireless Communications 11, no. 9 (September 2012): 3025–29. http://dx.doi.org/10.1109/twc.2012.070912.110789.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography