Articles with "active eavesdropper" as a keyword



Photo by fi_fa from unsplash

Game-Theoretic Learning Approaches for Secure D2D Communications Against Full-Duplex Active Eavesdropper

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2906845

Abstract: In this paper, we analyze the anti-eavesdropping and anti-jamming performance of D2D communications with a full-duplex active eavesdropper (FAE). We consider the scenario that when the FAE intrudes the D2D underlaying cellular networks, it can… read more here.

Keywords: communications full; full duplex; d2d communications; duplex active ... See more keywords
Photo from wikipedia

On the Security Analysis of a Cooperative Incremental Relaying Protocol in the Presence of an Active Eavesdropper

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2944543

Abstract: Physical layer security offers an efficient means to decrease the risk of confidential information leakage through wiretap links. In this paper, we address the physical-layer security in a cooperative wireless subnetwork that includes a source-destination… read more here.

Keywords: presence; relaying protocol; presence active; security ... See more keywords