Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2021 at "Wireless Networks"
DOI: 10.1007/s11276-020-02537-3
Abstract: In 5G, users can easily enjoy services by accessing the edge devices (EDs) deployed around the base stations. Generally, due to the uneven distribution and mobility of users, one ED is required to serve multiple…
read more here.
Keywords:
cooperative jamming;
service migration;
edge;
service ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2019 at "IEEE Access"
DOI: 10.1109/access.2019.2926741
Abstract: The broadcast nature of air-to-ground line-of-sight (LoS) wireless channel imposes a great challenge in secure unmanned aerial vehicle (UAV) communications. To address this issue, this paper investigates UAV-ground communications from the physical-layer security perspective. Specifically,…
read more here.
Keywords:
ground;
uav communications;
cooperative jamming;
jamming secure ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2021.3085275
Abstract: The boom of the Internet of Things (IoT) has exposed many security issues in recent years. Cooperative jamming, including the continuous jamming strategy (CJS) and intermittent jamming strategy (IJS), is an effective approach toward secure…
read more here.
Keywords:
ijs;
iot system;
cooperative jamming;
transmission iot ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2022.3232587
Abstract: Effective energy design and secure communications are critical in the Internet of Things (IoT). A cooperative jamming (CJ) scheme based on deep reinforcement learning (DRL) is proposed for intelligent reflecting surface (IRS) aided secure cooperative…
read more here.
Keywords:
reinforcement learning;
deep reinforcement;
energy;
cooperative jamming ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2020 at "IEEE Systems Journal"
DOI: 10.1109/jsyst.2020.2967779
Abstract: In this article, we consider the system performance of an energy harvesting (EH) wireless sensor network in terms of reliable communications when subjected to a cooperative jamming attack. A set of strategically located nodes acting…
read more here.
Keywords:
communication;
attack;
cooperative jamming;
energy ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2019 at "IEEE Communications Letters"
DOI: 10.1109/lcomm.2019.2936845
Abstract: Cooperative jamming is envisioned as a key technique to enhance the wireless secrecy. With the help of a cooperative node, confidential communications are ensured by emitting a jamming signal to combat against eavesdropping. Concurrently, this…
read more here.
Keywords:
cooperative jamming;
self interference;
cancellation;
frequency offset ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Communications Letters"
DOI: 10.1109/lcomm.2022.3184367
Abstract: In this letter, we propose to deploy a reconfigurable intelligent surface (RIS) along with a jammer to interfere with an illegal wireless network in a cooperative manner, where an illegal station transmits information signals to…
read more here.
Keywords:
cooperative jamming;
reconfigurable intelligent;
assisted cooperative;
intelligent surface ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Emerging Topics in Computing"
DOI: 10.1109/tetc.2022.3159282
Abstract: Federated learning (FL) provides a promising framework for enabling distributed machine learning based services without revealing users’ private data. In the scenario of wireless FL, to counter the eavesdropping attack when the parameter-server (PS, which…
read more here.
Keywords:
wireless;
latency;
cooperative jamming;
secrecy driven ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2021 at "IEEE Transactions on Information Forensics and Security"
DOI: 10.1109/tifs.2021.3080499
Abstract: This paper investigates the secure transmission in multiple access wiretap channels, where multiple legitimate users transmit private information to an intended receiver in the presence of multiple eavesdroppers. In order to improve security, we propose…
read more here.
Keywords:
secure transmission;
artificial noise;
multiple access;
cooperative jamming ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2018 at "IEEE Transactions on Information Theory"
DOI: 10.1109/tit.2018.2865741
Abstract: We consider strongly secure communication over a discrete memoryless multiple access wiretap channel with two transmitters. No degradation or symmetry assumptions are made on the channel. Our main result is that any rate pair known…
read more here.
Keywords:
access wiretap;
channel;
cooperative jamming;
rate ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Vehicular Technology"
DOI: 10.1109/tvt.2022.3164051
Abstract: Covert communication can hide the legitimate transmission from unauthorized eavesdropping. Benefiting from the deployment flexibility, unmanned aerial vehicles (UAVs) can be utilized to enhance communication confidentiality. In this correspondence, we consider a covert communication network…
read more here.
Keywords:
rician fading;
uav relay;
cooperative jamming;
transmission ... See more keywords