Articles with "jammer" as a keyword



Photo by cokdewisnu from unsplash

A design and development of an intelligent jammer and jamming detection methodologies using machine learning approach

Sign Up to like & get
recommendations!
Published in 2018 at "Cluster Computing"

DOI: 10.1007/s10586-018-2822-7

Abstract: Nowadays, the utilization of mobile phones has increased rapidly. Due to this evolution schools, mosques, prisons, etc., require silence and security. This is achieved by using the mobile phone jammers. An intelligent mobile jammer is… read more here.

Keywords: detection; machine learning; using machine; jammer ... See more keywords
Photo by mluotio83 from unsplash

Network Design in the Presence of a Link Jammer: a Zero-Sum Game Formulation

Sign Up to like & get
recommendations!
Published in 2017 at "IFAC-PapersOnLine"

DOI: 10.1016/j.ifacol.2017.08.1278

Abstract: Abstract This paper considers the problem of designing a Network such that a set of dynamic rules converges as fast as possible to the Nash equilibrium in a class of repeated games, despite the attempt… read more here.

Keywords: network; sum game; zero sum; network design ... See more keywords
Photo from wikipedia

Jamming Mitigation via Hierarchical Security Game for IoT Communications

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Access"

DOI: 10.1109/access.2018.2793280

Abstract: In the Internet of Things (IoT), the malicious node with sensorial capability can smartly launch jamming attacks only when it detects the legitimate transmission, known as the reactive jamming. Compared with the conventional constant jamming… read more here.

Keywords: iot; game; transmission; legitimate user ... See more keywords
Photo from wikipedia

A Multi-Domain Anti-Jamming Scheme Based on Bayesian Stackelberg Game With Imperfect Information

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3230004

Abstract: To deal with the smart jammer which can sense the legitimate communication and adjust its jamming policy, an anti-jamming game scheme is proposed in this paper to jointly optimize the transmission power and frequency hopping… read more here.

Keywords: domain; game; scheme; imperfect information ... See more keywords
Photo by sarahdorweiler from unsplash

FSK-Based Reactive Jammer Piggybacking

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Communications Letters"

DOI: 10.1109/lcomm.2016.2615900

Abstract: The complexity and sophistication of communications jamming will continue to increase over time. The traditional approach to jammer mitigation is to harden radios, often sacrificing communications performance for more advanced jamming protection. To provide an… read more here.

Keywords: based reactive; fsk based; reactive jammer; jammer piggybacking ... See more keywords
Photo from wikipedia

Distributionally Robust Optimization for Secure Transmission With Assisting Jammer in MISO Downlink Networks

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Communications Letters"

DOI: 10.1109/lcomm.2018.2886025

Abstract: This letter investigates secure transmission with imperfect channel state information (CSI) in multi-input single-output downlink wireless networks that consist of a transmitter, a desired receiver, one eavesdropper, and an assisting jammer. Specifically, only rough first-… read more here.

Keywords: secure transmission; downlink; assisting jammer; distributionally robust ... See more keywords
Photo from wikipedia

Covert Communication With Cognitive Jammer

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Wireless Communications Letters"

DOI: 10.1109/lwc.2020.3003472

Abstract: This letter studied the covert communication with the help of the cognitive jammer over an additive white Gaussian noise (AWGN) channel. The cognitive jammer first senses Alice’s transmission; then, based on its sensing results, it… read more here.

Keywords: cognitive jammer; communication cognitive; jammer; covert communication ... See more keywords
Photo by alonsoreyes from unsplash

Know Thy Enemy: An Opponent Modeling-Based Anti-Intelligent Jamming Strategy Beyond Equilibrium Solutions

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Wireless Communications Letters"

DOI: 10.1109/lwc.2022.3219434

Abstract: We investigate the problem of dynamic spectrum anti-jamming access against intelligent jammer using game theory and opponent modeling. Previous work has formulated the interaction between the user and the intelligent jammer as an adversarial game,… read more here.

Keywords: equilibrium solutions; beyond equilibrium; opponent modeling; jamming ... See more keywords
Photo from wikipedia

A Cooperative Deception Strategy for Covert Communication in Presence of a Multi-antenna Adversary

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Communications"

DOI: 10.1109/tcomm.2023.3277520

Abstract: Covert transmission is investigated for a cooperative deception strategy, where a cooperative jammer (Jammer) tries to attract a multi-antenna adversary (Willie) and degrade the adversary's reception ability for the signal from a transmitter (Alice). For… read more here.

Keywords: cooperative deception; deception strategy; multi antenna; strategy ... See more keywords
Photo by vita_belvita from unsplash

Arbitrarily Varying Wiretap Channels With Non-Causal Side Information at the Jammer

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Information Theory"

DOI: 10.1109/tit.2023.3245722

Abstract: Secure communication in a potentially hostile environment is becoming more and more critical. The Arbitrarily Varying Wiretap Channel (AVWC) provides information-theoretical bounds on how much information can be exchanged even in the presence of an… read more here.

Keywords: information; causal side; non causal; side information ... See more keywords
Photo from wikipedia

Gaussian Multiuser Wiretap Channels in the Presence of a Jammer-Aided Eavesdropper

Sign Up to like & get
recommendations!
Published in 2022 at "Entropy"

DOI: 10.3390/e24111595

Abstract: This paper considers secure communication in the presence of an eavesdropper and a malicious jammer. The jammer is assumed to be oblivious of the communication signals emitted by the legitimate transmitter(s) but can employ any… read more here.

Keywords: wiretap channel; presence; jammer; wiretap ... See more keywords