Articles with "legitimate user" as a keyword



Photo from wikipedia

Jamming Mitigation via Hierarchical Security Game for IoT Communications

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Access"

DOI: 10.1109/access.2018.2793280

Abstract: In the Internet of Things (IoT), the malicious node with sensorial capability can smartly launch jamming attacks only when it detects the legitimate transmission, known as the reactive jamming. Compared with the conventional constant jamming… read more here.

Keywords: iot; game; transmission; legitimate user ... See more keywords
Photo from wikipedia

Physical-Layer Security for Proximal Legitimate User and Eavesdropper: A Frequency Diverse Array Beamforming Approach

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2017.2765500

Abstract: Transmit beamforming and artificial noise-based methods have been widely employed to achieve physical-layer (PHY) security. However, these approaches may fail to provide satisfactory secure performance if the channels of legitimate user (LU) and eavesdropper (Eve)… read more here.

Keywords: array; user eavesdropper; frequency; physical layer ... See more keywords