Articles with "legitimate user" as a keyword



Jamming Mitigation via Hierarchical Security Game for IoT Communications

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Access"

DOI: 10.1109/access.2018.2793280

Abstract: In the Internet of Things (IoT), the malicious node with sensorial capability can smartly launch jamming attacks only when it detects the legitimate transmission, known as the reactive jamming. Compared with the conventional constant jamming… read more here.

Keywords: iot; game; transmission; legitimate user ... See more keywords

Time-Modulated 1-Bit Metasurface-Based Secure Directional Transmission

Sign Up to like & get
recommendations!
Published in 2024 at "IEEE Wireless Communications Letters"

DOI: 10.1109/lwc.2024.3435938

Abstract: Physical-layer security techniques can be added on top of the cryptography-based security framework, mainly relying on the multi-antenna-based beamforming and artificial noise, where yet the high-cost multiple radio frequency (RF) chains are typically required. In… read more here.

Keywords: modulated bit; time modulated; time; bit metasurface ... See more keywords

Physical-Layer Security for Proximal Legitimate User and Eavesdropper: A Frequency Diverse Array Beamforming Approach

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2017.2765500

Abstract: Transmit beamforming and artificial noise-based methods have been widely employed to achieve physical-layer (PHY) security. However, these approaches may fail to provide satisfactory secure performance if the channels of legitimate user (LU) and eavesdropper (Eve)… read more here.

Keywords: array; user eavesdropper; frequency; physical layer ... See more keywords

Secure Wireless Communication for Correlated Legitimate User and Eavesdropper Channels via Movable-Antenna Enhanced Frequency Diverse Array

Sign Up to like & get
recommendations!
Published in 2025 at "Entropy"

DOI: 10.3390/e27040401

Abstract: Physical-layer (PHY) security is widely used as an effective method for ensuring secure wireless communications. However, when the legitimate user (LU) and the eavesdropper (Eve) are in close proximity, the channel coupling can significantly degrade… read more here.

Keywords: secure wireless; antenna; array; legitimate user ... See more keywords