Sign Up to like & get
recommendations!
0
Published in 2018 at "IEEE Access"
DOI: 10.1109/access.2018.2793280
Abstract: In the Internet of Things (IoT), the malicious node with sensorial capability can smartly launch jamming attacks only when it detects the legitimate transmission, known as the reactive jamming. Compared with the conventional constant jamming…
read more here.
Keywords:
iot;
game;
transmission;
legitimate user ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2018 at "IEEE Transactions on Information Forensics and Security"
DOI: 10.1109/tifs.2017.2765500
Abstract: Transmit beamforming and artificial noise-based methods have been widely employed to achieve physical-layer (PHY) security. However, these approaches may fail to provide satisfactory secure performance if the channels of legitimate user (LU) and eavesdropper (Eve)…
read more here.
Keywords:
array;
user eavesdropper;
frequency;
physical layer ... See more keywords