The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we study full-view coverage in camera sensor networks, by exploiting their limited mobility of orientation rotation. We focus on the fairness based coverage maximization problem, i.e., how to schedule the orientations of the camera sensors to maximize the minimum accumulated full-view coverage time of target points. To solve this problem, we first try to reduce the space dimension of...
In this paper, we investigate the secure communication of cognitive full-duplex relay networks in the presence of multiple eavesdroppers and multiple primary receivers. In the considered network, multiple full-duplex relays are deployed to transfer information in the secondary network, under the malicious attempts of non- colluding/colluding eavesdroppers. Meanwhile, the transmit powers of secondary...
Online advertising has become a tremendous business, and continues to grow rapidly. There are mainly two ways to distribute ads in online advertising: contracts and auctions. Previous researches usually focus on ad allocation through either contracts or auctions, while the problem of allocating ads simultaneously through both methods has not been carefully addressed. Jointly considering these two...
We consider a Gaussian network consisting of a source that aims to communicate to its legitimate destination via an untrusted relay node in the presence of an external eavesdropper. The source wishes to send two independent messages to the destination: one message must be kept secret from the external eavesdropper only, while the other message must be kept secret from the external eavesdropper and...
This paper investigates artificial noise injection into the temporal and spatial dimensions of a legitimate wireless communication system to secure its transmissions from potential eavesdropping. We consider a multiple-input single-output (MISO) orthogonal frequency division multiplexing (OFDM) system in the presence of a single-antenna passive eavesdropper and derive both the secrecy rate and average...
In this paper, we investigate the problem of jammer selection for securing Cooperative Cognitive Radio Networks (CCRNs) with the Multiple-Input Multiple- Output (MIMO) capability. In the CCRN under our consideration, there exist a pair of Primary Users (PUs), a relay node, a number of Secondary User (SU) pairs, and an eavesdropper. The PUs need to select a pair of SUs as jammers to interfere with...
Betweenness centrality is a popular metric in social science, and recently it was adopted also in computer science. Betweenness identifies the node, or the nodes, that are most suitable to perform critical network functions, such as firewalling and intrusion detection. However, computing centrality is resource-demanding, we can not give for granted that it can be computed in real time at every change...
In this paper, the critical effect of noisy feedback in improving the physical layer security is investigated. Unlike previous works, where the eavesdropper's channel state information (either the instantaneous channel state information or the channel distribution information) is assumed known, a feedback and jamming scheme without any eavesdropper's channel state information is studied, which allows...
This paper proposes a full-duplex physical security model with self-interference remaining. This model doesn't need the assistance of external jamming nodes and it ensures that the uplink and downlink transmission of the full-duplex system can achieve the required secrecy rate. Meanwhile, it creates a base station transmission power optimization problem with flexible constraints and a two-level method...
We investigate the physical layer security of synchronous multiple access transmissions using the Alamouti space-time block code in fading channels where multiple users communicate with a single intended receiver in the presence of an eavesdropper. We propose an artificial-noise-aided technique to secure the transmissions by having the Alamouti users collaborate with each other, without exchanging...
We present a random access method inspired on Bloom filters that is suited for Machine-Type Communications (MTC). Each accessing device sends a signature during the contention process. A signature is constructed using the Bloom filtering method and contains information on the device identity and the connection establishment cause. We instantiate the proposed method over the current LTE-A access protocol...
Data randomization or scrambling has been effectively used in various applications to improve the data security. In this paper, we use the idea of data randomization to proactively randomize the spectrum (re)allocation to improve connections' security. As it is well-known that random (re)allocation fragments the spectrum and thus increases blocking in elastic optical networks, we analyze the tradeoff...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.