The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the huge develop of low consumption wireless devices both for industry and human wellness and comfort, such as Wireless Body Area Network for health active care and Wireless Sensors Networks for industry environments, new challenges are proposed for the both industry and scientific community. Security is one of this matters. Given the specific characteristics of the low consumptions modern devices,...
We consider joint optimization of artificial noise (AN) and information signals in a MIMO wiretap interference network, wherein the transmission of each link may be overheard by several MIMO-capable eavesdroppers. Each information signal is accompanied with AN, generated by the same user to confuse nearby eavesdroppers. Using a noncooperative game, a distributed optimization mechanism is proposed...
Cognitive radio has become one of the most promising technology and probable solution for the shortage of spectrum. This paper deals with a different class of security problem, where multiple half-duplex secondary users independently eavesdrop the communication of primary users, unless given access to communicate over the same spectrum band. Primary Station (PS) needs to characterize the optimal rule...
The broadcast nature of wireless communication makes it vulnerable to Eavesdropping. To enhance the communication security, cooperative jamming (CJ) is applied and studied in many previous works. However, jamming signal may also decrease the signal-to noise ratio (SNR) of legal receivers, and degrade the overall performance of networks. Therefore, the jammer power must be reasonably controlled. In...
In this work, a mobility based perspective of jamming is presented, based on our ongoing work related to secure communication in networks of autonomous vehicles. The framework of differential game theory is extended from the classical two-player scenario to multi-player games involving two teams. Necessary conditions satisfied by the optimal trajectories are derived under assumptions of uniqueness...
This paper explores network security as a game between attacker and defender. In this game, the attacker and defender both anticipate each other??s best strategy. Thus, instead of focusing on the best response to an attack, the paper analyzes the Nash equilibrium for the joint strategies. The paper studies two types of problem. The first type concerns networks where the data can be modified by an...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.