The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the huge develop of low consumption wireless devices both for industry and human wellness and comfort, such as Wireless Body Area Network for health active care and Wireless Sensors Networks for industry environments, new challenges are proposed for the both industry and scientific community. Security is one of this matters. Given the specific characteristics of the low consumptions modern devices,...
We consider joint optimization of artificial noise (AN) and information signals in a MIMO wiretap interference network, wherein the transmission of each link may be overheard by several MIMO-capable eavesdroppers. Each information signal is accompanied with AN, generated by the same user to confuse nearby eavesdroppers. Using a noncooperative game, a distributed optimization mechanism is proposed...
The broadcast nature of wireless communication makes it vulnerable to Eavesdropping. To enhance the communication security, cooperative jamming (CJ) is applied and studied in many previous works. However, jamming signal may also decrease the signal-to noise ratio (SNR) of legal receivers, and degrade the overall performance of networks. Therefore, the jammer power must be reasonably controlled. In...
In this paper, we'll try to discuss the cooperation of nodes representing one of the important factors in improving the quality of service (QoS) and security in mobile ad hoc networks (MANETs). The routing protocols for MANETs are designed based on the assumption that all participating nodes are fully cooperative. In such networks, the Selfish behaviour is among the big challenges and can lead to...
In this paper, we consider a multi-input-multi-output (MIMO) wiretap channel with a multi-antenna eavesdropper, where a private cooperative jammer is employed to improve the achievable secrecy rate. The legitimate user pays the legitimate transmitter for its secured communication based on the achieved secrecy rate. We first approximate the legitimate transmitter covariance matrix by employing Taylor...
In this work, a mobility based perspective of jamming is presented, based on our ongoing work related to secure communication in networks of autonomous vehicles. The framework of differential game theory is extended from the classical two-player scenario to multi-player games involving two teams. Necessary conditions satisfied by the optimal trajectories are derived under assumptions of uniqueness...
We consider game theoretic models of wireless medium access control (MAC) in which each transmitter makes individual decisions regarding their power level or transmission probability. This allows for scalable distributed operation; however, it can also enable users to pursue malicious objectives such as jamming other nodes to deny them service. We study games with two types of players: selfish and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.