The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, an improved cooperative jamming (CJ) strategy is developed for physical layer (PHY) security in a multi-hop wireless communication system which employs beamforming in the last hop. Users are assigned to independent groups based on the merger-and-split rule in a coalition game. The secrecy capacity for a valid coalition is a non-convex optimization problem which cannot easily be solved...
In this paper, the security of multi-input single- output (MISO) amplify-and-forward relaying network with untrustworthy relay nodes is considered, where the untrustworthy nodes can help to forward the received signal and they may also try to decode such information, which can be regarded as potential eavesdroppers (Eves). To deal with such kind of smarter Eves, relay selection is adopted and both...
The communication process of a secure relay system usually has two stages: source to relay, relay to destination. When the source is only equipped with one antenna, the information transmission is not secure during the first stage. In this paper, we propose a novel three-stage scheme to transmit confidential messages in an amplify-and-forward (AF) relay system. In the proposal, during the additional...
This paper investigates the problem of power allocation, in the presence of a malicious adversary. For this scenario, we consider a source, a destination and full-duplex (FD) relay, that receives private messages and transmits jamming signals on the same time and frequency band. In this system model, we assume the adversary can jam legitimate link or eavesdrop the private message, and benefit from...
In this paper, the secrecy of a cooperative system consisting of a single source, relay, destination and eavesdropper is analyzed. The threshold-selection decode-and-forward relay is considered, where the relay can correctly decode and forward only if it satisfies a threshold signal-to-noise ratio (SNR). Both destination and eavesdropper take advantage of the direct and relayed transmissions through...
Current-transformer (CT) saturation has a major impact on the operation of differential protection schemes. Transformer differential protection must maintain security during CT saturation for external faults while preserving high sensitivity and speed of operation for lower magnitude internal faults. Relay manufacturers provide very little information or direction for protection engineers to set relays...
In this paper, we investigate a cooperative jamming strategy combined with a null-steering beamforming technique (CJ-NB strategy) for physical-layer security. To evaluate the achievable secrecy rate, the source input distribution is assumed to be Gaussian, and the achievable secrecy rate can be formulated as an optimization problem for power allocation (PA). By solving the problem, an asymptotically...
In this paper we investigate a cooperative jamming (CJ) strategy based Stackelberg security game to improve physical layer security over multiuser OFDMA networks. Each source node tries to deliver messages to its intended destination node securely in the presence of a passive eavesdropper. Fortunately, these node pairs can resort to a friendly jammer to enhance their communication. But the jamming...
In this paper, a series of novel secure dynamic routing protocols are proposed to provide the end-to-end security. Unlike the existing dynamic routing protocols with security consideration which focus on a certain specific network threat, in the paper the proposed approach is based on a comprehensive network security evaluation framework. By analyzing the threats, vulnerabilities, countermeasures,...
To ensure security in data transmission is one of the most important issues for wireless relay networks. In this paper, we consider a cooperative network, consisting of one source node, one destination node, one eavesdropper node, and a number of relay nodes. Specifically, the source selects several relay nodes which can help forward the signal to the corresponding destination to achieve the best...
A principal factor in sensor network design is energy efficiency. In this work, we propose to extend the lifetime of sensor networks using appropriate choice of sensor node distribution. The key idea of our scheme is to deploy more nodes in areas of extensive energy usage. Using this scheme of sensor node distribution, we use probabilistic angular routing to route data packets from the sensor nodes...
This paper proposes a fast forward medium access control protocol (FFMAC) for quality-of-service (QoS) guarantee in multihop IEEE 802.11s wireless mesh networks with multiple channels. To the best of our knowledge, the proposed protocol is the first one which considers the multihop and multichannel issues simultaneously. It provides higher priority for real-time applications, while remaining the distributed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.