Hu et al., 2022 - Google Patents
Stones from other hills can Polish the jade: Exploiting wireless-powered cooperative jamming for boosting wireless information surveillanceHu et al., 2022
- Document ID
- 4721863371417053469
- Author
- Hu G
- Si J
- Li Z
- Cai Y
- Hu H
- Al-Dhahir N
- Publication year
- Publication venue
- IEEE Transactions on Communications
External Links
Snippet
This paper studies information surveillance over wireless-powered suspicious multiuser communications, where multiple suspicious transmitters (STs) first harvest wireless energy from the suspicious power beacon (PB) in phase I and then communicate with the …
- 239000010977 jade 0 title description 2
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/14—Relay systems
- H04B7/15—Active relay systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/04—Large scale networks; Deep hierarchical networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna systems, i.e. transmission or reception using multiple antennas
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organizing networks, e.g. ad-hoc networks or sensor networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W16/00—Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
- H04W16/24—Cell structures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W52/00—Power Management, e.g. TPC [Transmission Power Control], power saving or power classes
- H04W52/04—TPC [Transmission power control]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/065—Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W16/00—Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
- H04W16/14—Spectrum sharing arrangements between different networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/08—Access point devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
- H04W88/04—Terminal devices adapted for relaying to or from another terminal or user
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Letafati et al. | Jamming-resilient frequency hopping-aided secure communication for Internet-of-Things in the presence of an untrusted relay | |
Letafati et al. | A lightweight secure and resilient transmission scheme for the Internet of Things in the presence of a hostile jammer | |
Zhang et al. | Jamming-assisted proactive eavesdropping over two suspicious communication links | |
Cao et al. | Relay selection for improving physical-layer security in hybrid satellite-terrestrial relay networks | |
Yadav et al. | A comprehensive survey of physical layer security over fading channels: Classifications, applications, and challenges | |
Hu et al. | Intelligent reflecting surface-assisted proactive eavesdropping over suspicious broadcasting communication with statistical CSI | |
Xu et al. | Secure transmission solutions in energy harvesting enabled cooperative cognitive radio networks | |
Sun et al. | Covertness and secrecy study in untrusted relay-assisted D2D networks | |
Cao et al. | Cooperative double-IRS aided proactive eavesdropping | |
Vaishnavi et al. | A survey on jamming techniques in physical layer security and anti-jamming strategies for 6G | |
Forouzesh et al. | Simultaneous secure and covert transmissions against two attacks under practical assumptions | |
Li et al. | Security analysis of triangle channel-based physical layer key generation in wireless backscatter communications | |
Jiang et al. | Power allocation for intelligent interference exploitation aided physical-layer security in OFDM-based heterogeneous cellular networks | |
Feng et al. | Securing large-scale d2d networks using covert communication and friendly jamming | |
Fan et al. | Adversarial game against hybrid attacks in UAV communications with partial information | |
Saedi et al. | Characterization of untrusted relaying networks in the presence of an adversary jammer | |
Hu et al. | Maxmin fairness for UAV-enabled proactive eavesdropping with jamming over distributed transmit beamforming-based suspicious communications | |
Shi et al. | Physical layer security techniques for data transmission for future wireless networks | |
Liu et al. | Hierarchical Q‐Learning Based UAV Secure Communication against Multiple UAV Adaptive Eavesdroppers | |
Hu et al. | Stones from other hills can Polish the jade: Exploiting wireless-powered cooperative jamming for boosting wireless information surveillance | |
Hu et al. | Legitimate surveillance via jamming in multichannel relaying system | |
Hu et al. | A fast forward full-duplex cooperative relay scheme for securing wireless communications | |
Ji et al. | Securing wireless communications from the perspective of physical layer: A survey | |
Wang et al. | Enhancing wireless communication privacy with artificial fading | |
Tourki et al. | Proactive spectrum sharing incentive for physical layer security enhancement |