[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Hu et al., 2022 - Google Patents

Stones from other hills can Polish the jade: Exploiting wireless-powered cooperative jamming for boosting wireless information surveillance

Hu et al., 2022

Document ID
4721863371417053469
Author
Hu G
Si J
Li Z
Cai Y
Hu H
Al-Dhahir N
Publication year
Publication venue
IEEE Transactions on Communications

External Links

Snippet

This paper studies information surveillance over wireless-powered suspicious multiuser communications, where multiple suspicious transmitters (STs) first harvest wireless energy from the suspicious power beacon (PB) in phase I and then communicate with the …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/14Relay systems
    • H04B7/15Active relay systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/04Large scale networks; Deep hierarchical networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/02Diversity systems; Multi-antenna systems, i.e. transmission or reception using multiple antennas
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organizing networks, e.g. ad-hoc networks or sensor networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W16/00Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
    • H04W16/24Cell structures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W52/00Power Management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/04TPC [Transmission power control]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/065Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W16/00Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
    • H04W16/14Spectrum sharing arrangements between different networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/08Access point devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices
    • H04W88/04Terminal devices adapted for relaying to or from another terminal or user

Similar Documents

Publication Publication Date Title
Letafati et al. Jamming-resilient frequency hopping-aided secure communication for Internet-of-Things in the presence of an untrusted relay
Letafati et al. A lightweight secure and resilient transmission scheme for the Internet of Things in the presence of a hostile jammer
Zhang et al. Jamming-assisted proactive eavesdropping over two suspicious communication links
Cao et al. Relay selection for improving physical-layer security in hybrid satellite-terrestrial relay networks
Yadav et al. A comprehensive survey of physical layer security over fading channels: Classifications, applications, and challenges
Hu et al. Intelligent reflecting surface-assisted proactive eavesdropping over suspicious broadcasting communication with statistical CSI
Xu et al. Secure transmission solutions in energy harvesting enabled cooperative cognitive radio networks
Sun et al. Covertness and secrecy study in untrusted relay-assisted D2D networks
Cao et al. Cooperative double-IRS aided proactive eavesdropping
Vaishnavi et al. A survey on jamming techniques in physical layer security and anti-jamming strategies for 6G
Forouzesh et al. Simultaneous secure and covert transmissions against two attacks under practical assumptions
Li et al. Security analysis of triangle channel-based physical layer key generation in wireless backscatter communications
Jiang et al. Power allocation for intelligent interference exploitation aided physical-layer security in OFDM-based heterogeneous cellular networks
Feng et al. Securing large-scale d2d networks using covert communication and friendly jamming
Fan et al. Adversarial game against hybrid attacks in UAV communications with partial information
Saedi et al. Characterization of untrusted relaying networks in the presence of an adversary jammer
Hu et al. Maxmin fairness for UAV-enabled proactive eavesdropping with jamming over distributed transmit beamforming-based suspicious communications
Shi et al. Physical layer security techniques for data transmission for future wireless networks
Liu et al. Hierarchical Q‐Learning Based UAV Secure Communication against Multiple UAV Adaptive Eavesdroppers
Hu et al. Stones from other hills can Polish the jade: Exploiting wireless-powered cooperative jamming for boosting wireless information surveillance
Hu et al. Legitimate surveillance via jamming in multichannel relaying system
Hu et al. A fast forward full-duplex cooperative relay scheme for securing wireless communications
Ji et al. Securing wireless communications from the perspective of physical layer: A survey
Wang et al. Enhancing wireless communication privacy with artificial fading
Tourki et al. Proactive spectrum sharing incentive for physical layer security enhancement