Game theory-based attack and defense analysis in virtual wireless networks with jammers and eavesdroppers

BS Alsulami, C Bajracharya, DB Rawat - Digital Communications and …, 2021 - Elsevier
Dynamic spectrum sharing and cognitive radio networks were proposed to enhance the
Radio Frequency (RF) spectrum utilization. However, there are several challenges to realize …

Proactive eavesdropping over multiple suspicious communication links with heterogeneous services

D Xu, H Zhu - IEEE Transactions on Wireless Communications, 2022 - ieeexplore.ieee.org
To legitimately eavesdrop communications of suspicious users such as criminals, proactive
eavesdropping has been proposed as an effective approach. Current works considered that …

Secrecy transmission capacity in noisy wireless ad hoc networks

J Zhu, Y Chen, Y Shen, O Takahashi, X Jiang… - Ad hoc networks, 2014 - Elsevier
This paper considers the transmission of confidential messages over noisy wireless ad hoc
networks, where both background noise and interference from concurrent transmitters affect …

Performance analysis of short packet communications with multiple eavesdroppers

N Arı, N Thomos, L Musavian - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
This paper studies the performance of short packet communications in the presence of
multiple eavesdroppers. We start our investigation by examining the fading wiretap channel …

Security protection over wireless fading channels by exploiting frequency selectivity

M Hussain, Q Du, L Sun, P Ren - 2016 8th International …, 2016 - ieeexplore.ieee.org
Secure wireless communication has always been a hot research topic due to the
vulnerabilities associated with wireless channel. Physical layer aspects to secure wireless …

Secure communication using interference cancellation against multiple jammers

CDT Thai, VNQ Bao, NS Vo - IEEE Transactions on Vehicular …, 2022 - ieeexplore.ieee.org
In the area of physical-layer security for wireless communications, jamming is one of the
methods that a malicious agent uses to actively attack legitimate nodes. The jammers make …

Covert wireless communications in IoT systems: Hiding information in interference

Z Liu, J Liu, Y Zeng, J Ma - IEEE Wireless Communications, 2018 - ieeexplore.ieee.org
Wireless channels are increasingly being used to transmit highly sensitive information in the
Internet of Things. However, traditional cryptography methods cannot solve all security …

On performance analysis of protective jamming schemes in wireless sensor networks

X Li, HN Dai, H Wang, H Xiao - Sensors, 2016 - mdpi.com
Wireless sensor networks (WSNs) play an important role in Cyber Physical Social Sensing
(CPSS) systems. An eavesdropping attack is one of the most serious threats to WSNs since …

On the equivalence between interference and eavesdropping in wireless communications

G Gomez, FJ López-Martínez… - IEEE Transactions …, 2015 - ieeexplore.ieee.org
We show that the problem of analyzing the outage probability (OP) in cellular systems
affected by cochannel interference (CCI) and background noise (BN) is mathematically …

Eavesdropping attack in collaborative wireless networks: Security protocols and intercept behavior

Y Zou, X Wang, W Shen - Proceedings of the 2013 IEEE 17th …, 2013 - ieeexplore.ieee.org
In this paper, we investigate security issues in a collaborative wireless network in the
presence of eavesdropping attacks, where multiple amplify-and-forward (AF) relays are …