Eavesdropping area for evaluating the security of wireless communications

X Zhong, C Fan, S Zhou - China Communications, 2022 - ieeexplore.ieee.org
… named as eavesdropping area, to evaluate the anti-eavesdropping performance of wireless
system. … In this paper, we mainly focus on the wireless wiretap belonging to passive attack. …

On eavesdropping attacks in wireless networks

HN Dai, H Wang, H Xiao, X Li… - 2016 IEEE Intl …, 2016 - ieeexplore.ieee.org
eavesdropping attacks since we can design cost-effective antieavesdropping schemes if we
know the eavesdroppingcommunications if we know which location is more vulnerable to …

On eavesdropping attacks in wireless sensor networks with directional antennas

HN Dai, Q Wang, D Li… - International Journal of …, 2013 - journals.sagepub.com
eavesdropping activities before they can actively attack the … Thus, we only consider the
passive eavesdropping attacks in … eavesdropping model to analyze the eavesdropping attacks. …

An analytical study on eavesdropping attacks in wireless nets of things

X Li, H Wang, HN Dai, Y Wang… - Mobile Information …, 2016 - Wiley Online Library
… the eavesdropping attacks in WNoT. Besides, our results also indicate that the probability of
eavesdropping attacks … Note that we consider the far-field wireless communications in this …

On modeling eavesdropping attacks in wireless networks

X Li, J Xu, HN Dai, Q Zhao, CF Cheang… - Journal of Computational …, 2015 - Elsevier
… probability of eavesdropping attacks significantly vary, depending on the wireless environments
(… Her current research interests include wireless communications and wireless networks. …

Modeling and analysis of eavesdropping attack in 802.11 ad mmWave wireless networks

S Balakrishnan, P Wang, A Bhuyan, Z Sun - IEEE Access, 2019 - ieeexplore.ieee.org
… ABSTRACT Next generation wireless communication networks utilizing 60 GHz millimeter
wave (mmWave) frequency bands are expected to achieve multi-gigabit throughput with the …

Securing a wireless network-on-chip against jamming-based denial-of-service and eavesdropping attacks

A Vashist, A Keats, SMP Dinakarrao… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
… in on-chip communication arising from either external … wireless communication in a WiNoC
secure against persistent jamming-based denial-ofservice (DoS) attacks and eavesdropping

[HTML][HTML] Defending wireless communication against eavesdropping attacks using secret spreading codes and artificial interference

Q Wang - Computers & Security, 2021 - Elsevier
wireless communication system which suffers from adversarial eavesdropping attacks via a
… of artificial benign interference on countering eavesdropping attacks. An artificial interference …

Detection of eavesdropping attack in UAV-aided wireless systems: Unsupervised learning with one-class SVM and k-means clustering

TM Hoang, NM Nguyen… - … Wireless Communications …, 2019 - ieeexplore.ieee.org
… by attacking the UAV during the process of authentication. To detect the eavesdropping
attacks, … the features of testing data from wireless signals and another framework for generating …

Waveguide eavesdropping threat for terahertz wireless communications

W Liu, P Li, X Meng, L Zhao, Y Qiao… - … Communications …, 2022 - ieeexplore.ieee.org
… We demonstrate successful eavesdropping attacks for a 16-QAM data link at rates up to 5
Gb/s. Our work highlights the importance of system designs in resisting waveguide-based …