… The passive adversaries are half duplex and only … activeadversaries are full duplex and able to jam and eavesdrop simultaneously. Since the channel information between adversaries …
W Trappe - IEEE communications magazine, 2015 - ieeexplore.ieee.org
… array of adversary modes in which the adversary is more active and, frankly, more clever. … the context of physical layersecurity, we must nonetheless strive to strengthen our adversarial …
D Kapetanovic, G Zheng… - IEEE Communications …, 2015 - ieeexplore.ieee.org
… challenges of physical layersecurity integration in MaMIMO … We then review a pilot contamination scheme that actively … methods from literature that detect active attacks on MaMIMO. …
N Zhang, R Wu, S Yuan, C Yuan… - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
… In PHY security, channel state information (CSI) estimated through reverse pilot training is … is also vulnerable to adversaries. An adversary can actively launch pilot contamination attacks …
… adversaries may be too weak, but malicious adversaries may conversely be too strong to defend against. They introduced the notion of a “covert” adversary which is an activeadversary …
M Mitev, A Chorti, EV Belmega, HV Poor - Entropy, 2021 - mdpi.com
… phase between Alice and Bob could allow an adversary (Mallory) to estimate the channels Alice… , ensuring that the extracted key bits are secret from both active and passive adversaries. …
… the adversary at the physical layer, thus protecting themselves from disruption attacks. Beyond physical layersecurity, … many higher-layersecurity mechanisms including data encryption. …
… /or secure communications in the presence of adversarial … to account for the presence of an active eavesdropper in [179]-[… same rate as in the passive-adversary case, or such secret-key …
K Horák, Q Zhu, B Bošanský - Decision and Game Theory for Security: 8th …, 2017 - Springer
… stochastic games to reason about active deception in network security, where the defender … located in the deeper layers of the network. In our case, the second layer consists of data …