Robust resource allocation to enhance physical layer security in systems with full-duplex receivers: Active adversary

MR Abedi, N Mokari, H Saeedi… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
… In this paper, the adversary intends to optimize its transmit and jamming signal parameters
… the active eavesdropper and other legitimate nodes of the network. Optimal power allocation

How to manage resources to provide physical layer security: Active versus passive adversary?

MR Abedi, N Mokari, H Saeedi - Physical Communication, 2018 - Elsevier
… In this paper, the CSI values between legitimate and adversary nodes are assumed to be
uncertain and to take this issue into account, robust resource allocation based on the worst-…

Free2shard: Adversary-resistant distributed resource allocation for blockchains

R Rana, S Kannan, D Tse, P Viswanath - Proceedings of the ACM on …, 2022 - dl.acm.org
… key building block: mining resource allocation using a dynamic self allocation (DSA) engine
… are of independent interest for adversarial resource allocation. The optimality property of the …

On the optimal allocation of adversarial resources

S Gisdakis, P Papadimitratos - Proceedings of the first ACM international …, 2012 - dl.acm.org
… The non-polynomial nature of these two problems is an indication of the hardness of selecting
an optimal resource allocation strategy. Nevertheless, there exist various heuristics and …

Energy-efficient UAV relaying robust resource allocation in uncertain adversarial networks

S Ahmed, MZ Chowdhury, SR Sabuj, MI Alam… - IEEE …, 2021 - ieeexplore.ieee.org
… buffer) complicates the resource allocation design. They also … secure the communication if
the adversary has a similar antenna … comfortable and secure resource allocation. However, we …

Radio resource allocation for physical-layer security in OFDMA based HetNets with unknown mode of adversary

S Sheikhzadeh, MR Javan… - 2017 Iran Workshop on …, 2017 - ieeexplore.ieee.org
… including active adversary. In this paper, we address the downlink resource allocation problem
… We assume that there exists an adversary which is able to either eavesdrop on or jam the …

Secure robust resource allocation in the presence of active eavesdroppers using full-duplex receivers

MR Abedi, N Mokari, H Saeedi… - 2015 IEEE 82nd …, 2015 - ieeexplore.ieee.org
… In the present paper, the adversaryallocation is obtained based on worst-case secrecy
rate maximization, under legitimate transmitter power constraint in the presence of an active

Efficient allocation of resources for defense of spatially distributed networks using agent‐based simulation

WM Kroshl, S Sarkani, TA Mazzuchi - Risk Analysis, 2015 - Wiley Online Library
… on efficient allocation of defense resources to minimize the … an attack by an active adversary,
recognizing the fundamental … defender, we develop a resource allocation for the defender. …

Joint resource allocation in underwater acoustic communication networks: A game-based hierarchical adversarial multiplayer multiarmed bandit algorithm

S Han, X Li, L Yan, J Xu, Z Liu, X Guan - Information Sciences, 2018 - Elsevier
adversarial multiplayer multiarmed bandit (MAB) game is employed to model the problem of
joint channel and power allocation … to apply adversarial MAB to joint resource allocation for …

Secret communication when the eavesdropper might be an active adversary

A Garnaev, W Trappe - … , MACOM 2014, Halmstad, Sweden, August 27-28 …, 2014 - Springer
… Fair resource allocation in wireless networks in the presence of a jammer. Performance
Evaluation 67, 338–349 (2010) 22. He, G., Debbah, M., Altman, E.: κ-player Bayesian waterfilling …