A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Optimal Power Allocation for Jammer Nodes in Wireless Localization Systems
2017
IEEE Transactions on Signal Processing
In this paper, optimal power allocation strategies are investigated for jammer nodes in a wireless localization system. ...
strategies for jammer power allocation are identified. ...
Contributions In this paper, a new scheme (named as the restricted scheme) is proposed for optimal jammer power allocation in wireless localization systems. ...
doi:10.1109/tsp.2017.2757912
fatcat:udb5zosgajcnnlpgbuuxutmvca
Optimal jamming of wireless localization systems
2015
2015 IEEE International Conference on Communication Workshop (ICCW)
In this study, optimal jamming of wireless localization systems is investigated. ...
Two optimal power allocation schemes are proposed for jammer nodes in the presence of total and peak power constraints. ...
Although there exists no previous work on optimal power allocation for jammer nodes in a wireless localization system, power allocation for wireless localization and radar systems has recently been considered ...
doi:10.1109/iccw.2015.7247286
dblp:conf/icc/GeziciGBJ15
fatcat:4ddbtfkun5hjrloksm7wlas5q4
Robust Power Allocation for Cooperative Localization in Jammed Wireless Sensor Networks
2019
Wireless Communications and Mobile Computing
In this paper, we propose robust power allocation strategies to improve the localization performance in cooperative wireless sensor localization systems when suffering interference of jammer nodes. ...
So in this paper, we first present the optimization framework in jammed cooperative localization systems. ...
Wireless Communications and Mobile Computing ...
doi:10.1155/2019/6904687
fatcat:otyyn2htjre4bpulutbmvbas3e
Jamming of Wireless Localization Systems
2016
IEEE Transactions on Communications
In this study, optimal jamming of wireless localization systems is investigated. ...
Two optimal power allocation schemes are proposed for jammer nodes in the presence of total and peak power constraints. ...
Although there exists no previous work on optimal power allocation for jammer nodes in a wireless localization system, power allocation for wireless localization and radar systems has recently been considered ...
doi:10.1109/tcomm.2016.2558560
fatcat:qheyko5bujfojos4grf7s5noqu
Power Control Games Between Anchor and Jammer Nodes in Wireless Localization Networks
2018
IEEE Transactions on Signal and Information Processing over Networks
In particular, power control games between anchor and jammer nodes are designed for a wireless localization network in which each target node estimates its position based on received signals from anchor ...
In this paper, a game theoretic framework is proposed for wireless localization networks that operate in the presence of jammer nodes. ...
In addition, the optimal power allocation problem is investigated for jammer nodes in a given wireless localization network based on the CRLB metric, and the optimal jamming strategies are obtained in ...
doi:10.1109/tsipn.2018.2797020
fatcat:q3fw6wjrtjfv3ma46eowuiaeai
Improved Wireless Secrecy Rate Using Distributed Auction Theory
2009
2009 Fifth International Conference on Mobile Ad-hoc and Sensor Networks
The auction is defined such that the source-destination links provide bids for the jammer to interfere the eavesdropper, therefore increasing their secrecy capacities. ...
Physical layer security is an emerging security area that explores possibilities of achieving perfect secrecy data transmission between the intended network nodes, while possible malicious nodes that eavesdrop ...
In the performance upper bound, the jammer asks all sources to reveal their evaluations of the jammer's power, upon which the jammer calculates the optimal power allocation and allocates accordingly. ...
doi:10.1109/msn.2009.73
dblp:conf/msn/HanMDH09
fatcat:v3pxnctrzbf4jjtpdvqnv75tmy
Optimal jammer placement in wireless localization networks
2015
2015 IEEE 16th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC)
The optimal jammer placement problem is proposed for a wireless localization network, where the aim is to degrade the accuracy of locating target nodes as much as possible. ...
In particular, the optimal location of a jammer node is obtained in order to maximize the minimum of the Cramér-Rao lower bounds for a number of target nodes under location related constraints for the ...
The study in [3] considers fixed locations for the jammer nodes and aims to perform optimal power allocation. ...
doi:10.1109/spawc.2015.7227121
dblp:conf/spawc/GeziciBGJ15
fatcat:ur4pvx2p4naflnqszso4ocioiy
Energy-Efficient Routing in Wireless Networks in the Presence of Jamming
2016
IEEE Transactions on Wireless Communications
In a multihop wireless network, where jammers can interfere with the transmission of user messages at intermediate nodes along the path, one can employ jamming oblivious routing and then employ physical-layer ...
The effectiveness and simple implementation of physical layer jammers make them an essential threat for wireless networks. ...
power allocation for a given path Π, and then use this result to design a routing algorithm to find the optimal path. ...
doi:10.1109/twc.2016.2591016
fatcat:hvlv5ovhcbhcbibdzwfg25pjfe
Optimal Placement and Power Allocation for Jammers in Wireless Mesh Networks
2015
2015 IEEE 82nd Vehicular Technology Conference (VTC2015-Fall)
Degree: Master of Engineering (Electronic Engineering) Keywords: jammer placement, jammer power allocation, optimisation, wireless jammers, wireless mesh networks, wireless network security Wireless networks ...
allocation of the wireless jammers. ...
A mathematical model is developed for the joint optimal placement and power allocation of the wireless jammers. ...
doi:10.1109/vtcfall.2015.7391055
dblp:conf/vtc/LallAM15
fatcat:guvsyyakffgjjeofnte6wqgyl4
Outage Performance Aware Joint Power Allocation and Access Point Placement to Defeat Jamming in Uplink Pairwise NOMA
2021
IEEE Open Journal of the Communications Society
Since the malicious jammer and the AP have conflicting interests in terms of communication reliability, we formulate a non-cooperative game for the two players considering their positions and the power ...
We propose using hybrid simulated annealing -greedy algorithms to address the joint power allocation and AP placement problem for the cases of both a fixed and a mobile jammer. ...
Uhlemann are partly funded by the Serendipity project through the Swedish Foundation for Strategic Research. ...
doi:10.1109/ojcoms.2021.3103540
fatcat:7jkqaesb75ejvdzjliim235mpe
Hammer and anvil: The threat of a cross-layer jamming-aided data control attack in multihop wireless networks
2015
2015 IEEE Conference on Communications and Network Security (CNS)
We show that an adversary, as long as it controls a few of the nodes, and with the help of a few assisting jammers, can extend control over a significant portion of the data in the network even with very ...
This paper considers potential risks to data security in multi-hop infrastructureless wireless networks where crosslayer routing protocols are used. ...
Then, j can optimally allocate its power budget to minimize P n2{n|9m2Rj ,b m n =1} µ n (P j ). There are 2 remarks on the type 2 jammer. ...
doi:10.1109/cns.2015.7346847
dblp:conf/cns/ZhangM15
fatcat:qje24gxdvvap5ktvo7qf2g523u
Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection
2011
IEEE/ACM Transactions on Networking
In this article, we consider the problem of jamming-aware source routing in which the source node performs traffic allocation based on empirical jamming statistics at individual network nodes. ...
We formulate this traffic allocation as a lossy network flow optimization problem using portfolio selection theory from financial statistics. ...
power of node i, the signal power of the jammers, their relative distances from node j, and the path loss behavior of the wireless medium. ...
doi:10.1109/tnet.2010.2057515
fatcat:nlrwcr5curchlcsatx7fzew3q4
Strategic Deployment of Swarm of UAVs for Secure IoT Networks
[article]
2023
arXiv
pre-print
Then, the association of IoT nodes, the 3D positioning of the UAVs and the power allocation of the UAVs are obtained by leveraging game theoretic and convex optimization-based tools with the goal of improving ...
Security provisioning for low-complex and constrained devices in the Internet of Things (IoT) is exacerbating the concerns for the design of future wireless networks. ...
In [15] , a UAV friendly jammer scheme is introduced to enhance the secrecy rate of a wireless system, where the problem of trajectory optimization is investigated. ...
arXiv:2309.05104v1
fatcat:vvuw7wlojzadfpzx34rdnbrsie
Applications of Economic and Pricing Models for Wireless Network Security: A Survey
[article]
2017
arXiv
pre-print
This paper provides a comprehensive literature review on applications of economic and pricing theory to security issues in wireless networks. ...
In this paper, we review economic and pricing approaches proposed to address major security issues in wireless networks including eavesdropping attack, Denial-of-Service (DoS) attack such as jamming and ...
It was proved that there exists a unique optimal solution for the allocated power and the prices. ...
arXiv:1707.07846v1
fatcat:xb3jvolwmjad7oxdefdd2pq7dq
Joint cooperative relaying and jamming for maximum secrecy capacity in wireless networks
2014
2014 IEEE International Conference on Communications (ICC)
A mixed integer programming problem is formulated to maximize the secrecy rate with the proposed joint relaying and jamming, by which the optimal role assignment to a relay and the associated optimal power ...
This paper proposes a joint cooperative relaying and jamming scheme based on distributed beamforming to enhance the secrecy rate of a wireless channel in the presence of an eavesdropper. ...
Optimal power allocation to jammers and relays will be studied in Section IV. ...
doi:10.1109/icc.2014.6884021
dblp:conf/icc/WangCSC14
fatcat:3uygtt7pl5cmnpz5lw7jhuj4ca
« Previous
Showing results 1 — 15 out of 805 results