期刊文献+
共找到396篇文章
< 1 2 20 >
每页显示 20 50 100
Joint jammer selection and power optimization in covert communications against a warden with uncertain locations 被引量:1
1
作者 Zhijun Han Yiqing Zhou +3 位作者 Yu Zhang Tong-Xing Zheng Ling Liu Jinglin Shi 《Digital Communications and Networks》 2025年第4期1113-1123,共11页
In covert communications,joint jammer selection and power optimization are important to improve performance.However,existing schemes usually assume a warden with a known location and perfect Channel State Information(... In covert communications,joint jammer selection and power optimization are important to improve performance.However,existing schemes usually assume a warden with a known location and perfect Channel State Information(CSI),which is difficult to achieve in practice.To be more practical,it is important to investigate covert communications against a warden with uncertain locations and imperfect CSI,which makes it difficult for legitimate transceivers to estimate the detection probability of the warden.First,the uncertainty caused by the unknown warden location must be removed,and the Optimal Detection Position(OPTDP)of the warden is derived which can provide the best detection performance(i.e.,the worst case for a covert communication).Then,to further avoid the impractical assumption of perfect CSI,the covert throughput is maximized using only the channel distribution information.Given this OPTDP based worst case for covert communications,the jammer selection,the jamming power,the transmission power,and the transmission rate are jointly optimized to maximize the covert throughput(OPTDP-JP).To solve this coupling problem,a Heuristic algorithm based on Maximum Distance Ratio(H-MAXDR)is proposed to provide a sub-optimal solution.First,according to the analysis of the covert throughput,the node with the maximum distance ratio(i.e.,the ratio of the distances from the jammer to the receiver and that to the warden)is selected as the friendly jammer(MAXDR).Then,the optimal transmission and jamming power can be derived,followed by the optimal transmission rate obtained via the bisection method.In numerical and simulation results,it is shown that although the location of the warden is unknown,by assuming the OPTDP of the warden,the proposed OPTDP-JP can always satisfy the covertness constraint.In addition,with an uncertain warden and imperfect CSI,the covert throughput provided by OPTDP-JP is 80%higher than the existing schemes when the covertness constraint is 0.9,showing the effectiveness of OPTDP-JP. 展开更多
关键词 Covert communications Uncertain warden jammer selection Power optimization Throughput maximization
在线阅读 下载PDF
Cognitive Jammers Assisted Covert Communication in Cognitive Radio Networks
2
作者 Liu Changjun Shi Jia +1 位作者 Tie Zhuangzhuang Wang Yongchao 《China Communications》 SCIE CSCD 2024年第9期75-89,共15页
In this work,we investigate the covert communication in cognitive radio(CR)networks with the existence of multiple cognitive jammers(CJs).Specifically,the secondary transmitter(ST)helps the primary transmitter(PT)to r... In this work,we investigate the covert communication in cognitive radio(CR)networks with the existence of multiple cognitive jammers(CJs).Specifically,the secondary transmitter(ST)helps the primary transmitter(PT)to relay information to primary receiver(PR),as a reward,the ST can use PT's spectrum to transmit private information against the eavesdropper(Eve)under the help of one selected cognitive jammer(CJ).Meanwhile,we propose three jammer-selection schemes,namely,link-oriented jammer selection(LJS),min-max jammer selection(MMJS)and random jammer selection(RJS).For each scheme,we analyze the average covert throughput(ACT)and covert outage probability(COP).Our simulation results show that CJ is helpful to ST's covert communication,the expected minimum detection error probability and ACT can be significantly improved with the increase of false alarm of CJ.Moreover,the LJS scheme achieves best performance in ACT and COP,followed by RJS scheme,and MMJS scheme shows the worst performance. 展开更多
关键词 cognitive jammer cognitive radio covert communication performance analysis
在线阅读 下载PDF
A Coincered Node Based Localization of Jammers in Wireless Sensor Networks
3
作者 Balamurugan Perumal Sharmila Vadivel Mummoorthy Arulappan 《Circuits and Systems》 2016年第9期2613-2621,共9页
Jammers can awfully interfere with the wireless communications. The transmission and reception of wireless communication is blocked by the jammer. The intruder will place the jammer in a well topological network area ... Jammers can awfully interfere with the wireless communications. The transmission and reception of wireless communication is blocked by the jammer. The intruder will place the jammer in a well topological network area and they can easily track the information. It will help them to block the signal transmission and reception. Now, the intention is to track the position of the jammer where it is fixed. The existing methods rely on the indirect measurements and the boundary node to find the jammer’s position which degrades the accuracy of the localization. To improve the efficiency, this paper proposed an efficient method namely Coincered Node Based Localization of jammers to find the position of the jammer with high level of accuracy. The proposed system uses the direct measurements, which is the jammer signal strength. The effectiveness can also be increased by using the coincered node that will stumble across the true position of the jammer. The proposed work is compared with existing methods. Then the proposed mechanism proves better to find the jammer location. The simulation results estimate that the accuracy of the localization achieves better performance than the existing schemes. 展开更多
关键词 Wireless Sensor Network Jamming jammer Localization jammer Signal Strength Coincered Node
在线阅读 下载PDF
Put Others Before Itself:A Multi-Leader One-Follower Anti-Jamming Stackelberg Game Against Tracking Jammer 被引量:4
4
作者 Xiaobo Zhang Hai Wang +2 位作者 Yifan Xu Zhibin Feng Yunpeng Zhang 《China Communications》 SCIE CSCD 2021年第11期168-181,共14页
This paper mainly investigates the coordinated anti-jamming channel access problems in multiuser scenarios where there exists a tracking jammer who senses the spectrum and traces the channel with maximal receiving pow... This paper mainly investigates the coordinated anti-jamming channel access problems in multiuser scenarios where there exists a tracking jammer who senses the spectrum and traces the channel with maximal receiving power.To cope with the challenges brought by the tracking jammer,a multi-leader onefollower anti-jamming Stackelberg(MOAS)game is formulated,which is able to model the complex interactions between users and the tracking jammer.In the proposed game,users act as leaders,chose their channel access strategies and transmit firstly.The tracking jammer acts as the follower,whose objective is to find the optimal jamming strategy at each time slot.Besides,the existence of Stackelberg equilibriums(SEs)is proved,which means users reach Nash Equilibriums(NEs)for each jamming strategy while the jammer finds its best response jamming strategy for the current network access case.An active attraction based anti-jamming channel access(3ACA)algorithm is designed to reach SEs,where jammed users keep their channel access strategies unchanged to create access chances for other users.To enhance the fairness of the system,users will adjust their strategies and relearn after certain time slots to provide access chances for those users who sacrifice themselves to attract the tracking jammer. 展开更多
关键词 coordinated anti-jamming channel access Stackelberg game tracking jammer active attraction
在线阅读 下载PDF
Multi-Antenna Jammer Assisted Covert Communications in Data Collected IoT with NOMA 被引量:3
5
作者 Liwei Tao Weiwei Yang +3 位作者 Xingbo Lu Ruiqian Ma Ling Yang Yi Song 《China Communications》 SCIE CSCD 2023年第5期217-231,共15页
In this paper,we investigate covert communications in data collected IoT with NOMA,where the paired sensor nodes S_(m) and S_(n) transmit covert messages to a legitimate receiver(Bob)in the presence of a Warden(Willie... In this paper,we investigate covert communications in data collected IoT with NOMA,where the paired sensor nodes S_(m) and S_(n) transmit covert messages to a legitimate receiver(Bob)in the presence of a Warden(Willie).To confuse the detection at Willie,an extra multi-antenna friendly jammer(Jammer)has been employed to transmit artificial noise(AN)with random power.Based on the CSI of Willie is available or not at Jammer,three AN transmission schemes,including null-space artificial noise(NAN),transmit antenna selection(TAS),and zeroforcing beamforming(ZFB),are proposed.Furthermore,the closed-form expressions of expected minimum detection error probability(EMDEP)and joint connection outage probability(JCOP)are derived to measure covertness and reliability,respectively.Finally,the maximum effective covert rate(ECR)is obtained with a given covertness constraint.The numerical results show that ZFB scheme has the best maximum ECR in the case of the number of antennas satisfies N>2,and the same maximum ECR can be achieved in ZFB and NAN schemes with N=2.Moreover,TAS scheme also can improve the maximum ECR compared with the benchmark scheme(i.e.,signal-antenna jammer).In addition,a proper NOMA node pairing can further improve the maximum ECR. 展开更多
关键词 IOT covert communications NOMA node pairing multi-antenna jammer
在线阅读 下载PDF
Mobile Jammer-Aided Secure UAV Communications via Trajectory Design and Power Control 被引量:13
6
作者 An Li Wenjing Zhang 《China Communications》 SCIE CSCD 2018年第8期141-151,共11页
To further promote the achievable average secrecy rate for UAV-ground communications, a UAV-aided mobile jamming strategy was proposed in this paper. Specifically, an additional cooperative UAV is employed as a mobile... To further promote the achievable average secrecy rate for UAV-ground communications, a UAV-aided mobile jamming strategy was proposed in this paper. Specifically, an additional cooperative UAV is employed as a mobile jammer to transmit the jamming signal to help keep the source UAV closer to the ground destination, thus establishing more favorable legitimate link and enhancing the secrecy performance. We aimed to maximize the achievable secrecy rate by jointly optimizing the trajectories and transmit power of both source UAV and jammer UAV. To solve the considered non-convex optimization problem, we presented a block coordinate descent based iterative algorithm to address a sequence of approximated convex problems for the optimized parameter block by block to find a local optimal solution. Numerical results verify that the proposed algorithm can achieve significant secrecy rate gain compared to all the benchmark schemes. 展开更多
关键词 physical layer security UAV-ground communications mobile jammer-aided trajectory design power control
在线阅读 下载PDF
Effects of long-term exposure to radiofrequency radiations emitted by mobile Jammers on reproduction parameters in rats 被引量:1
7
作者 Maryam Owjfard Manzarbanoo Shojaei Fard 《Asian pacific Journal of Reproduction》 2017年第4期164-171,共8页
Objective:To evaluate the effect of long-term exposure to radiofrequency radiations emitted from mobile jammers onrat's reproductive parameters.Methods: Eighty male rats were divided into neonatal group (n=20), im... Objective:To evaluate the effect of long-term exposure to radiofrequency radiations emitted from mobile jammers onrat's reproductive parameters.Methods: Eighty male rats were divided into neonatal group (n=20), immature group (n=30) and mature group (n=30). Neonatal rats were randomly divided into two subgroups. Immature and mature rats were randomly divided into three subgroups. Experimental rats were fixed in the restraining tube and were exposed to radiofrequency radiations emitted from mobile jammers at a distance of 100 cm, for 30 d (7 h/d). Sham group rats were also fixed in restraining tube but without radiations. The control group was allowed to move freely without being exposed to radiation. At the end of the experiment, weight of testes, sperm quality, histological testicular sections and serum testosterone levels were evaluated.Results: Long-term exposure to radiofrequency from mobile jammers could adversely affect neonatal rat fertility, but it did not have significant effects on male mature and immature rat's reproduction parameters. However, restraint stress induced by immobilizing them for a long-period could adversely affect male mature rat's reproductive parameters, but it had no significant effect on male immature rat's reproduction parameters.Conclusion:The effects of EMF exposure to be various based on the life stage. 展开更多
关键词 RADIO frequency MOBILE jammers TESTICULAR REPRODUCTION RATS
暂未订购
Lightweight jammer localization algorithm in wireless sensor networks
8
作者 成天桢 栗苹 朱森存 《Journal of Beijing Institute of Technology》 EI CAS 2013年第2期143-148,共6页
In wireless sensor networks (WSNs), as the shared nature of the wireless medium, jam- ming attacks can be easily launched and result in a great damage to the network. How to deal with jamming attacks has become a gr... In wireless sensor networks (WSNs), as the shared nature of the wireless medium, jam- ming attacks can be easily launched and result in a great damage to the network. How to deal with jamming attacks has become a great concern recently. Finding the location of a jammer is important to take security actions against the jammer, and thus to restore the network communication. After a comprehensive study on the jammer localization problem, a lightweight easy-operated algorithm called triple circles localization (TCL) is proposed. The evaluation results have demonstrated that, compared with other approaches, TCL achieves the best jammer localization accuracy under variable conditions. 展开更多
关键词 jammer localization jamming attacks wireless sensor networks
在线阅读 下载PDF
Enhanced Intrusion Detection System for an EH IoT Architecture Using a Cooperative UAV Relay and Friendly UAV Jammer
9
作者 Van Nhan Vo Hung Tran Chakchai So-In 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2021年第11期1786-1799,共14页
In this paper,the detection capabilities and system performance of an energy harvesting(EH)Internet of Things(Io T)architecture in the presence of an unmanned aerial vehicle(UAV)eavesdropper(UE)are investigated.The co... In this paper,the detection capabilities and system performance of an energy harvesting(EH)Internet of Things(Io T)architecture in the presence of an unmanned aerial vehicle(UAV)eavesdropper(UE)are investigated.The communication protocol is divided into two phases.In the first phase,a UAV relay(UR)cooperates with a friendly UAV jammer(UJ)to detect the UE,and the UR and UJ harvest energy from a power beacon(PB).In the second phase,a ground base station(GBS)sends a confidential signal to the UR using non-orthogonal multiple access(NOMA);the UR then uses its harvested energy to forward this confidential signal to IoT destinations(IDs)using the decode-and-forward(DF)technique.Simultaneously,the UJ uses its harvested energy to emit an artificial signal to combat the detected UE.A closed-form expression for the probability of detecting the UE(the detection probability,DP)is derived to analyze the detection performance.Furthermore,the intercept probability(IP)and throughput of the considered IoT architecture are determined.Accordingly,we identify the optimal altitudes for the UR and UJ to enhance the system and secrecy performance.Monte Carlo simulations are employed to verify our approach. 展开更多
关键词 Detection probability(DP) energy harvesting(EH) friendly UAV jammer Internet of Things(IoT) system performance UAV detection
在线阅读 下载PDF
Energy-Efficient Jammer Selection Approach for QoS Provisioning in Distributed Wireless Cooperative Networks
10
作者 Ma Yue Wang Li +3 位作者 Ke Tenghui Zhang Yong Song Mei Wang Xiaojun 《China Communications》 SCIE CSCD 2012年第7期90-98,共9页
Abstract:Aiming at achieving better Quality of Service (QoS) provisioning in distributed wireless cooperative networks, a novel energy efficient jammer selection approach is proposed in this pa per. We employ Secre... Abstract:Aiming at achieving better Quality of Service (QoS) provisioning in distributed wireless cooperative networks, a novel energy efficient jammer selection approach is proposed in this pa per. We employ Secrecy Capacity (SC) to charac terize the security of transmission. In order to ac curately describe the timevarying characteristic, related channels are modeled as FiniteState M ark ov Channels (FSMCs). The remaining energy of candidate node is considered in a similar way. 展开更多
关键词 wireless cooperative network jammer selection secrecy capacity energy balance
在线阅读 下载PDF
安捷伦科技推出业界首款具有在线误码注入功能的PCI EXPRESS Jammer
11
《电子测量技术》 2009年第2期178-178,共1页
2009年2月9日,安捷伦科技公司(NYSE:A)日前宣布推出在线误码注入工具(Jammer),用于进行PCI EXPRESS (PCIe)协议测试。Jammer采用了突破性的PCIe测试理念,是一种创新的测试工具,可帮助开发人员缩短测试周期和加快器件的上市... 2009年2月9日,安捷伦科技公司(NYSE:A)日前宣布推出在线误码注入工具(Jammer),用于进行PCI EXPRESS (PCIe)协议测试。Jammer采用了突破性的PCIe测试理念,是一种创新的测试工具,可帮助开发人员缩短测试周期和加快器件的上市速度。 展开更多
关键词 EXPRESS 安捷伦科技公司 jammer PCI 注入 误码 在线 协议测试
在线阅读 下载PDF
安捷伦科技推出业界首款具有在线误码注入功能的PCI EXPRESS Jammer
12
《国外电子测量技术》 2009年第3期80-80,共1页
关键词 EXPRESS 安捷伦科技公司 jammer PCI 误码 在线 协议测试 测试工具
在线阅读 下载PDF
Localizing Jammer in an Indoor Environment by Estimating Signal Strength and Kalman Filter
13
作者 Waleed Aldosari Mohamed Zohdy 《Wireless Engineering and Technology》 2018年第2期20-33,共14页
Localizing a jammer in an indoor environment in wireless sensor networks becomes a significant research problem due to the ease of blocking the communication between legitimate nodes. An adversary may emit radio frequ... Localizing a jammer in an indoor environment in wireless sensor networks becomes a significant research problem due to the ease of blocking the communication between legitimate nodes. An adversary may emit radio frequency to prevent the transmission between nodes. In this paper, we propose detecting the position of the jammer indoor by using the received signal strength and Kalman filter (KF) to reduce the noise due to the multipath signal caused by obstacles in the indoor environment. We compare our work to the Linear Prediction Algorithm (LP) and Centroid Localization Algorithm (CL). We observed that the Kalman filter has better results when estimating the distance compared to other algorithms. 展开更多
关键词 jammer Detecting KALMAN Filter (KF) Linear Prediction (LP) CENTROID Localization (CL) jammer RECEIVED SIGNAL Strength (JRSS) Multipath SIGNAL Indoor Location
在线阅读 下载PDF
电脑音乐DIY系列之三:电脑自动作曲软件Jammer
14
作者 goldman 《软件》 2000年第12期58-60,共3页
在我们周围有许多朋友非常喜欢音乐,头脑中时常有一些从不曾听过的音乐飘过,只可惜自己的音乐基础知识太少,无法把这些飘过脑际的美妙音乐记录下来,使它成为一首音乐作品,这点实在令人感到遗憾。先别着急,这里给大家介绍一个能够自动生... 在我们周围有许多朋友非常喜欢音乐,头脑中时常有一些从不曾听过的音乐飘过,只可惜自己的音乐基础知识太少,无法把这些飘过脑际的美妙音乐记录下来,使它成为一首音乐作品,这点实在令人感到遗憾。先别着急,这里给大家介绍一个能够自动生成音乐的软件——Jammer。你无须学习任何枯燥的音乐理论,只要对音乐有感觉、有鉴赏力。 展开更多
关键词 电脑自动作曲软件 jammer 电脑音乐 DIY系列
在线阅读 下载PDF
A Novel Range-Free Jammer Localization Solution in Wireless Network by Using PSO Algorithm
15
作者 LiangPang Xiao Chen +1 位作者 Zhi Xue Rida Khatoun 《国际计算机前沿大会会议论文集》 2017年第2期46-48,共3页
In wireless networks, jamming attacks are easy to launch and can significantly impact the network performance. The technique which localizes the jamming attacker is useful to address this problem. Some range-based loc... In wireless networks, jamming attacks are easy to launch and can significantly impact the network performance. The technique which localizes the jamming attacker is useful to address this problem. Some range-based localization schemes depend on the additional hardware of wireless nodes too much, and they can not work in resource-constrained wireless networks. Solutions in range-free localization are being pursued as a cost-effective alternative to more expensive range-based approaches.In this paper, we propose a novel range-free algorithm to localize the source of the attacker. We show that our approach only relies on the positions of each jammed or no-jammed node in the network, PSO algorithm is used to get the minimum covering circle of jammed positions and the circle center is the estimated jammer location. We compare our work with some existing range-free solutions via extensive simulations in two models, which are wireless sensor network (WSN) and vehicular ad hoc network (VANET) respectively. The experimental results suggest that our proposed algorithm achieves higher accuracy than the other solutions, and the localization error goes down with larger number of recorded jammed positions. In additional, when the recorded jammed positions are distributed in a specific constrained area, the localization error goes higher, we also propose an improved PSO algorithm to deal with this issue. 展开更多
关键词 Jamming attack jammer LOCALIZATION Vehicular ad HOC NETWORK (VANET) Wireless sensor NETWORK (WSN) PSO Minimum covering circle
在线阅读 下载PDF
Topology-based multi-jammer localization in wireless networks 被引量:1
16
作者 Hongbo Liu Yingying Chen +2 位作者 Wenyuan Xu Zhenhua Liu Yuchen Su 《Security and Safety》 2024年第1期21-46,共26页
Jamming attacks and unintentional radio interference are some of the most urgent threats harming the dependability of wireless communication and endangering the successful deployment of pervasive applications built on... Jamming attacks and unintentional radio interference are some of the most urgent threats harming the dependability of wireless communication and endangering the successful deployment of pervasive applications built on top of wireless networks.Unlike the traditional approaches focusing on developing jamming defense techniques without considering the location of jammers,we take a different viewpoint that the jammers'position should be identified and exploited for building a wide range of defense strategies to alleviate jamming.In this paper,we address the problem of localizing multiple jamming attackers coexisting in wireless networks by leveraging the network topology changes caused by jamming.We systematically analyze the jamming effects and develop a framework that can partition network topology into clusters and can successfully estimate the positions of multiple jammers even when their jamming areas are overlapping.Our experiments on a multi-hop network setup using MicaZ sensor nodes validate the feasibility of real-time collection of network topology changes under jamming and our extensive simulation results demonstrate that our approach is highly effective in localizing multiple attackers with or without the prior knowledge of the order that the jammers are turned on. 展开更多
关键词 jammer localization wireless networks TOPOLOGY
原文传递
阵列雷达时空多维域编码抗主瓣转发式欺骗干扰方法 被引量:1
17
作者 兰岚 张翔 +1 位作者 许京伟 廖桂生 《雷达学报(中英文)》 北大核心 2025年第2期439-455,共17页
随着电子技术的快速发展,雷达面临的电磁环境日益复杂。当存在主瓣有源欺骗干扰时,传统相控阵雷达自适应波束形成抗干扰失效,主瓣干扰抑制已成为雷达领域亟待解决的共性难题。该文针对来自主瓣的自卫式转发干扰,提出了一种时空多维域编... 随着电子技术的快速发展,雷达面临的电磁环境日益复杂。当存在主瓣有源欺骗干扰时,传统相控阵雷达自适应波束形成抗干扰失效,主瓣干扰抑制已成为雷达领域亟待解决的共性难题。该文针对来自主瓣的自卫式转发干扰,提出了一种时空多维域编码抗主瓣欺骗式干扰方法。首先,设计发射通道-脉冲-子脉冲编码,在接收端采用多普勒分多址方法实现了发射信号分离。针对目标高速运动导致的分离错位现象,提出一种基于波束形成能量差的移位数估计方法。随后,利用目标与干扰的延时相位差,设计收发联合的双重编码相位补偿方法,在发射空间频率域实现对真实目标、跨脉冲转发干扰、脉内转发干扰的区分,并且通过构建联合发射-接收权矢量,对主瓣欺骗式干扰进行空域滤波抑制。针对实际中波达角度(DOA)误差造成的抗干扰性能下降问题,构建了以最大化输出信干噪比(SINR)为目标函数的约束优化问题,基于交替迭代算法对接收权矢量,发射编码系数、接收编码系数分别进行优化。仿真实验验证了所提方法相比于其他雷达体制在抗主瓣欺骗干扰方面的有效性,其中相比于传统MIMO雷达,所提阵列时空多维域编码技术在4个主瓣干扰存在的情况下SINR可提升34 dB。 展开更多
关键词 阵列雷达 主瓣欺骗干扰抑制 时空多维域编码 DOA误差 收发联合优化
在线阅读 下载PDF
Aerial-networked ISAC-empowered collaborative energy-efficient covert communications
18
作者 Jun WU Weijie YUAN +2 位作者 Qin TAO Hongjia HUANG Derrick Wing Kwan NG 《Chinese Journal of Aeronautics》 2025年第10期185-200,共16页
Covert unmanned aerial vehicle(UAV)communication has garnered considerable attention in wireless systems for realizing the sustainable low-altitude economy(LAE).This paper investigates the system policy,trajectory des... Covert unmanned aerial vehicle(UAV)communication has garnered considerable attention in wireless systems for realizing the sustainable low-altitude economy(LAE).This paper investigates the system policy,trajectory design,and resource allocation for energy-efficient aerial networked systems with the aid of an integrated sensing and communications(ISAC)framework,in which multiple UAVs are employed to simultaneously conduct cooperative sensing and covert downlink transmissions to multiple ground users(GUs)in the presence of a mobile warden(Willie).Specifically,to improve the communication covertness,UAVs are strategically switched between jamming(JUAV)and information(IUAV)modes.Additionally,to cope with the mobility of Willie,an unscented Kalman filtering(UKF)-based method is employed to track and predict Willie’s location relying on the delay and Doppler measurements extracted from the ISAC echoes.Capitalizing on the predicted Willie’s location,a real-time energy efficiency(EE)maximization problem is formulated by jointly optimizing the JUAV selection strategy,IUAV-GU scheduling,communication/jamming power allocation,and UAV trajectories design.The formulation takes into account the communication covertness requirement and the maximum transmit power budget,leading to a mixed-integer non-convex fractional programming.To tackle this challenge,the alternating optimization(AO)approach is adopted,which decomposes the original problem into a series of sub-problems,allowing us to obtain an efficient sub-optimal solution.Simulation results demonstrate that the proposed scheme is capable of tracking Willie accurately and offering excellent system EE performance compared to various benchmark schemes adopting existing designs. 展开更多
关键词 Integrated sensing and communication Unmanned aerial vehicles Low-altitude economy Trajectory design jammer selection
原文传递
Cooperative Relaying and Jamming Design for Secure LPWAN Wireless Communication
19
作者 Chen Dianxia Ma Xiaoshan +2 位作者 Yang Lin Yu Kan Feng Zhiyong 《China Communications》 2025年第4期100-116,共17页
Physical layer security methods based on joint relay and jammer selection(JRJS)have been widely investigated in the study of secure wireless communications.Different from current works on JRJS schemes,which assumed th... Physical layer security methods based on joint relay and jammer selection(JRJS)have been widely investigated in the study of secure wireless communications.Different from current works on JRJS schemes,which assumed that the global channel state information(CSI)of the eavesdroppers(Eves)was known beforehand,then the optimal relaying and jamming relays were determined.More importantly,the time complexity of selecting optimal jamming relay is O(N^(2)),where N is the maximum number of relays/Eves.In this paper,for the scenario where the source wants to exchange the message with the destination,via relaying scheme due to longer communication distance and limited transmission power,in the presence of multiple Eves,with the assumption of Eves'perfect CSI and average CSI,we propose two kinds of JRJS methods.In particular,the time complexity of finding the optimal jammer can be reduced to O(N).Furthermore,we present a novel JRJS scheme for no CSI of Eves by minimizing the difference between expected signal and interfering signal at the destination.Finally,simulations show that the designed methods are more effective than JRJS and other existing strategies in terms of security performance. 展开更多
关键词 joint relay and jammer selection physical layer security secrecy outage probability
在线阅读 下载PDF
基于神经网络的全双工干扰机自干扰对消方法
20
作者 朱虹宇 胡卫东 +3 位作者 王超 施庆展 张曦蒙 袁乃昌 《系统工程与电子技术》 北大核心 2025年第1期12-21,共10页
针对复杂而强的非线性自干扰信号的对消问题,分析全双工系统中发射泄露产生的自干扰信号的组成及其非线性特性,基于多级隔离和对消自干扰的思想,提出一种数字域神经网络方法。神经网络通过快速学习和感知侦收自干扰信道模型参数,能有效... 针对复杂而强的非线性自干扰信号的对消问题,分析全双工系统中发射泄露产生的自干扰信号的组成及其非线性特性,基于多级隔离和对消自干扰的思想,提出一种数字域神经网络方法。神经网络通过快速学习和感知侦收自干扰信道模型参数,能有效地对消泄露进来的自干扰信号。仿真实验结果表明,与传统的线性对消和数字对消方法相比,所提方法能够快速适应雷达信号的变化,具有更强的自干扰抑制能力,为改善全双工干扰机的性能提供了技术途径。 展开更多
关键词 全双工干扰机 大功率信号 非线性特性 雷达信号变化 自干扰抑制能力
在线阅读 下载PDF
上一页 1 2 20 下一页 到第
使用帮助 返回顶部