Fig 1 - uploaded by Vahed Fadakar Gabalou
Content may be subject to copyright.
The maximum and minimum solutions of secrecy sum-rate in terms of P T for different values of jamming power in which (K = 5, N = 16).
Source publication
Similar publications
https://connectedlearningsummit.org/cls2018/proceedings/
Penelitian ini bertujuan untuk mengetahui peningkatan kemampuan literasi anak usia 4-5 tahun PAUD Adnyani yang berjumlah 20 anak terdiri dari 17 anak perempuan dan 3 anak laki-laki. Jenis penelitian yang digunakan yaitu Penelitian Tindakan Kelas (PTK), yang dilaksanakan dalam dua siklus. Setiap siklus terdiri dari empat tahapan yaitu, perencanaan,...
Citations
... Moreover, when combined with non-linear iterative equalization techniques to mitigate Inter-Symbol Interference (ISI), such as Iterative Block-Decision Feedback Equalization (IB-DFE), they can achieve excellent performance, making this technique appealing for applications where there are strict energy efficiency requirements, as well as highly frequency selective channels. The security potential can be analyzed under various scenarios, such as in [18], where a friendly jammer and an eavesdropper were considered, or in [19], where a jammer and an eavesdropper worked together in an attempt to eavesdrop the system, or even through the use of artificial noise sequences at the transmitter [20]. This makes a direct comparison between these scenarios a challenging task. ...
Current wireless communication systems employ Multi-Input, Multi-Output (MIMO) techniques to increase spectral efficiency, at the cost of higher hardware complexity. Most of these systems continue to employ traditional Orthogonal Multiple Access (OMA) schemes, which are suboptimal when compared to Non-Orthogonal Multiple Access (NOMA) schemes. By combining NOMA with MIMO, it is possible to achieve higher spectral efficiencies. However, security in NOMA-MIMO systems remains a problem. In this paper, we study the physical layer security issues of a power based NOMA-MIMO system with a Singular Value Decomposition (SVD) scheme, employed along with Single Carrier with Frequency Domain Equalization (SC-FDE) techniques. We consider a scenario where there is an unintended eavesdropper attempting to listen to the messages being exchanged. It is shown that the higher the channel estimate correlation between transmitter and receiver, the higher the secrecy rate, particularly for a scenario where there is a Line-Of-Sight (LOS) between all users. Therefore, power based NOMA MIMO-SVD schemes, combined with SC-FDE, can be considered efficient options for highly secure MIMO communications.
Herein, a comprehensive review of the evolution of intelligent communication anti‐jamming techniques is provided. First, a clear definition of the concept and elaboration on the inherent connotations and capability characteristics of intelligent communication anti‐jamming is provided. Additionally, the initial construction of an intelligent communication anti‐jamming system architecture is outlined. Subsequently, the development of intelligent communication anti‐jamming is delved, tracing its progression from early‐stage adaptive anti‐jamming techniques to the more recent advancements in intelligent anti‐jamming, which are primarily based on game theory and machine learning. Moreover, the latest research findings in this domain are thoroughly examined and the existing challenges and bottlenecks that hinder current research progress are highlighted. Finally, several viable research directions for future studies in the field of intelligent anti‐jamming are proposed. The objective is to facilitate readers in gaining a comprehensive understanding of the concept, characteristics, and system architecture of intelligent communication anti‐jamming. Additionally, it is aimed to provide a comprehensive overview of the developmental process and current state of research, thereby furnishing conceptual and theoretical support for the design of more effective and practical intelligent communication anti‐jamming systems.
This paper considers a friendly interferer allocating jamming power to eavesdropping channels to increase the level of secrecy of a wireless network. The friendly interferer has access to limited power, while the eavesdropper may not have the ability to attack all channels simultaneously. When all channels used for secret communication are under the threat of eavesdropping attacks, the optimal power allocation policy results from solving a convex optimization problem. In this case, the optimal policy is unique and can be obtained via a water-filling scheme. When the eavesdropper cannot attack all channels, the eavesdropper should behave strategically and may select the targets probabilistically. We propose a non-zero-sum game that helps the friendly interferer predict and concentrate on the targets selected by the eavesdropper. Under certain conditions, we prove that there exists a unique Nash equilibrium (NE) strategy pair, which has a threshold type structure. We provide conditions under which the eavesdropper’s equilibrium strategy is deterministic. We devise a strategy iteration algorithm to compute an equilibrium power allocation strategy. We present examples showing that the game-theoretic power allocation strategy performs better than the conservative power allocation strategy that assumes every channel to be under attack.