2020
DOI: 10.1016/j.adhoc.2019.102064
|View full text |Cite
|
Sign up to set email alerts
|

Benign false-data injection as a moving-target defense to secure mobile wireless communications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
2

Relationship

1
7

Authors

Journals

citations
Cited by 14 publications
(11 citation statements)
references
References 13 publications
0
11
0
Order By: Relevance
“…Note that the intercept probability is calculated according to (17) and (18). Since SR 3 has the lowest intercept probability, it can easily conclude that SR 3 has the highest reputation according to (20), as shown in Fig. 5 for the two interception scenarios.…”
Section: B Intercept Probabilities and Srs Reputationsmentioning
confidence: 91%
“…Note that the intercept probability is calculated according to (17) and (18). Since SR 3 has the lowest intercept probability, it can easily conclude that SR 3 has the highest reputation according to (20), as shown in Fig. 5 for the two interception scenarios.…”
Section: B Intercept Probabilities and Srs Reputationsmentioning
confidence: 91%
“…On the other hand, a spatiotemporal diversity-based mechanism has been evaluated to confuse eavesdroppers by sending fake data over relays/vehicles traveling on a multi-lane road through dynamic paths. Moreover, in [20], the authors presented a novel MTD framework to improve the channel secrecy capacity in a two-phase decode-and-forward (DF) network. The approach MTD proposed in [20] enables multi-dimensional spatiotemporal diversification of user traffic in a cooperative wireless network, preventing attackers from tracing the signal transmission pattern.…”
Section: A Related Workmentioning
confidence: 99%
“…The honeypot system maintains a sufficient number of hardware and software resources to execute the attack monitoring activities. Also, the system contains the huge active and passive attacker data sets 1–4 …”
Section: Introductionmentioning
confidence: 99%
“…Also, the system contains the huge active and passive attacker data sets. [1][2][3][4] Particularly, honeypot creates a duplicate and isolated network to validate the external traffics. It helps improve the security of main networks.…”
Section: Introductionmentioning
confidence: 99%