2017 IEEE International Conference on Communications (ICC) 2017
DOI: 10.1109/icc.2017.7996845
|View full text |Cite
|
Sign up to set email alerts
|

Optimal transmission strategy for sensors to defend against eavesdropping and jamming attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(4 citation statements)
references
References 23 publications
0
4
0
Order By: Relevance
“…The channel is assumed to be flat fading. As examples of studying single carrier communication, see, for example, [1,4,7,8,10,13,14,[17][18][19][20]. We assume that the user does not have access to local information about the jammer's channel gain (reflecting its distance to the receiver) and jamming power cost (reflecting technical characteristics of the jammer).…”
Section: Communication Modelmentioning
confidence: 99%
“…The channel is assumed to be flat fading. As examples of studying single carrier communication, see, for example, [1,4,7,8,10,13,14,[17][18][19][20]. We assume that the user does not have access to local information about the jammer's channel gain (reflecting its distance to the receiver) and jamming power cost (reflecting technical characteristics of the jammer).…”
Section: Communication Modelmentioning
confidence: 99%
“…A fictitious play-based algorithm was proposed to assist in reaching the mixed strategy Nash equilibrium, and results show that an improvement can be achieved in the average expected utility per user up to 49.4%. Moreover, eavesdropping and jamming attacks on mobile Cyber-Physical Systems (CPSs) were studied in [17], where a Stackelberg game was used to maximize the secrecy rate between sensors and controllers. Recently, a new approach that considers a more sophisticated adversary with dual capability of conducting either eavesdropping or jamming attack has been proposed in [9].…”
Section: Wireless Communications and Mobile Computingmentioning
confidence: 99%
“…Yuan [29] transformed the system model into MDP in order to obtain the optimal transmission scheduling to minimize the AoI of CPS and keep the AoI of eavesdroppers above a certain level, and proved that the optimal transmission scheduling strategy is a threshold behavior on the CPS and AoI of eavesdroppers, respectively. In [30], the proposed problem is formulated as a Stackelberg game, and the strategy of maximizing the secure transmission rate between sensor and controller in the presence of malicious eavesdroppers and disruptors is studied. On the basis of analyzing the influence of different strategies on eavesdropping performance, Zhou [31] studied the multi-output system and proposed a decryption scheduling scheme to minimize the expected estimation error under the condition of energy constraint.…”
Section: Introductionmentioning
confidence: 99%