2018
DOI: 10.1155/2018/1029175
|View full text |Cite
|
Sign up to set email alerts
|

Provoking the Adversary by Detecting Eavesdropping and Jamming Attacks: A Game‐Theoretical Framework

Abstract: This paper investigates the secrecy and reliability of a communication where the user is assisting an Intrusion Detection System (IDS) in detecting the adversary’s attack. The adversary is assumed to be sophisticated such that it can conduct eavesdropping and jamming attacks. The IDS is equipped with the capability of detecting both of those attacks. Two scenarios were considered; the first scenario is that the user is trying to detect the adversary by assisting the IDS, and the second scenario is that the use… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 24 publications
(56 reference statements)
0
1
0
Order By: Relevance
“…Each channel occupies a different frequency and the interference from adjacent channels is mitigated via techniques like pulse-shaping filters. An eavesdropper, due to budget limitation, or to reduce the risk of Local Oscillator (LO) leakage power emitted from eavesdropping antennas that may reveal her hidden location(see [23,35]), is using hardware with limited capability and can only listen on n of N different frequencies at the same time. A friendly interferer who can simultaneously send cooperative jamming signals to N communication channels is tasked to enhance the overall secrecy performance against the eavesdropper.…”
Section: Summary Of Contributionsmentioning
confidence: 99%
“…Each channel occupies a different frequency and the interference from adjacent channels is mitigated via techniques like pulse-shaping filters. An eavesdropper, due to budget limitation, or to reduce the risk of Local Oscillator (LO) leakage power emitted from eavesdropping antennas that may reveal her hidden location(see [23,35]), is using hardware with limited capability and can only listen on n of N different frequencies at the same time. A friendly interferer who can simultaneously send cooperative jamming signals to N communication channels is tasked to enhance the overall secrecy performance against the eavesdropper.…”
Section: Summary Of Contributionsmentioning
confidence: 99%