[go: up one dir, main page]

Zhang et al., 2019 - Google Patents

Correlation-based search against friendly jamming data exchange schemes

Zhang et al., 2019

Document ID
287222686570385560
Author
Zhang J
Hu Q
Hancke G
Publication year
Publication venue
2019 IEEE Conference on Dependable and Secure Computing (DSC)

External Links

Snippet

Friendly jamming is a physical-layer approach to protecting the confidentiality of short range wireless communication. In recent years, several practical friendly jamming scenes have been proposed based on the general principle that the recipient jams the channel while the …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B1/00Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
    • H04B1/69Spread spectrum techniques
    • H04B1/713Spread spectrum techniques using frequency hopping
    • H04B1/715Interference-related aspects
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L27/00Modulated-carrier systems
    • H04L27/26Systems using multi-frequency codes
    • H04L27/2601Multicarrier modulation systems
    • H04L27/2602Signal structure
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B1/00Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
    • H04B1/69Spread spectrum techniques
    • H04B1/707Spread spectrum techniques using direct sequence modulation
    • H04B1/7097Interference-related aspects
    • H04B1/7103Interference-related aspects the interference being multiple access interference
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L27/00Modulated-carrier systems
    • H04L27/001Modulated-carrier systems using chaotic signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K3/00Jamming of communication; Counter-measures
    • H04K3/40Jamming having variable characteristics
    • H04K3/45Jamming having variable characteristics characterized by including monitoring of the target or target signal, e.g. in reactive jammers or follower jammers for example by means of an alternation of jamming phases and monitoring phases, called "look-through mode"
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K3/00Jamming of communication; Counter-measures
    • H04K3/20Countermeasures against jamming
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K2203/00Jamming of communication; Countermeasures
    • H04K2203/10Jamming or countermeasure used for a particular application
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K1/00Secret communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04JMULTIPLEX COMMUNICATION
    • H04J13/00Code division multiplex systems

Similar Documents

Publication Publication Date Title
Nandakumar et al. Dhwani: secure peer-to-peer acoustic NFC
Shen et al. Ally friendly jamming: How to jam your enemy and maintain your own wireless connectivity at the same time
Pöpper et al. Investigation of signal and message manipulations on the wireless channel
Shahriar et al. PHY-layer resiliency in OFDM communications: A tutorial
Singh et al. UWB with pulse reordering: Securing ranging against relay and physical-layer attacks
Mao et al. Tracing malicious relays in cooperative wireless communications
Liu et al. Randomized differential DSSS: Jamming-resistant wireless broadcast communication
Zhang et al. Anti-jamming message-driven frequency hopping—Part I: System design
Leu et al. Message time of arrival codes: A fundamental primitive for secure distance measurement
US9608803B2 (en) Method for defense against primary user emulation attacks in cognitive radio networks using advanced encryption
Jin et al. Zero pre-shared secret key establishment in the presence of jammers
Flury et al. Effectiveness of distance-decreasing attacks against impulse radio ranging
Letafati et al. A new frequency hopping-aided secure communication in the presence of an adversary jammer and an untrusted relay
Rahbari et al. Secrecy beyond encryption: obfuscating transmission signatures in wireless communications
Liu et al. Defending DSSS-based broadcast communication against insider jammers via delayed seed-disclosure
Rahbari et al. Friendly CryptoJam: A mechanism for securing physical-layer attributes
Luo et al. Secure ranging with ieee 802.15. 4z hrp uwb
Li et al. Wireless communications under hostile jamming: security and efficiency
Hu et al. Preventing overshadowing attacks in self-jamming audio channels
KR101101853B1 (en) Frequency hopping chief signal communication device and method
Zhang et al. Correlation-based search against friendly jamming data exchange schemes
Cai et al. Multiple cooperative attackers for tag-based physical layer authentication
Huang et al. Secure and reliable multidimensional orthogonal code aided rf watermark design for nb-iot systems
Zheng et al. Profiling the strength of physical-layer security: A study in orthogonal blinding
Shen et al. No time to demodulate-fast physical layer verification of friendly jamming