Zhang et al., 2019 - Google Patents
Correlation-based search against friendly jamming data exchange schemesZhang et al., 2019
- Document ID
- 287222686570385560
- Author
- Zhang J
- Hu Q
- Hancke G
- Publication year
- Publication venue
- 2019 IEEE Conference on Dependable and Secure Computing (DSC)
External Links
Snippet
Friendly jamming is a physical-layer approach to protecting the confidentiality of short range wireless communication. In recent years, several practical friendly jamming scenes have been proposed based on the general principle that the recipient jams the channel while the …
- 238000011084 recovery 0 abstract description 13
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B1/00—Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
- H04B1/69—Spread spectrum techniques
- H04B1/713—Spread spectrum techniques using frequency hopping
- H04B1/715—Interference-related aspects
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L27/00—Modulated-carrier systems
- H04L27/26—Systems using multi-frequency codes
- H04L27/2601—Multicarrier modulation systems
- H04L27/2602—Signal structure
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B1/00—Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
- H04B1/69—Spread spectrum techniques
- H04B1/707—Spread spectrum techniques using direct sequence modulation
- H04B1/7097—Interference-related aspects
- H04B1/7103—Interference-related aspects the interference being multiple access interference
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L27/00—Modulated-carrier systems
- H04L27/001—Modulated-carrier systems using chaotic signals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K3/00—Jamming of communication; Counter-measures
- H04K3/40—Jamming having variable characteristics
- H04K3/45—Jamming having variable characteristics characterized by including monitoring of the target or target signal, e.g. in reactive jammers or follower jammers for example by means of an alternation of jamming phases and monitoring phases, called "look-through mode"
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K3/00—Jamming of communication; Counter-measures
- H04K3/20—Countermeasures against jamming
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K2203/00—Jamming of communication; Countermeasures
- H04K2203/10—Jamming or countermeasure used for a particular application
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K1/00—Secret communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04J—MULTIPLEX COMMUNICATION
- H04J13/00—Code division multiplex systems
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Nandakumar et al. | Dhwani: secure peer-to-peer acoustic NFC | |
| Shen et al. | Ally friendly jamming: How to jam your enemy and maintain your own wireless connectivity at the same time | |
| Pöpper et al. | Investigation of signal and message manipulations on the wireless channel | |
| Shahriar et al. | PHY-layer resiliency in OFDM communications: A tutorial | |
| Singh et al. | UWB with pulse reordering: Securing ranging against relay and physical-layer attacks | |
| Mao et al. | Tracing malicious relays in cooperative wireless communications | |
| Liu et al. | Randomized differential DSSS: Jamming-resistant wireless broadcast communication | |
| Zhang et al. | Anti-jamming message-driven frequency hopping—Part I: System design | |
| Leu et al. | Message time of arrival codes: A fundamental primitive for secure distance measurement | |
| US9608803B2 (en) | Method for defense against primary user emulation attacks in cognitive radio networks using advanced encryption | |
| Jin et al. | Zero pre-shared secret key establishment in the presence of jammers | |
| Flury et al. | Effectiveness of distance-decreasing attacks against impulse radio ranging | |
| Letafati et al. | A new frequency hopping-aided secure communication in the presence of an adversary jammer and an untrusted relay | |
| Rahbari et al. | Secrecy beyond encryption: obfuscating transmission signatures in wireless communications | |
| Liu et al. | Defending DSSS-based broadcast communication against insider jammers via delayed seed-disclosure | |
| Rahbari et al. | Friendly CryptoJam: A mechanism for securing physical-layer attributes | |
| Luo et al. | Secure ranging with ieee 802.15. 4z hrp uwb | |
| Li et al. | Wireless communications under hostile jamming: security and efficiency | |
| Hu et al. | Preventing overshadowing attacks in self-jamming audio channels | |
| KR101101853B1 (en) | Frequency hopping chief signal communication device and method | |
| Zhang et al. | Correlation-based search against friendly jamming data exchange schemes | |
| Cai et al. | Multiple cooperative attackers for tag-based physical layer authentication | |
| Huang et al. | Secure and reliable multidimensional orthogonal code aided rf watermark design for nb-iot systems | |
| Zheng et al. | Profiling the strength of physical-layer security: A study in orthogonal blinding | |
| Shen et al. | No time to demodulate-fast physical layer verification of friendly jamming |