ﻻ يوجد ملخص باللغة العربية
In this work, we address reliable communication of low-latency packets in the presence of a full-duplex adversary that is capable of executing a jamming attack while also being able to measure the power levels on various frequency bands. Due to the presence of a strong adversary, first, we point out that traditional frequency-hopping does not help since unused frequency bands may not be available, and moreover, the victims transition between the frequency bands would be detected by the full-duplex adversary. Identifying these challenges, we propose a new cooperative mitigation strategy, referred to as the Semi-Coherent Fast-Forward Full-Duplex (SC-FFFD) relaying technique, wherein the victim node, upon switching to a new frequency band, seeks the assistance of its incumbent user, which is also a full-duplex radio, to instantaneously forward its messages to the destination using a portion of their powers. Meanwhile, the two nodes cooperatively use their residual powers on the jammed frequency band so as to engage the adversary to continue executing the jamming attack on the same band. Using on-off keying (OOK) and phase-shift-keying (PSK) as the modulation schemes at the victim and the helper node, respectively, we derive upper bounds on the probability of error of jointly decoding the information symbols of the two nodes, and subsequently derive analytical solutions to arrive at the power-splitting factor between the two frequency bands to minimize the error of both the nodes. We also present extensive simulation results for various signal-to-noise-ratio values and PSK constellations to showcase the efficacy of the proposed approach.
This work addresses a strategy to mitigate jamming attack on low-latency communication by a Full-Duplex (FD) adversary in fast-fading channel conditions. The threat model is such that the FD adversary can jam a frequency band and measure the jammed b
We propose a new adversarial attack on frequency-hopping based wireless communication between two users, namely Alice and Bob. In this attack, the adversary, referred to as Eve, instantaneously modifies the transmitted signal by Alice before forwardi
We consider a full-duplex decode-and-forward system, where the wirelessly powered relay employs the time-switching protocol to receive power from the source and then transmit information to the destination. It is assumed that the relay node is equipp
In this paper the advantages provided by multicell processing of signals transmitted by mobile terminals (MTs) which are received via dedicated relay terminals (RTs) are studied. It is assumed that each RT is capable of full-duplex operation and rece
In this paper the benefits provided by multi-cell processing of signals transmitted by mobile terminals which are received via dedicated relay terminals (RTs) are assessed. Unlike previous works, each RT is assumed here to be capable of full-duplex o