Defeating Super-Reactive Jammers With Deception Strategy: Modeling, Signal Detection, and Performance Analysis
نویسندگان
چکیده
This paper develops a novel framework to defeat super-reactive jammer, one of the most difficult jamming attacks deal with in practice. Specifically, jammer has an unlimited power budget and is equipped self-interference suppression capability simultaneously attack listen transmitter’s activities. Consequently, dealing jammers very challenging. Thus, we introduce smart deception mechanism attract continuously channel then leverage signals transmit data based on ambient backscatter communication technology. To detect backscattered signals, maximum likelihood detector can be adopted. However, this method notorious for its high computational complexity requires model current propagation environment as well state information. Hence, propose deep learning-based that dynamically adapt any channels noise distributions. With Long Short-Term Memory network, our learn received signals’ dependencies achieve performance close optimal detector. Through simulation theoretical results, demonstrate approaches, more uses channel, better bit error rate transmitter achieve.
منابع مشابه
Detaching Reactive Jammers in Wireless Sensor Network
In recent days, reactive enjoying strike has appeared as an exceptional security risk to wireless sensor network [WSN]. A few schemes are generated to acknowledge the trigger nodes, whose valid transmitting stimulates any reactive jammer. After identifying the trigger node, the node may likely be shut down to deactivate the jammer and its particular routing information is eliminated within the ...
متن کاملthe effect of metacognitive strategy instruction on efl learners reading comprehension performance and metacognitive awareness
چکیده ندارد.
15 صفحه اولIndividual Differences in Deception and Deception Detection
We are building a new corpus of deceptive and nondeceptive speech, using American English and Mandarin Chinese adult native speakers, to investigate individual and cultural differences in acoustic, prosodic, and lexical cues to deception. Here, we report on the role of personality factors using the NEO-FFI (Neuroticism-Extraversion-Openness Five Factor Inventory), gender, ethnicity and confiden...
متن کاملTurnitoff – Defeating Plagiarism Detection Systems
Defeating plagiarism detection systems involves determining effective approaches for greatest impact at lowest cost with the least likelihood of detection. Relatively simple techniques have been applied elsewhere for avoiding plagiarism detection, demonstrated at the last HEA-ICS conference. In this paper, we discuss defeats for seven plagiarism detection systems, including Essayrater, Seesourc...
متن کاملModeling binaural signal detection
• A submitted manuscript is the author's version of the article upon submission and before peer-review. There can be important differences between the submitted version and the official published version of record. People interested in the research are advised to contact the author for the final version of the publication, or visit the DOI to the publisher's website. • The final author version ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Wireless Communications
سال: 2022
ISSN: ['1536-1276', '1558-2248']
DOI: https://doi.org/10.1109/twc.2022.3158189