Defeating Super-Reactive Jammers With Deception Strategy: Modeling, Signal Detection, and Performance Analysis

نویسندگان

چکیده

This paper develops a novel framework to defeat super-reactive jammer, one of the most difficult jamming attacks deal with in practice. Specifically, jammer has an unlimited power budget and is equipped self-interference suppression capability simultaneously attack listen transmitter’s activities. Consequently, dealing jammers very challenging. Thus, we introduce smart deception mechanism attract continuously channel then leverage signals transmit data based on ambient backscatter communication technology. To detect backscattered signals, maximum likelihood detector can be adopted. However, this method notorious for its high computational complexity requires model current propagation environment as well state information. Hence, propose deep learning-based that dynamically adapt any channels noise distributions. With Long Short-Term Memory network, our learn received signals’ dependencies achieve performance close optimal detector. Through simulation theoretical results, demonstrate approaches, more uses channel, better bit error rate transmitter achieve.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Detaching Reactive Jammers in Wireless Sensor Network

In recent days, reactive enjoying strike has appeared as an exceptional security risk to wireless sensor network [WSN]. A few schemes are generated to acknowledge the trigger nodes, whose valid transmitting stimulates any reactive jammer. After identifying the trigger node, the node may likely be shut down to deactivate the jammer and its particular routing information is eliminated within the ...

متن کامل

Individual Differences in Deception and Deception Detection

We are building a new corpus of deceptive and nondeceptive speech, using American English and Mandarin Chinese adult native speakers, to investigate individual and cultural differences in acoustic, prosodic, and lexical cues to deception. Here, we report on the role of personality factors using the NEO-FFI (Neuroticism-Extraversion-Openness Five Factor Inventory), gender, ethnicity and confiden...

متن کامل

Turnitoff – Defeating Plagiarism Detection Systems

Defeating plagiarism detection systems involves determining effective approaches for greatest impact at lowest cost with the least likelihood of detection. Relatively simple techniques have been applied elsewhere for avoiding plagiarism detection, demonstrated at the last HEA-ICS conference. In this paper, we discuss defeats for seven plagiarism detection systems, including Essayrater, Seesourc...

متن کامل

Modeling binaural signal detection

• A submitted manuscript is the author's version of the article upon submission and before peer-review. There can be important differences between the submitted version and the official published version of record. People interested in the research are advised to contact the author for the final version of the publication, or visit the DOI to the publisher's website. • The final author version ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Wireless Communications

سال: 2022

ISSN: ['1536-1276', '1558-2248']

DOI: https://doi.org/10.1109/twc.2022.3158189