Essays about: "eavesdropper"

Showing result 1 - 5 of 13 essays containing the word eavesdropper.

  1. 1. Secrecy Capacity of Cooperative Transmission with Opportunistic Relaying Scheme

    University essay from

    Author : Dhathri Pravallika Pasumarthi; [2022]
    Keywords : Cooperative Transmission; Opportunistic Relaying; Decode-and-Forward; Outage Probability; Secrecy Capacity; Fading.;

    Abstract : The usage of wireless communication has increased over the past few years. Most wired communications are replaced by wireless communication for ease of use. Wireless communication transfers confidential information like personal information and credentials between two entities. READ MORE

  2. 2. Decode and Forward Relay Assisting Active Jamming in NOMA System

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Lakshmikanth Akurathi; Surya Teja Reddy Chilluguri; [2022]
    Keywords : Physical Layer Security; Power-domain NOMA; Decode and Forward Relay; Jamming in NOMA; Nakagami-m Fading; Relay Transmission; Secrecy Performance.;

    Abstract : Non-orthogonal multiple access (NOMA), with its exceptional spectrum efficiency, was thought to be a promising technology for upcoming wireless communications. Physical layer security has also been investigated to improve the security performance of the system. READ MORE

  3. 3. Physical Layer Security With Active Jamming Using NOMA.

    University essay from Blekinge Tekniska Högskola

    Author : Mounika Polisetti; [2021]
    Keywords : Physical Layer security; secrecy capacity; eavesdropper; spectral efficiency; secure NOMA transmission;

    Abstract : This paper is persuaded to understand the physical layer security in wireless commu-nications utilizing NOMA (Non Orthogonal Multiple Access) concepts in the presence of an eavesdropper. Physical layer security maintains the confidentiality and secrecyof the system against eavesdroppers. READ MORE

  4. 4. Parasitic Tracking Mobile Wireless Networks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Bowen Xu; [2021]
    Keywords : Location privacy attack and evaluation; mobile network simulation; parasitic attacker; Heuristic LSTM;

    Abstract : Along with the growth and popularity of mobile networks, users enjoy more convenient connection and communication. However, exposure of user presence in mobile networks is becoming a major concern and motivated a plethora of LPPM Location Privacy Protection Mechanisms (LPPMs) have been proposed and analysed, notably considering powerful adversaries with rich data at their disposal, e. READ MORE

  5. 5. Multiparty adversarial neural cryptography with symmetric and asymmetric encryption

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Tianpeng Ju; [2021]
    Keywords : Cryptography; neural network; asymmetric encryption; multiparty systems; Kryptografi; neuronnätverk; asymmetrisk kryptering; flerpartssystem;

    Abstract : Deep learning has shown excellent performance in image recognition, speech recognition, natural language processing and other fields over the recent decades. Cryptography is a technical science that studies the preparation and decoding of ciphers. READ MORE