PROJECT TITLE :

Protecting Secret Key Generation Systems Against Jamming: Energy Harvesting and Channel Hopping Approaches - 2017

ABSTRACT:

Jamming attacks represent a vital vulnerability for wireless secret key generation (SKG) systems. In this paper, 2 counter-jamming approaches are investigated for SKG systems: 1st, the utilization of energy harvesting (EH) at the legitimate nodes to flip half of the jamming power into helpful Communication power, and, second, the utilization of channel hopping or power spreading in block fading channels to cut back the impact of jamming. In both cases, the adversarial interaction between the pair of legitimate nodes and also the jammer is formulated as a two-player zero-total game and also the Nash and Stackelberg equilibria are characterised analytically and in closed type. In explicit, within the case of EH receivers, the existence of a critical transmission power for the legitimate nodes allows the complete characterization of the sport's equilibria and also enables the entire neutralization of the jammer. In the case of channel hopping versus power spreading techniques, it is shown that the jammer's optimal strategy is always power spreading whereas the legitimate nodes ought to only use power spreading within the high signal-to-interference ratio (SIR) regime. In the low SIR regime, when avoiding the jammer's interference becomes important, channel hopping is perfect for the legitimate nodes. Numerical results demonstrate the efficiency of both counter-jamming measures.


Did you like this research project?

To get this research project Guidelines, Training and Code... Click Here


PROJECT TITLE : Overcoming Data Availability Attacks in Blockchain Systems: Short Code-Length LDPC Code Design for Coded Merkle Tree ABSTRACT: Light nodes are a type of node that can be found in blockchains. These nodes only
PROJECT TITLE :Big Data Based Security Analytics for Protecting Virtualized Infrastructures in Cloud Computing - 2018ABSTRACT:Virtualized infrastructure in cloud computing has become an enticing target for cyberattackers to
PROJECT TITLE : Big Data Based Security Analytics for Protecting Virtualized Infrastructures in Cloud Computing - 2017 ABSTRACT: Virtualized infrastructure in cloud computing has become an enticing target for cyberattackers
PROJECT TITLE :Protecting Multi-Lateral Localization Privacy in Pervasive EnvironmentsABSTRACT:Location-primarily based services (LBSs) have raised serious privacy issues in the society, because of the possibility of leaking a
PROJECT TITLE: Protecting Your Right Verifiable Attribute-based Keyword Search with Fine-grained Owner-enforced Search Authorization in the Cloud - 2016 ABSTRACT: Search over encrypted data may be a critically important

Ready to Complete Your Academic MTech Project Work In Affordable Price ?

Project Enquiry