PROJECT TITLE :

Protecting Secret Key Generation Systems Against Jamming: Energy Harvesting and Channel Hopping Approaches - 2017

ABSTRACT:

Jamming attacks represent a vital vulnerability for wireless secret key generation (SKG) systems. In this paper, 2 counter-jamming approaches are investigated for SKG systems: 1st, the utilization of energy harvesting (EH) at the legitimate nodes to flip half of the jamming power into helpful communication power, and, second, the utilization of channel hopping or power spreading in block fading channels to cut back the impact of jamming. In both cases, the adversarial interaction between the pair of legitimate nodes and also the jammer is formulated as a two-player zero-total game and also the Nash and Stackelberg equilibria are characterised analytically and in closed type. In explicit, within the case of EH receivers, the existence of a critical transmission power for the legitimate nodes allows the complete characterization of the sport's equilibria and also enables the entire neutralization of the jammer. In the case of channel hopping versus power spreading techniques, it is shown that the jammer's optimal strategy is always power spreading whereas the legitimate nodes ought to only use power spreading within the high signal-to-interference ratio (SIR) regime. In the low SIR regime, when avoiding the jammer's interference becomes important, channel hopping is perfect for the legitimate nodes. Numerical results demonstrate the efficiency of both counter-jamming measures.


Did you like this research project?

To get this research project Guidelines, Training and Code... Click Here


PROJECT TITLE :Big Data Based Security Analytics for Protecting Virtualized Infrastructures in Cloud Computing - 2018ABSTRACT:Virtualized infrastructure in cloud computing has become an enticing target for cyberattackers to
PROJECT TITLE : Big Data Based Security Analytics for Protecting Virtualized Infrastructures in Cloud Computing - 2017 ABSTRACT: Virtualized infrastructure in cloud computing has become an enticing target for cyberattackers
PROJECT TITLE :Expression Control in Singing Voice Synthesis: Features, approaches, evaluation, and challengesABSTRACT:Within the context of singing voice synthesis, expression control manipulates a group of voice features related
PROJECT TITLE :Protecting Patient Data-The Economic Perspective of Healthcare SecurityABSTRACT:Despite the ambiguities of healthcare security prices and edges, market mechanisms will nudge healthcare organizations toward effective
PROJECT TITLE :Protecting Multi-Lateral Localization Privacy in Pervasive EnvironmentsABSTRACT:Location-primarily based services (LBSs) have raised serious privacy issues in the society, because of the possibility of leaking a

Ready to Complete Your Academic MTech Project Work In Affordable Price ?

Project Enquiry