Abstract — This paper considers the problem of secure communication in Wireless Sensor Networks in the presence of non-colluding passive eavesdroppers. Cognitive networks capabilities such as spectrum sensing, share information and collaboration to optimize the communications can be used to avoid attacks. A collaborative jamming technique is proposed to increase Cognitive Wireless Sensor Networks security and a counter measurement against eavesdropped attacks. Three types of scenarios are defined: attacker location known, attacker location unknown, and attacker and relay co-location. Each new scenario adds a difficulty to the countermeasure to the previous one. Simulations show as Secrecy Outage Probability decreases until 10 % with a stand...
The broadcast characteristic of a wireless networks which is exploited in cooperative communications...
Generally, collisions between packets are undesired in wireless networks. We design this scheme, Coo...
In cognitive radio networks, cognitive nodes operate on a common pool of spectrum where they opportu...
Interference is generally considered as the redundantand unwanted occurrence in wireless communicati...
Interference is generally considered as the redundant and unwanted occurrence in wireless communicat...
Wireless sensor networks (WSNs) play an important role in Cyber Physical Social Sensing (CPSS) syste...
Wireless sensor networks (WSNs) play an important role in Cyber Physical Social Sensing (CPSS) syste...
In this paper, we investigate physical layer network coding (PNC) and destination assisted cooperati...
In this paper, we investigate physical layer network coding (PNC) and destination assisted cooperati...
Wireless sensor networks are built upon a shared medium that makes it easy for adversaries to conduc...
Wireless sensor networks (WSN) are used in many scientific and technological fields. They are used i...
Abstract—Jamming represents the most serious security threat in the field of Wireless Sensor Network...
This paper exploits physical layer network coding (PNC) and friendly jamming to improve their physic...
Physical layer security (PLS) has been extensively explored as an alternative to conventional crypto...
In this paper, we investigate the secure transmission in wireless sensor networks (WSNs) consisting ...
The broadcast characteristic of a wireless networks which is exploited in cooperative communications...
Generally, collisions between packets are undesired in wireless networks. We design this scheme, Coo...
In cognitive radio networks, cognitive nodes operate on a common pool of spectrum where they opportu...
Interference is generally considered as the redundantand unwanted occurrence in wireless communicati...
Interference is generally considered as the redundant and unwanted occurrence in wireless communicat...
Wireless sensor networks (WSNs) play an important role in Cyber Physical Social Sensing (CPSS) syste...
Wireless sensor networks (WSNs) play an important role in Cyber Physical Social Sensing (CPSS) syste...
In this paper, we investigate physical layer network coding (PNC) and destination assisted cooperati...
In this paper, we investigate physical layer network coding (PNC) and destination assisted cooperati...
Wireless sensor networks are built upon a shared medium that makes it easy for adversaries to conduc...
Wireless sensor networks (WSN) are used in many scientific and technological fields. They are used i...
Abstract—Jamming represents the most serious security threat in the field of Wireless Sensor Network...
This paper exploits physical layer network coding (PNC) and friendly jamming to improve their physic...
Physical layer security (PLS) has been extensively explored as an alternative to conventional crypto...
In this paper, we investigate the secure transmission in wireless sensor networks (WSNs) consisting ...
The broadcast characteristic of a wireless networks which is exploited in cooperative communications...
Generally, collisions between packets are undesired in wireless networks. We design this scheme, Coo...
In cognitive radio networks, cognitive nodes operate on a common pool of spectrum where they opportu...