Abstract—This paper concerns the eavesdropping problem from the eavesdroppers ’ perspective, which is new since most of previous studies only concentrate on the good nodes. We propose an analytical framework to investigate the eavesdropping attacks, taking account into various channel conditions and antenna models. Our extensive numerical results show that the probability of eavesdropping attacks heavily depends on the shadow fading effect, the path loss effect and the antenna models; particularly, they imply that using directional antennas at eavesdroppers can increase the probability of eavesdropping attacks when the path loss effect is less notable. This study is helpful for us to prevent the eavesdropping attacks effectively and economi...
This paper investigates the secrecy connectivity probability for wireless networks with transmit ant...
There are a number of studies on using directional antennas in wireless networks. Many of them conce...
[[abstract]]©2006 IEEE-Reconnaissance activity is the most frequent incident on computer networks si...
Abstract—This paper concerns the eavesdropping problem from the eavesdroppers ’ perspective, which i...
Abstract. This paper concerns the eavesdropping attacks in wireless ad hoc networks under a shadow f...
The security of Internet of Things (IoT) has received extensive attention recently. This paper prese...
The eavesdropping attack is a serious security threat to a wireless sensor network (WSN) since the e...
Copyright © 2013 Hong-Ning Dai et al.This is an open access article distributed under the Creative C...
This paper analyzes the benefit of using directional antennas against eavesdropping attack in millim...
Abstract—This paper addresses the problem of anti-eavesdropping in wireless network physical layer. ...
International audienceWe analyze the secrecy outage probability in the downlink for wireless network...
We analyze the secrecy outage probability in the downlink for wireless networks with spatially (Pois...
Wireless communications offer data transmission services anywhere and anytime, but with the inevitab...
The broadcast nature of wireless communication makes it intrinsically vulnerable to eavesdropping at...
International audienceThis paper investigates the secrecy connectivity probability for wireless netw...
This paper investigates the secrecy connectivity probability for wireless networks with transmit ant...
There are a number of studies on using directional antennas in wireless networks. Many of them conce...
[[abstract]]©2006 IEEE-Reconnaissance activity is the most frequent incident on computer networks si...
Abstract—This paper concerns the eavesdropping problem from the eavesdroppers ’ perspective, which i...
Abstract. This paper concerns the eavesdropping attacks in wireless ad hoc networks under a shadow f...
The security of Internet of Things (IoT) has received extensive attention recently. This paper prese...
The eavesdropping attack is a serious security threat to a wireless sensor network (WSN) since the e...
Copyright © 2013 Hong-Ning Dai et al.This is an open access article distributed under the Creative C...
This paper analyzes the benefit of using directional antennas against eavesdropping attack in millim...
Abstract—This paper addresses the problem of anti-eavesdropping in wireless network physical layer. ...
International audienceWe analyze the secrecy outage probability in the downlink for wireless network...
We analyze the secrecy outage probability in the downlink for wireless networks with spatially (Pois...
Wireless communications offer data transmission services anywhere and anytime, but with the inevitab...
The broadcast nature of wireless communication makes it intrinsically vulnerable to eavesdropping at...
International audienceThis paper investigates the secrecy connectivity probability for wireless netw...
This paper investigates the secrecy connectivity probability for wireless networks with transmit ant...
There are a number of studies on using directional antennas in wireless networks. Many of them conce...
[[abstract]]©2006 IEEE-Reconnaissance activity is the most frequent incident on computer networks si...