- Cooperative Communication and Network Coding
- Wireless Communication Security Techniques
- Cognitive Radio Networks and Spectrum Sensing
- graph theory and CDMA systems
- Network Security and Intrusion Detection
- Full-Duplex Wireless Communications
- Power Line Communications and Noise
- Error Correcting Code Techniques
- Internet Traffic Analysis and Secure E-voting
- Cellular Automata and Applications
China Three Gorges University
2023-2024
Xidian University
2020-2023
In this paper, we investigate the covert communications in an overlay cognitive radio (CR) network, where multiple secondary transmitters (STs) opportunistically send confidential information to a receiver (SR). contrast current studies with ensuring security of transmitted, are motivated protect communication behavior CR which is considered as higher-level security. To address rate and fairness performance, three joint user-jammer scheduling schemes proposed, namely, rate-oriented user...
In this paper, we investigate a covert cooperative cognitive radio (CCCR) system, where multiple primary transmitters (PTs) transmit information with the aid of secondary (STs) in order to conserve power consumption. return, by opportunistically accessing PT's spectrum, STs send confidential receiver (SR) presence external eavesdropper (Eve). Aiming maximize rate, model our CCCR framework as an evolutionary game which each PT and ST make decisions based on their utility histories. By...
Differential frequency hopping (DFH) technique is widely used in wireless communications by exploiting its capabilities of mitigating tracking interference and confidentiality. However, electronic attacks systems become more rigorous, which imposes a lot challenges on the DFH sequences designed based linear congruence theory, fuzzy chaotic etc. In this article, we investigate sequence design equivalence principle between G-function algorithm encryption algorithm, order to achieve high...
Covert communications can enhance users's privacy by hiding the existence of communication. In this paper, we analyze a covert cooperative cognitive radio (CCCR) networks, where primary transmitter (PT) transmits information with aid one secondary (ST). return, ST attempts to transmit private exploiting PT's spectrum in presence an eavesdropper (Eve). Specifically, full-duplex receiver (SR) sends jamming signals Eve cause uncertainty varying power. Then, closed-form expression minimal...