Zobrazeno 1 - 10
of 14
pro vyhledávání: '"Harshan, Jagadeesh"'
Autor:
Harshan Jagadeesh, Jaya Goel
Publikováno v:
IEEE Transactions on Wireless Communications. 22:1044-1059
Autor:
Harshan Jagadeesh, Vivek Chaudhary
Publikováno v:
IEEE Transactions on Cognitive Communications and Networking. 7:1304-1319
We address a denial of service attack on low-latency communication, wherein a cognitive adversary, armed with a full-duplex radio, can simultaneously measure the energy levels on the victim’s frequency band besides jamming it. First, we show that t
Autor:
Jaya Goel, Harshan Jagadeesh
Publikováno v:
IEEE Transactions on Wireless Communications. 20:6049-6063
Multi-hop networks comprising line-of-sight dominated wireless channels have found attractive applications in wireless networks involving unmanned aerial vehicles. It is well known that these applications require both high-reliability and low-latency
Autor:
Harshan Jagadeesh, Vivek Chaudhary
With potential applications to short-packet communication, we address communication of low-latency messages in fast-fading channels under the presence of a reactive jammer. Unlike a traditional jammer, we assume a full-duplex (FD) jammer capable of d
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::3b3ec6ad8550a5ede58939865f9dd995
http://arxiv.org/abs/2205.13198
http://arxiv.org/abs/2205.13198
Provenance embedding algorithms are well known for tracking the footprints of information flow in wireless networks. Recently, low-latency provenance embedding algorithms have received traction in vehicular networks owing to strict deadlines on the d
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::8f2ab9f29384262a2d6b845ef5ec60fe
http://arxiv.org/abs/2204.00159
http://arxiv.org/abs/2204.00159
Autor:
Harshan Jagadeesh, Vivek Chaudhary
Publikováno v:
IEEE Transactions on Communications. :1-1
This work addresses a reactive jamming attack on the low-latency messages of a victim, wherein the jammer deploys countermeasure detection mechanisms to change its strategy. We highlight that the existing schemes against reactive jammers use relays w
Autor:
Yih-Chun Hu, Harshan Jagadeesh
Publikováno v:
IEEE Transactions on Vehicular Technology. 68:5642-5656
In this paper, we propose a new adversarial attack on frequency-hopping-based wireless communication between two users, namely Alice and Bob. In this attack, the adversary referred to as Eve, instantaneously modifies the transmitted signal by Alice b
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
COMSNETS
While 5G systems are being deployed across the globe in a phased manner, trust models for communication between the User Equipment (UE) and the core network play a vital role in fulfilling the network goals promised by 5G. Towards that end, the 5G -
It is well known that physical-layer Group Secret-Key (GSK) generation techniques allow multiple nodes of a wireless network to synthesize a common secret-key, which can be subsequently used to keep their group messages confidential. As one of its sa
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::0f8ef276be85dd9c78f9371e5d1126cb
http://arxiv.org/abs/1805.00743
http://arxiv.org/abs/1805.00743