all InfoSec news
Securing Large-Scale D2D Networks Using Covert Communication and Friendly Jamming. (arXiv:2209.15170v1 [cs.CR])
Oct. 3, 2022, 1:20 a.m. | Shaohan Feng, Xiao Lu, Sumei Sun, Dusit Niyato, Ekram Hossain
cs.CR updates on arXiv.org arxiv.org
We exploit both covert communication and friendly jamming to propose a
friendly jamming-assisted covert communication and use it to doubly secure a
large-scale device-to-device (D2D) network against eavesdroppers (i.e.,
wardens). The D2D transmitters defend against the wardens by: 1) hiding their
transmissions with enhanced covert communication, and 2) leveraging friendly
jamming to ensure information secrecy even if the D2D transmissions are
detected. We model the combat between the wardens and the D2D network (the
transmitters and the friendly jammers) as …
More from arxiv.org / cs.CR updates on arXiv.org
Jobs in InfoSec / Cybersecurity
Cybersecurity Skills Challenge -- Sponsored by DoD
@ Correlation One | United States
Security Operations Center (SOC) Analyst
@ GK Cybersecurity Group | Remote
Azure Security Architect
@ First Quality | Remote US - Eastern or Central Timezone
Lead Security Analyst
@ OpenText | Virtual, CA
Cybersecurity Research Engineer
@ Peraton | Silver Spring, MD, United States
Enterprise Security Engineer
@ Salesforce | California - San Francisco