Wireless Communications under Hostile Jamming: Security and Efficiency by Tongtong Li & Tianlong Song & Yuan Liang
Author:Tongtong Li & Tianlong Song & Yuan Liang
Language: eng
Format: epub
ISBN: 9789811308215
Publisher: Springer Singapore
4.2 Secure Subcarrier Assignment
In this section, we present the secure subcarrier assignment scheme, for which the major component is an AES-based secure permutation algorithm . AES is chosen because of its simplicity of design, variable block and key sizes, feasibility in both hardware and software, and resistance against all known attacks [16]. Note that, the secure subcarrier assignment is not limited to any particular cryptographic algorithm but is highly recommended that only thoroughly analyzed cryptographic algorithms be applied.
The AES-based permutation algorithm is used to securely select the frequency hopping pattern for each user so that (i) different users always transmit on non-overlapping sets of subcarriers and (ii) malicious users cannot determine the frequency hopping pattern and therefore cannot launch follower jamming attacks.
We assume there are a total of N c available subcarriers and there are M users in the system. For i = 0, 1, ⋯ , M − 1, the number of subcarriers assigned to user i is denoted as . We assume that different users transmit over non-overlapping set of subcarriers, and we have . The secure subcarrier assignment algorithm is described in the following subsections.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
The Mikado Method by Ola Ellnestam Daniel Brolund(25284)
Hello! Python by Anthony Briggs(24338)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(23430)
Kotlin in Action by Dmitry Jemerov(22509)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(21972)
Dependency Injection in .NET by Mark Seemann(21842)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(20709)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(19522)
Grails in Action by Glen Smith Peter Ledbrook(18605)
Adobe Camera Raw For Digital Photographers Only by Rob Sheppard(17032)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(15843)
Secrets of the JavaScript Ninja by John Resig & Bear Bibeault(13690)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(11853)
Jquery UI in Action : Master the concepts Of Jquery UI: A Step By Step Approach by ANMOL GOYAL(11151)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10621)
Hit Refresh by Satya Nadella(9197)
The Kubernetes Operator Framework Book by Michael Dame(8570)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8400)
Robo-Advisor with Python by Aki Ranin(8360)