Learn More
Hostile jamming can cause significant performance degradation in wireless communications, but it also provides an unexplored source of additional signal power. In this letter, we propose an energy-harvesting receiver for two-way orthogonal frequency division multiplexing (OFDM) systems under hostile jamming. More specifically, in the downlink, the receiver(More)
This paper considers malicious user detection and energy harvesting in orthogonal frequency division multiplexing-based cognitive radio networks under primary user emulation attack (PUEA). The digital TV (DTV) model adopted is the second generation terrestrial digital television standard (DVB-T2). In this paper, first, we propose an efficient advanced(More)
This paper considers the primary user emulation attack (PUEA) problem in OFDM-based cognitive radio networks, and proposes a robust and efficient AES-based digital TV (DTV) scheme. In the proposed scheme, the existing reference sequence used to generate the pilot subcarriers in the DTV frames is encrypted using the Advanced Encryption Standard (AES)(More)
—This paper considers jamming-resistant OFDM system design under full-band disguised jamming, where the jamming symbols are taken from the same constellation as the information symbols over each subcarrier. First, we analyze the impact of disguised jamming on OFDM systems. It is shown that due to the symmetricity between the authorized signal and jamming,(More)
—This paper develops two spectrally efficient orthogonal frequency division multiplexing (OFDM)-based multicarrier transmission schemes: a scheme with message-driven idle subcar-riers (MC-MDIS) and another with message-driven strengthened subcarriers (MC-MDSS). The basic idea in MC-MDIS is to carry part of the information, which is named carrier bits,(More)
This paper considers robust CDMA receiver design and jamming evaluation under disguised jamming, where the jammer generates a fake signal using the same spreading code, constellation and pulse shaping filter as that of the authorized signal. First, we analyze the performance of conventional CDMA systems under disguised jamming, and show that due to the(More)
This paper considers robust code division multiple access (CDMA) system design and capacity analysis under disguised jamming, where the jammer generates a fake signal using the same spreading code, constellation, and pulse shaping filter as that of the authorized signal. Unlike Gaussian jamming, which is destructive only when jamming is dominant, disguised(More)
This paper considers a game between a power-limited authorized user and a power-limited jammer, who operate independently over the same AWGN channel consisting of multiple bands. We explore the possibility for the authorized user or the jammer to randomly utilize part (or all) of the available spectrum and/or apply nonuniform power allocation. It is found(More)