{"title":"网络编码技术在协同干扰中的应用","authors":"T. Tran, H. Kong","doi":"10.1109/QBSC.2014.6841217","DOIUrl":null,"url":null,"abstract":"In this article, we propose an application of network-coding technique into jamming the operation of wiretapping in the physical layer. This method is able to resolve the disadvantage in an extreme case in which an eavesdropper, located near to source, can spy the any jamming-seed if it is shared. The jamming signal is proposed to carry an amount of binary message. When it is securely decoded, the source is able to create a network-coding signal from the binary jamming message and its desire messages, allowing for an avoidance of the wiretapping of the nearby eavesdropper.","PeriodicalId":314871,"journal":{"name":"2014 27th Biennial Symposium on Communications (QBSC)","volume":"28 8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"An application of network-coding technique into cooperative jamming\",\"authors\":\"T. Tran, H. Kong\",\"doi\":\"10.1109/QBSC.2014.6841217\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this article, we propose an application of network-coding technique into jamming the operation of wiretapping in the physical layer. This method is able to resolve the disadvantage in an extreme case in which an eavesdropper, located near to source, can spy the any jamming-seed if it is shared. The jamming signal is proposed to carry an amount of binary message. When it is securely decoded, the source is able to create a network-coding signal from the binary jamming message and its desire messages, allowing for an avoidance of the wiretapping of the nearby eavesdropper.\",\"PeriodicalId\":314871,\"journal\":{\"name\":\"2014 27th Biennial Symposium on Communications (QBSC)\",\"volume\":\"28 8 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-06-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 27th Biennial Symposium on Communications (QBSC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/QBSC.2014.6841217\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 27th Biennial Symposium on Communications (QBSC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/QBSC.2014.6841217","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An application of network-coding technique into cooperative jamming
In this article, we propose an application of network-coding technique into jamming the operation of wiretapping in the physical layer. This method is able to resolve the disadvantage in an extreme case in which an eavesdropper, located near to source, can spy the any jamming-seed if it is shared. The jamming signal is proposed to carry an amount of binary message. When it is securely decoded, the source is able to create a network-coding signal from the binary jamming message and its desire messages, allowing for an avoidance of the wiretapping of the nearby eavesdropper.