Login / Signup
Optimal transmission strategy for sensors to defend against eavesdropping and jamming attacks.
Li Yuan
Kun Wang
Toshiaki Miyazaki
Song Guo
Meng Wu
Published in:
ICC (2017)
Keyphrases
</>
optimal strategy
optimal solution
worst case
countermeasures
real time
data fusion
multi sensor
data transmission
malicious attacks
genetic algorithm
computational complexity
monitoring system
control policy