Securing Large-Scale D2D Networks Using Covert Communication and Friendly Jamming.
Shaohan FengXiao LuSumei SunDusit NiyatoEkram HossainPublished in: IEEE Trans. Wirel. Commun. (2024)
Keyphrases
- computer networks
- network analysis
- high bandwidth
- key players
- real world
- information flow
- small scale
- packet switched
- social network analysis
- communication networks
- terrorist networks
- image registration
- communication cost
- heterogeneous networks
- real life
- network structure
- communication links
- neural network
- network connectivity
- complex systems
- end to end
- information sharing
- network size
- communication overhead
- communication systems
- network nodes
- information security