Securing Large-Scale D2D Networks Using Covert Communication and Friendly Jamming.
Shaohan FengXiao LuSumei SunDusit NiyatoEkram HossainPublished in: CoRR (2022)
Keyphrases
- computer networks
- network analysis
- key players
- real life
- high bandwidth
- pose estimation
- small scale
- packet switched
- communication systems
- communication cost
- information flow
- social network analysis
- complex networks
- network resources
- terrorist networks
- network infrastructure
- network connectivity
- information sharing
- communication patterns
- network size
- communication networks
- heterogeneous networks
- network design
- network structure
- network model
- real world
- interconnection networks
- communication overhead
- real world networks
- information exchange
- information security