Research Article

Cognitive Security of Wireless Communication Systems in the Physical Layer

Figure 1

When Alice transmits a message to Bob at time , (a) eavesdropper receives/listens the same message at time , (b) jammer transmits a jamming signal to Bob at time , and (c) spoofer listens to the message at time and then transmits a spoofing message at time where .