Wireless Communications and Mobile Computing / 2017 / Article / Fig 1

Research Article

Cognitive Security of Wireless Communication Systems in the Physical Layer

Figure 1

When Alice transmits a message to Bob at time , (a) eavesdropper receives/listens the same message at time , (b) jammer transmits a jamming signal to Bob at time , and (c) spoofer listens to the message at time and then transmits a spoofing message at time where .

We are committed to sharing findings related to COVID-19 as quickly as possible. We will be providing unlimited waivers of publication charges for accepted research articles as well as case reports and case series related to COVID-19. Review articles are excluded from this waiver policy. Sign up here as a reviewer to help fast-track new submissions.