Wireless Communications and Mobile Computing / 2017 / Article / Fig 1

Research Article

Cognitive Security of Wireless Communication Systems in the Physical Layer

Figure 1

When Alice transmits a message to Bob at time , (a) eavesdropper receives/listens the same message at time , (b) jammer transmits a jamming signal to Bob at time , and (c) spoofer listens to the message at time and then transmits a spoofing message at time where .

Article of the Year Award: Outstanding research contributions of 2020, as selected by our Chief Editors. Read the winning articles.