A Survey of Cooperative Jamming-Based Secure Transmission for Energy-Limited Systems

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A multihop-cooperative transmission protocol for energy limited WPAN systems

This paper deals with power allocation strategies in a wireless personal area network (WPAN) supporting the IEEE 802.15.4 standard for low power transmission. The proposed transmission strategy for nodes belonging to a single primary route towards a destination is referred as Multihop Cooperative Transmission Chain (MCTC). The MCTC is based on the relays of the same message by multiple terminal...

متن کامل

Friendship-based Cooperative Jamming for Secure Communication in Poisson Networks

Wireless networks with the consideration of social relationships among network nodes are highly appealing for lots of important data communication services. Ensuring the security of such networks is of great importance to facilitate their applications in supporting future social-based services with strong security guarantee. This paper explores the physical layer security-based secure communica...

متن کامل

Secure Transmission of Cooperative Zero-Forcing Jamming for Two-User SWIPT Sensor Networks

In this paper, the secrecy performance of the two-user simultaneous wireless information and power transfer (SWIPT) sensor networks is studied and a novel secure transmission scheme of cooperative zero-forcing (ZF) jamming is proposed. The two sensors opportunistically conduct the SWIPT and cooperative ZF jamming, respectively, where the energy required for jamming the eavesdropper is provided ...

متن کامل

Worst-Case Cooperative Jamming for Secure Communications in CIoT Networks

The Internet of Things (IoT) is a significant branch of the ongoing advances in the Internet and mobile communications. The use of a large number of IoT devices makes the spectrum scarcity problem even more serious. The usable spectrum resources are almost entirely occupied, and thus, the increasing radio access demands of IoT devices cannot be met. To tackle this problem, the Cognitive Interne...

متن کامل

On the Optimality of Secure Communication Without Using Cooperative Jamming

We consider secure communication over a two-user Gaussian interference channel, where each transmitter sends a confidential message to its legitimate receiver. For this setting, we identify a regime where the simple scheme of using Gaussian wiretap codebook at each transmitter (without cooperative jamming) and treating interference as noise at each intended receiver (in short, GWC-TIN scheme) a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Wireless Communications and Mobile Computing

سال: 2021

ISSN: 1530-8677,1530-8669

DOI: 10.1155/2021/6638405