A Survey of Cooperative Jamming-Based Secure Transmission for Energy-Limited Systems
نویسندگان
چکیده
منابع مشابه
A multihop-cooperative transmission protocol for energy limited WPAN systems
This paper deals with power allocation strategies in a wireless personal area network (WPAN) supporting the IEEE 802.15.4 standard for low power transmission. The proposed transmission strategy for nodes belonging to a single primary route towards a destination is referred as Multihop Cooperative Transmission Chain (MCTC). The MCTC is based on the relays of the same message by multiple terminal...
متن کاملFriendship-based Cooperative Jamming for Secure Communication in Poisson Networks
Wireless networks with the consideration of social relationships among network nodes are highly appealing for lots of important data communication services. Ensuring the security of such networks is of great importance to facilitate their applications in supporting future social-based services with strong security guarantee. This paper explores the physical layer security-based secure communica...
متن کاملSecure Transmission of Cooperative Zero-Forcing Jamming for Two-User SWIPT Sensor Networks
In this paper, the secrecy performance of the two-user simultaneous wireless information and power transfer (SWIPT) sensor networks is studied and a novel secure transmission scheme of cooperative zero-forcing (ZF) jamming is proposed. The two sensors opportunistically conduct the SWIPT and cooperative ZF jamming, respectively, where the energy required for jamming the eavesdropper is provided ...
متن کاملWorst-Case Cooperative Jamming for Secure Communications in CIoT Networks
The Internet of Things (IoT) is a significant branch of the ongoing advances in the Internet and mobile communications. The use of a large number of IoT devices makes the spectrum scarcity problem even more serious. The usable spectrum resources are almost entirely occupied, and thus, the increasing radio access demands of IoT devices cannot be met. To tackle this problem, the Cognitive Interne...
متن کاملOn the Optimality of Secure Communication Without Using Cooperative Jamming
We consider secure communication over a two-user Gaussian interference channel, where each transmitter sends a confidential message to its legitimate receiver. For this setting, we identify a regime where the simple scheme of using Gaussian wiretap codebook at each transmitter (without cooperative jamming) and treating interference as noise at each intended receiver (in short, GWC-TIN scheme) a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Wireless Communications and Mobile Computing
سال: 2021
ISSN: 1530-8677,1530-8669
DOI: 10.1155/2021/6638405