2014
DOI: 10.4218/etrij.14.0213.0090
|View full text |Cite
|
Sign up to set email alerts
|

A Distributed Implementation Algorithm for Physical Layer Security Based on Untrusted Relay Cooperation and Artificial Noise

Abstract: In this letter, we consider a cooperation system with multiple untrusted relays (URs). To keep the transmitted information confidential, we obtain joint channel characteristics (JCCs) through combining the channels from the source to the destination. Then, in the null space of the JCCs, jammers construct artificial noise to confuse URs when the source node broadcasts its data. Through a distributed implementation algorithm, the weight of each node can be obtained from its own channel state information. Simulat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 10 publications
(10 reference statements)
0
2
0
Order By: Relevance
“…The use of physical layer security [50][51][52], which exploits the diversity and variability of wireless channels and the uniqueness and reciprocity of channels in legitimate communications, can be explored using the endogenous wireless communication security mechanism based on the characteristics of wireless propagation. Certain new air interference technologies adopted in 5G, such as massive MIMO, high frequency, and large bandwidth communication, make it more convenient to extract security elements from wireless resources and to contribute to the application of physical layer security [53].…”
Section: Physical Layer Security With Air Interfacementioning
confidence: 99%
“…The use of physical layer security [50][51][52], which exploits the diversity and variability of wireless channels and the uniqueness and reciprocity of channels in legitimate communications, can be explored using the endogenous wireless communication security mechanism based on the characteristics of wireless propagation. Certain new air interference technologies adopted in 5G, such as massive MIMO, high frequency, and large bandwidth communication, make it more convenient to extract security elements from wireless resources and to contribute to the application of physical layer security [53].…”
Section: Physical Layer Security With Air Interfacementioning
confidence: 99%
“…It is a system applied by a variety of intrusion detection technologies [11,12]. Thus, it is divided into host based intrusion detection system and network based intrusion detection system.…”
Section: Malware Detection Techniquesmentioning
confidence: 99%