2021
DOI: 10.1155/2021/6638405
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of Cooperative Jamming-Based Secure Transmission for Energy-Limited Systems

Abstract: Considering the ongoing development of various devices and rich applications in intelligent Internet of Things (IoT) systems, it is a crucial issue to solve secure transmission of legitimate signals for massive data sharing in the systems. Cooperative jamming-based physical layer security is explored to be a complement of conventional cryptographic schemes to protect private information. Yet, this method needs to solve a game between energy consumption and signal secure transmission. In this paper, we summariz… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 90 publications
0
4
0
Order By: Relevance
“…Such attacks can harm the performance and endanger the data integrity of IoT systems (Benslimane and Nguyen-Minh, 2016). These attacks will threaten the data integrity during the transmissions and further cause great damage to the performance of the IoT systems (Wu and Huo, 2021). Profiling approach is adopted by consumers for analyzing the security of IoT devices.…”
Section: Results Discussion and Implicationsmentioning
confidence: 99%
“…Such attacks can harm the performance and endanger the data integrity of IoT systems (Benslimane and Nguyen-Minh, 2016). These attacks will threaten the data integrity during the transmissions and further cause great damage to the performance of the IoT systems (Wu and Huo, 2021). Profiling approach is adopted by consumers for analyzing the security of IoT devices.…”
Section: Results Discussion and Implicationsmentioning
confidence: 99%
“…This illustrates that the channel capacity of the R ‐to‐ E is higher than the predefined threshold rate γthe=2RtRs1$$ {\gamma}_{th}^e={2}^{\left({R}_t-{R}_s\right)}-1 $$ with the Rs(bitsfalse/normalsfalse/normalHz)$$ {R}_s\left(\mathrm{bits}/\mathrm{s}/\mathrm{Hz}\right) $$ signifies the secrecy rate and can be expressed as 21,22 : PSOPgoodbreak=italicPr()γE<γthe.$$ {P}_{\mathrm{SOP}}=\mathit{\Pr}\left({\gamma}_E<{\gamma}_{th}^e\right). $$ …”
Section: Performance Analysismentioning
confidence: 99%
“…We summarize different methods that worked on energyaware routing techniques based on their protocol type and name and also the method they use in their techniques in Table 1 [10][11][12][13][14][15][16][17].…”
Section: Related Workmentioning
confidence: 99%