2021
DOI: 10.1155/2021/6638405
View full text |Buy / Rent full text
|
Sign up to set email alerts
|

Abstract: Considering the ongoing development of various devices and rich applications in intelligent Internet of Things (IoT) systems, it is a crucial issue to solve secure transmission of legitimate signals for massive data sharing in the systems. Cooperative jamming-based physical layer security is explored to be a complement of conventional cryptographic schemes to protect private information. Yet, this method needs to solve a game between energy consumption and signal secure transmission. In this paper, we summariz… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 90 publications
(69 reference statements)
0
3
0
Order By: Relevance
“…This illustrates that the channel capacity of the R ‐to‐ E is higher than the predefined threshold rate γthe=2RtRs1$$ {\gamma}_{th}^e={2}^{\left({R}_t-{R}_s\right)}-1 $$ with the Rs(bitsfalse/normalsfalse/normalHz)$$ {R}_s\left(\mathrm{bits}/\mathrm{s}/\mathrm{Hz}\right) $$ signifies the secrecy rate and can be expressed as 21,22 : PSOPgoodbreak=italicPr()γE<γthe.$$ {P}_{\mathrm{SOP}}=\mathit{\Pr}\left({\gamma}_E<{\gamma}_{th}^e\right). $$ …”
Section: Performance Analysismentioning
confidence: 99%
“…This illustrates that the channel capacity of the R ‐to‐ E is higher than the predefined threshold rate γthe=2RtRs1$$ {\gamma}_{th}^e={2}^{\left({R}_t-{R}_s\right)}-1 $$ with the Rs(bitsfalse/normalsfalse/normalHz)$$ {R}_s\left(\mathrm{bits}/\mathrm{s}/\mathrm{Hz}\right) $$ signifies the secrecy rate and can be expressed as 21,22 : PSOPgoodbreak=italicPr()γE<γthe.$$ {P}_{\mathrm{SOP}}=\mathit{\Pr}\left({\gamma}_E<{\gamma}_{th}^e\right). $$ …”
Section: Performance Analysismentioning
confidence: 99%
“…We summarize different methods that worked on energyaware routing techniques based on their protocol type and name and also the method they use in their techniques in Table 1 [10][11][12][13][14][15][16][17].…”
Section: Related Workmentioning
confidence: 99%
“…erefore, a lot of studies have been performed to prevent the leakage of private information, and physical layer security (PLS) has been proved to be one of the most effective solutions to improve the security of SWIPT systems [11]. e pivotal character of PLS is to utilize the intrinsic secrecy properties of wireless channels, which can help to realize the secure communication in SWIPT [12][13][14][15].…”
Section: Introductionmentioning
confidence: 99%