2019
DOI: 10.1109/tcomm.2019.2937303
|View full text |Cite
|
Sign up to set email alerts
|

An Intermittent Cooperative Jamming Strategy for Securing Energy-Constrained Networks

Abstract: The Internet-of-Things (IoT) emerges as a paradigm to achieve ubiquitous connectivity via wireless communications between kinds of physical objects. Due to the wireless broadcasting nature and the energy constraint of physical objects, concerns on IoT security have triggered research on cooperative jamming based physical layer security. With the help of a cooperative jammer, existing solutions can effectively fight against eavesdroppers. However, these schemes are of high energy cost due to continuously transm… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
7
1

Relationship

2
6

Authors

Journals

citations
Cited by 14 publications
(6 citation statements)
references
References 68 publications
0
6
0
Order By: Relevance
“…Optimal beamforming design plays an important role in the improvement of secure performance in wireless communication networks by using physical layer security. The related works can be classified into three categories, namely, secure beamforming design in conventional MISO networks with CJ under perfect CSI [20]- [26], robust secure beamforming design in conventional MISO networks with CJ under imperfect CSI [27]- [33], and secure beamforming design in IRS-assisted secure wireless networks [38]- [44].…”
Section: A Related Work and Motivationmentioning
confidence: 99%
See 2 more Smart Citations
“…Optimal beamforming design plays an important role in the improvement of secure performance in wireless communication networks by using physical layer security. The related works can be classified into three categories, namely, secure beamforming design in conventional MISO networks with CJ under perfect CSI [20]- [26], robust secure beamforming design in conventional MISO networks with CJ under imperfect CSI [27]- [33], and secure beamforming design in IRS-assisted secure wireless networks [38]- [44].…”
Section: A Related Work and Motivationmentioning
confidence: 99%
“…For the conventional MISO network secure communication with perfect CSI, the beamforming and jamming design were jointly optimized to achieve different objectives, e.g., the secrecy rate maximization of users [20]- [23], the minimization of energy consumption [24], and the system efficiency maximization [25], [26]. Specifically, in [20], the authors exploited the CJ for multiple users via broadcast channels to enhance the secure performance with the help of a friendly jammer.…”
Section: A Related Work and Motivationmentioning
confidence: 99%
See 1 more Smart Citation
“…They designed an optimal policy to preserve secrecy via stopping nodes from transmission. Following this work, existing studies on cooperative jamming focused on secure communication in various scenarios, including relay networks [23] , full-duplex networks [24] , multiple antenna systems [25] , energyconstrained systems [26] , D2D communications [27] , and heterogeneous networks [28] . Most of these works formulated different optimization problems based on various network frameworks, designed beamforming vectors and precoding matrices, optimized jamming transmission power, and finally achieved secure communication.…”
Section: Related Workmentioning
confidence: 99%
“…Take an intermittent jamming strategy proposed in [79] as an example. Different from traditional continuous jamming strategies, the intermittent jamming strategy proposed in this article is aimed at increasing the system security by shortening the jamming time but strengthening the jamming power.…”
Section: Open Research Issuesmentioning
confidence: 99%