2017
DOI: 10.1109/tvt.2016.2639827
|View full text |Cite
|
Sign up to set email alerts
|

Antieavesdropping With Selfish Jamming in Wireless Networks: A Bertrand Game Approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
6
3

Relationship

1
8

Authors

Journals

citations
Cited by 27 publications
(8 citation statements)
references
References 30 publications
0
8
0
Order By: Relevance
“…[220] --Proposed a social-aware cooperative jamming strategy along with optimal power allocation scheme. [221] --Proposed two models namely, single-channel multijammer (SCMJ) model and the multichannel single-jammer (MCSJ) model. Also, derived a closedform expression for the optimal price strategy for Bertrand equilibrium.…”
Section: G Unique Challenges Of Secure Cooperative Jammingmentioning
confidence: 99%
“…[220] --Proposed a social-aware cooperative jamming strategy along with optimal power allocation scheme. [221] --Proposed two models namely, single-channel multijammer (SCMJ) model and the multichannel single-jammer (MCSJ) model. Also, derived a closedform expression for the optimal price strategy for Bertrand equilibrium.…”
Section: G Unique Challenges Of Secure Cooperative Jammingmentioning
confidence: 99%
“…From above, the coefficient π should meet Eq. (20). The approximate solution process is given as Algorithm 1.…”
Section: Analysis Of Edsj Under Multi-antenna Modelmentioning
confidence: 99%
“…Since the computation of ∆ 2,2,s * (R s ) in (22) is the most challenging, we will mainly focus on the derivation of this equation in the sequel. We first compute F γR (J R (1 + x) − 1), (J R (1 + x) − 1) l e −(JR(1+x)−1)/(β h,ij,s * ) = e −(JR−1)/(β h,ij,s * ) l r=0 l r (J R − 1) l−r J r R x r e −(JRx)/(β h,ij, After some manipulations, we can obtain ∆ 2,2,s * (R s ) in (22). Similarly, we can readily compute other terms in (22).…”
Section: Appendix B: Derivation Of Theoremmentioning
confidence: 99%
“…Under the assumption that multiple relays are available in the system, the authors of [21] investigated optimal distributed jamming schemes that maximize the secrecy rate. A game theoretic approach was proposed in [22], which optimizes the secrecy performance of wireless networks with selfish jamming. As for spectrum sharing systems, cooperative jamming was proposed to decrease the intercept probability in [16].…”
Section: Introductionmentioning
confidence: 99%