2017
DOI: 10.1109/lcomm.2016.2629483
|View full text |Cite
|
Sign up to set email alerts
|

Artificial Noise-Aided User Scheduling for Optimal Secrecy Multiuser Diversity

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
21
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
7

Relationship

2
5

Authors

Journals

citations
Cited by 21 publications
(21 citation statements)
references
References 9 publications
0
21
0
Order By: Relevance
“…According to Appendix A, I 0 can be obtained as (15) at the top of the following page. Moreover, I 1 can be formulated as…”
Section: A Conventional Round-robin User Schedulingmentioning
confidence: 99%
See 2 more Smart Citations
“…According to Appendix A, I 0 can be obtained as (15) at the top of the following page. Moreover, I 1 can be formulated as…”
Section: A Conventional Round-robin User Schedulingmentioning
confidence: 99%
“…Additionally, jamming schemes [12], [13] were conceived for preventing wiretapping by the E at the expense of negligible interference imposed on the legitimate nodes, demonstrating that transmitting specifically designed artificial noise enhances the security of wireless communications. As a design alternative, both user scheduling schemes [14], [15] as well as relay selection schemes [16]- [19] were advocated for upgrading the security of wireless communications. Specifically, cooperative jamming aided user scheduling schemes have been proposed in [14] and [15], relying on a physical-layer security perspective.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Moreover, the concept of cognitive jamming was explored in [13], while specially designed artificial noise was used for preventing eavesdropping in [14]. Furthermore, the authors of [15] and [16] explored opportunistic user scheduling conceived with cooperative jamming. More specifically, in [16], the non-scheduled users of the proposed user scheduling scheme were invoked for generating artificial noise in order to improve security in a multiuser wiretap network.…”
mentioning
confidence: 99%
“…Furthermore, the authors of [15] and [16] explored opportunistic user scheduling conceived with cooperative jamming. More specifically, in [16], the non-scheduled users of the proposed user scheduling scheme were invoked for generating artificial noise in order to improve security in a multiuser wiretap network. Both one-way [17], [18] and two-way [19], [20] relaying schemes were conceived for guarding against eavesdropping, demonstrating that relay selection schemes are capable of improving the PLS.…”
mentioning
confidence: 99%