2017
DOI: 10.1049/iet-com.2016.1338
|View full text |Cite
|
Sign up to set email alerts
|

Cooperative jamming for energy harvesting multicast networks with an untrusted relay

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
17
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 11 publications
(17 citation statements)
references
References 43 publications
0
17
0
Order By: Relevance
“…It is worth pointing out that, to ensure the jamming signal d k * can be subtracted by destination i * , it is necessary to take the additional operations (i.e., the pseudo-random code sharing between each destination but not opening to the untrusted relay [25], or random seeds sharing by utilizing the reciprocity of the channels [24], [31]). Meanwhile, the CSI between relay and destination k * should also be provided to the destination i * .…”
Section: Genie-aided User-pair Selectionmentioning
confidence: 99%
See 1 more Smart Citation
“…It is worth pointing out that, to ensure the jamming signal d k * can be subtracted by destination i * , it is necessary to take the additional operations (i.e., the pseudo-random code sharing between each destination but not opening to the untrusted relay [25], or random seeds sharing by utilizing the reciprocity of the channels [24], [31]). Meanwhile, the CSI between relay and destination k * should also be provided to the destination i * .…”
Section: Genie-aided User-pair Selectionmentioning
confidence: 99%
“…In [30], DBJ and precoding schemes have been jointly considered in MIMO untrusted relay networks. The authors in [31] analyze ergodic secrecy rate (ESR) for cooperative multicast networks, in which the energy harvesting destination nodes are considered. For multi-relay scenario, the lower bound of the ergodic secrecy capacity for a single source-destination pair is derived in [32].…”
Section: Introductionmentioning
confidence: 99%
“…In [15], the authors have studied the physical layer security in destination assisted jamming networks in which a selected destination sends jamming signal in the first time slot to an untrusted AF relay. In the same, destination harvests energy from the environment based on the Bernoulli process.…”
Section: Literature Review 121 Jamming In Physical Layer Securitymentioning
confidence: 99%
“…Literature [27] investigated the secrecy performance of a two-hop communication between a source and a destination using destination-assisted jamming, for the reason that the source used an AF wireless energyharvesting untrusted relay to forward the confidential information to the legitimate destination. References [28]- [31] combined cooperative jamming and energy-harvesting relay to improve the physical layer security performance. Reference [28] proposed an energy-harvesting destination aided cooperative jamming framework to protect enciphered information from being intercepted by the untrusted relay.…”
Section: Introductionmentioning
confidence: 99%
“…References [28]- [31] combined cooperative jamming and energy-harvesting relay to improve the physical layer security performance. Reference [28] proposed an energy-harvesting destination aided cooperative jamming framework to protect enciphered information from being intercepted by the untrusted relay. And a source-destination link with an energy-harvesting fullduplex relay and a jammer in the presence of an eavesdropper was investigated in [29].…”
Section: Introductionmentioning
confidence: 99%