2012 National Days of Network Security and Systems 2012
DOI: 10.1109/jns2.2012.6249243
|View full text |Cite
|
Sign up to set email alerts
|

Exploring opportunistic scheduling in ad-hoc network with physical layer security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2013
2013
2014
2014

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 11 publications
0
2
0
Order By: Relevance
“…The authors demonstrated that when the average SNR of the main channel is at medium and high levels, higher correlation at the receiver exerts more detrimental effects on secrecy than higher correlation at the eavesdropper. Opportunistic scheduling policy for PHY security has been discussed in [20], but the authors have addressed only MAC layer policies.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The authors demonstrated that when the average SNR of the main channel is at medium and high levels, higher correlation at the receiver exerts more detrimental effects on secrecy than higher correlation at the eavesdropper. Opportunistic scheduling policy for PHY security has been discussed in [20], but the authors have addressed only MAC layer policies.…”
Section: Introductionmentioning
confidence: 99%
“…In this paper, we consider a single transmitter with multiple active users and several passive eavesdroppers each equipped with multiple antennas in contrast to [16][17][18] and [20]. We propose an opportunistic scheduling along with TAS at transmitter.…”
Section: Introductionmentioning
confidence: 99%