2015
DOI: 10.1002/ett.2992
|View full text |Cite
|
Sign up to set email alerts
|

Jamming partner selection for maximising the worst D2D secrecy rate based on social trust

Abstract: Device-to-device (D2D) communications have recently attracted broad attention, owing to its potential ability to improve spectrum and energy efficiency within the existing cellular infrastructure. Without sophisticated control, D2D users themselves are not powerful enough to resist eavesdropping or fight against security attacks. This work investigates how to select jamming partners for D2D users to thwart eavesdroppers by exploiting social relationship with the help of full channel state information (CSI) and… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 19 publications
(8 citation statements)
references
References 24 publications
(24 reference statements)
0
8
0
Order By: Relevance
“…Thus, the eavesdropper may not acquire the complete information due to receiving jamming signals in certain time slots. Note that the partial jamming technique is different from the aforementioned jamming designs that perform jamming for the entire communication duration and it is also different from the partial jammer selection techniques [192], [193], [194], [195] that select jammers based on the availability of partial CSI for the main or the wiretap links. Figure 14 shows the partial jamming operation in a twoway relaying scheme.…”
Section: E Partial Jammingmentioning
confidence: 99%
See 1 more Smart Citation
“…Thus, the eavesdropper may not acquire the complete information due to receiving jamming signals in certain time slots. Note that the partial jamming technique is different from the aforementioned jamming designs that perform jamming for the entire communication duration and it is also different from the partial jammer selection techniques [192], [193], [194], [195] that select jammers based on the availability of partial CSI for the main or the wiretap links. Figure 14 shows the partial jamming operation in a twoway relaying scheme.…”
Section: E Partial Jammingmentioning
confidence: 99%
“…Also, an iterative algorithm is developed to obtain the optimal power allocation at the jammers. [193] --Proposed a heuristic genetic algorithm based solution followed by low complexity optimization solutions by considering the upper and lower bounds of power allocation. [228] -Proposed a suboptimal power allocation solution for jammer nodes for various scenarios, location of the eavesdroppers, and the destination.…”
Section: G Unique Challenges Of Secure Cooperative Jammingmentioning
confidence: 99%
“…In the literature, the physical layer security issues for D2D underlaying cellular network are taken into account from the different point of views [17]: Securing the cellular communication in the D2D underlaying cellular network, where third‐party nodes eavesdrop the cellular communication [14, 18], securing the cellular communications in the D2D underlaying cellular network, where the D2D nodes eavesdrop the cellular communication [19, 20], securing the D2D communication in the D2D underlaying cellular network, where third‐party nodes eavesdrop the D2D communication [21–24], securing both the cellular and D2D communications in the D2D underlaying cellular network, where the third‐party nodes eavesdrop both the cellular and D2D communications [15] and securing the communication between two users where the third‐party nodes eavesdrop on both of them [16, 25].…”
Section: Introductionmentioning
confidence: 99%
“…A power control and channel access algorithm has been provided in [21] to optimise the achievable rate of CUs and the secrecy rate of D2D pairs through Stackelberg game. Best jamming partner selection for D2D users has been investigated in [22], where heuristic genetic algorithm and low complexity optimisation problem has been presented for maximising the worst case eavesdropping in D2D communications. The secrecy performance of D2D communications in energy harvesting D2D underlaying cellular networks has been studied in [23], where the D2D transmitter first harvests energy from the nearest power beacon then accomplishes secure transmission to the desired D2D receiver.…”
Section: Introductionmentioning
confidence: 99%
“…In order to highlight a significantly more favourable system performance in terms of higher security in wireless networks, a programmable beamformer is set up at the transmitter [1][2][3][4]. Such technologically advanced equipment (precoder) is undoubtedly able to manage the users' links in totally different paradigms, originated from the fact of resource allocation.…”
Section: Introductionmentioning
confidence: 99%