2011 Conference Record of the Forty Fifth Asilomar Conference on Signals, Systems and Computers (ASILOMAR) 2011
DOI: 10.1109/acssc.2011.6189965
|View full text |Cite
|
Sign up to set email alerts
|

Joint Decode-and-Forward and jamming for wireless physical layer security with destination assistance

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
15
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(16 citation statements)
references
References 11 publications
1
15
0
Order By: Relevance
“…We compared these schemes to two reference schemes in [9] and [10] which we will name, further in this paper, Best Second Hop (BSH) and Best Destination-Eavesdropper Ratio (BDER).…”
Section: System Modelmentioning
confidence: 99%
“…We compared these schemes to two reference schemes in [9] and [10] which we will name, further in this paper, Best Second Hop (BSH) and Best Destination-Eavesdropper Ratio (BDER).…”
Section: System Modelmentioning
confidence: 99%
“…The extension of these jamming schemes for a multicellular environment can reveal many deficiencies in them, e.g., it is more difficult -Proposed an efficient suboptimal algorithm for the majorization of system parameters to avoid global search and the practical case without availability of eavesdroppers' CSI. [207] --Proposed an optimal power allocation algorithm for jamming noise. [208] --Proposed a transmission scheme, by maintain a scaling law of the achievable secrecy rate, to maximize the secrecy performance.…”
Section: G Unique Challenges Of Secure Cooperative Jammingmentioning
confidence: 99%
“…In the context of PLS, cooperative jamming which involves the transmission of additional jamming signals to degrade the received SNR at the potential eavesdropper can be applied by source [9], [10], the intended receiver node [8] or a set of nodes, i.e., source and destination or source and relay to beamform the jamming noise orthogonal to the spatial dimension of the desired signal [11], [12]. Recently, several works have considered the more interesting scenario of untrusted relaying [13]- [21] where the cooperative jamming is performed by the intended receiver, which is referred to as destination-based cooperative jamming (DBCJ).…”
Section: Index Termsmentioning
confidence: 99%