2019
DOI: 10.1109/tifs.2018.2868494
|View full text |Cite
|
Sign up to set email alerts
|

Opportunistic Scheduling for Average Secrecy Rate Enhancement in Fading Downlink Channel With Potential Eavesdroppers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
13
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 17 publications
(16 citation statements)
references
References 39 publications
0
13
0
Order By: Relevance
“…In [16], in order to protect wireless transmissions of scheduled user‐pair, the destination‐aided collaborative jamming is designed. In [17], a user having the maximal secrecy rate will be selected to access the AP, and the AP may utilise multiple antennas to transmit artificial noise to the illegal users. In [18], a pair of user selection schemes are designed to improve the security‐reliability tradeoff (SRT) in a cognitive radio network, where the users are powered with the aid of energy harvesting.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In [16], in order to protect wireless transmissions of scheduled user‐pair, the destination‐aided collaborative jamming is designed. In [17], a user having the maximal secrecy rate will be selected to access the AP, and the AP may utilise multiple antennas to transmit artificial noise to the illegal users. In [18], a pair of user selection schemes are designed to improve the security‐reliability tradeoff (SRT) in a cognitive radio network, where the users are powered with the aid of energy harvesting.…”
Section: Introductionmentioning
confidence: 99%
“…Although extensive research efforts have been devoted to the PLS in the multi‐terminal wireless networks, less attention has been paid to multi‐terminal multi‐mode wireless scenarios. In this paper, differing from [15–21], we explore the PLS of a wireless network consisting of multiple smart terminals relying on coexisting between the licensed modes and the unlicensed modes, in the presence of an eavesdropper. The main contributions of this paper are summarised as follows.…”
Section: Introductionmentioning
confidence: 99%
“…Some eavesdroppers can also generate jamming signals, interfering with the data transmission of legitimate links [ 17 , 18 , 19 , 20 , 21 ]. They are called potential eavesdroppers, are registered in another cell but unauthorized in the legitimate cell, and can be classified as active eavesdroppers [ 22 , 23 , 24 , 25 ]. There are some related studies with respect to potential eavesdroppers.…”
Section: Introductionmentioning
confidence: 99%
“…Then, based on potential eavesdroppers’ CSI, the legitimate transmitter can properly transmit to maximize PLS performance requirement of energy harvesting. In [ 24 ], the public access point (AP) for downlink transmission does not know which users are eavesdroppers. However, the AP considers only one legitimate user, which is selected for downlink transmission, and the other unscheduled users as potential eavesdroppers.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation