2013
DOI: 10.1007/s11036-013-0483-6
|View full text |Cite
|
Sign up to set email alerts
|

Optimization Schemes for Protective Jamming

Abstract: In this paper, we study strategies for allocating and managing friendly jammers, so as to create virtual barriers that would prevent hostile eavesdroppers from tapping sensitive wireless communication. Our scheme precludes the use of any encryption technique. Applications include domains such as (i) protecting the privacy of storage locations where RFID tags are used for item identification, (ii) secure reading of RFID tags embedded in credit cards, (iii) protecting data transmitted through wireless networks, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
60
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 27 publications
(60 citation statements)
references
References 28 publications
0
60
0
Order By: Relevance
“…Such SNR based analysis has appeared in [23] for protective jamming in a one-hop transmission scenario, in [24] for one-hop MIMO wiretap channel and in [25] for decodeand-forward (DF) relay network.…”
Section: Snr Based Secure Communicationmentioning
confidence: 99%
See 1 more Smart Citation
“…Such SNR based analysis has appeared in [23] for protective jamming in a one-hop transmission scenario, in [24] for one-hop MIMO wiretap channel and in [25] for decodeand-forward (DF) relay network.…”
Section: Snr Based Secure Communicationmentioning
confidence: 99%
“…Amplify-and-Forward Relay [10,11] Physical layer Security [6,7] Secure transmission in AF network Secrecy Capacity Based SNR Based [23][24][25] Trusted relays beamform [13,14,22], hybrid [26][27][28][29] Untrusted relays [15-18, 30, 31] Our Work Also, as the source node itself is transmitting artificial noise, we do not need any additional node(s) for protective jamming. Artificial noise transmission by the source to improve secrecy rate has appeared in [21,39] for a single DF relay node network and one-hop network, respectively.…”
Section: Snr Based Secure Communicationmentioning
confidence: 99%
“…Jammer placement schemes are considered in [17], [32]. The setting of [17] differs from ours in that the jammers continuously emit a jam signal and thus there cannot be any coexisting networks.…”
Section: Introductionmentioning
confidence: 99%
“…The setting of [17] differs from ours in that the jammers continuously emit a jam signal and thus there cannot be any coexisting networks. However, one of the goals mentioned [32] is to not interfere with any legitimate communication. This goal is similar to our collaboration schemes, but [32] relies on a theoretical propagation model and does not report experimental results.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation