2017
DOI: 10.1109/twc.2016.2636201
|View full text |Cite
|
Sign up to set email alerts
|

QoS-Aware Enhanced-Security for TDMA Transmissions from Buffered Source Nodes

Abstract: Abstract-This paper proposes a cross-layer design to secure a set of buffered legitimate source nodes wishing to communicate with a common destination node using a time-division multipleaccess scheme. The users' assignment probabilities to the time slots are optimized to satisfy a certain quality-of-service (QoS) requirement for all the legitimate source nodes. To further improve the system security, we propose beamforming-based cooperative jamming schemes subject to the availability of the channel state infor… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
10
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
3
2
1

Relationship

3
3

Authors

Journals

citations
Cited by 10 publications
(11 citation statements)
references
References 31 publications
1
10
0
Order By: Relevance
“…The legitimate nodes regularly change the secret key seeds to maintain the AN sequence secured from the eavesdropper. A similar assumption can be found in, e.g., [20], [33] and the references therein. and…”
Section: A System Model and Assumptionssupporting
confidence: 66%
“…The legitimate nodes regularly change the secret key seeds to maintain the AN sequence secured from the eavesdropper. A similar assumption can be found in, e.g., [20], [33] and the references therein. and…”
Section: A System Model and Assumptionssupporting
confidence: 66%
“…The preliminary results in [23] showed the gain of joint medium-access control and PHY layer designs on enhancing the security of buffered information source nodes, when those nodes help in jamming whenever they are not scheduled for information transmission. In this paper, unlike [23], we do not assume knowledge of Eve's instantaneous CSI at the legitimate nodes.…”
Section: A Related Workmentioning
confidence: 99%
“…The preliminary results in [23] showed the gain of joint medium-access control and PHY layer designs on enhancing the security of buffered information source nodes, when those nodes help in jamming whenever they are not scheduled for information transmission. In this paper, unlike [23], we do not assume knowledge of Eve's instantaneous CSI at the legitimate nodes. Furthermore, we assume the presence of a battery-powered cooperative jammer that helps in securing the transmissions and achieving the quality-of-service (QoS) requirements of the multiple-access system when the source nodes are equipped with rechargeable batteries and harvest energy from the ambient energy sources.…”
Section: A Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The legitimate nodes regularly change the secret key seeds to maintain the AN sequence secured from the eavesdropper. A similar assumption can be found in, e.g.,[15],[26] and the references therein.…”
mentioning
confidence: 99%