2017
DOI: 10.1109/twc.2016.2633336
|View full text |Cite
|
Sign up to set email alerts
|

Robust Resource Allocation to Enhance Physical Layer Security in Systems With Full-Duplex Receivers: Active Adversary

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
51
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 77 publications
(51 citation statements)
references
References 45 publications
0
51
0
Order By: Relevance
“…If Eve knows that Alice and Bob insert jamming samples into their own Tx signals as given in (7), the receiver structure of Eve is equivalent to that in Figure 4 except for not exploiting the "Digital SI Canceller" block. From (18) and (19), we obtain ȳ e = [ȳ e (0), … ,ȳ e (L a − 1)] T , where from which we have The processes undertaken by Eve to wiretap the confidential information of Bob are equivalent to those in (16)- (21), except that y e in (16) is modified by When Eve eavesdrops on the data transmitted by Alice, the Tx signal of Bob received at Eve is treated as background noise.…”
Section: Receiver Structure and Operations Of Evementioning
confidence: 99%
See 3 more Smart Citations
“…If Eve knows that Alice and Bob insert jamming samples into their own Tx signals as given in (7), the receiver structure of Eve is equivalent to that in Figure 4 except for not exploiting the "Digital SI Canceller" block. From (18) and (19), we obtain ȳ e = [ȳ e (0), … ,ȳ e (L a − 1)] T , where from which we have The processes undertaken by Eve to wiretap the confidential information of Bob are equivalent to those in (16)- (21), except that y e in (16) is modified by When Eve eavesdrops on the data transmitted by Alice, the Tx signal of Bob received at Eve is treated as background noise.…”
Section: Receiver Structure and Operations Of Evementioning
confidence: 99%
“…As studied in [7][8][9], a legitimate receiver operating in IFD can transmit a jamming signal while receiving the information transmitted from a legitimate transmitter. In the presence of an adversary exploiting IFD for both eavesdropping and jamming attack simultaneously, [18] and [19] studied strategies to maximize the secrecy capacity by minimizing the effects of the jamming attack. In [10][11][12][13], IFD is applied in a bi-directional IFD (BD-IFD) communication environment where two legitimate users operating in IFD exchange their data.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…The performance of the proposed secrecy transmission approaches is studied using several simulation examples in Section VI, and conclusions are drawn in Section VII. Due to space limitation, the solutions to the proposed problems are removed and have been included in the extended version of this paper [27].…”
Section: Introductionmentioning
confidence: 99%