2015
DOI: 10.1109/tpds.2014.2316155
|View full text |Cite
|
Sign up to set email alerts
|

Secrecy Capacity Optimization via Cooperative Relaying and Jamming for WANETs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
31
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 58 publications
(31 citation statements)
references
References 27 publications
0
31
0
Order By: Relevance
“…All the existing physical layer security methods in [3] are classified into five major approaches: theoretical secrecy capacity, multiple-input-multipleoutput (MIMO) channel, coding schemes (channel coding and network coding), power allocation, and signal design (artificial noise). Additionally, cooperative relay [11]- [13], cooperative jamming [14] and energy harvesting [15] are other useful methods. Among the aforementioned methods, cooperative jamming is a promising technique and has attracted significant attention.…”
Section: A Physical Layer Securitymentioning
confidence: 99%
See 2 more Smart Citations
“…All the existing physical layer security methods in [3] are classified into five major approaches: theoretical secrecy capacity, multiple-input-multipleoutput (MIMO) channel, coding schemes (channel coding and network coding), power allocation, and signal design (artificial noise). Additionally, cooperative relay [11]- [13], cooperative jamming [14] and energy harvesting [15] are other useful methods. Among the aforementioned methods, cooperative jamming is a promising technique and has attracted significant attention.…”
Section: A Physical Layer Securitymentioning
confidence: 99%
“…However, these two techniques are adopted separately in most works [11], [12], [32]- [34]. In [12], a scheme with joint cooperative jamming and beamforming is proposed to enhance the security of a cooperative relay network, where part of the nodes uses a distributed beamforming mechanism while the others jam the eavesdropper simultaneously.…”
Section: A Cooperative Jamming With Multiple Antennas and Beamformingmentioning
confidence: 99%
See 1 more Smart Citation
“…To maximize the secrecy capacity, the authors of [12] proposed a scheme in which the best channel condition relay is in charge of information relaying, while other relays are in charge of sending jamming signals. The work in [13] considered a more complex model in which multiple sources transmit signals to multiple destinations with multiple relays through a smart jamming algorithm.…”
Section: Introductionmentioning
confidence: 99%
“…Specifically, the SC can make the transmission from the source node to the legitimate destination node secure while achieving zero mutual information between the source node and malicious eavesdropper node. Based on this idea, extensive research efforts have been devoted to improving the SC from an information-theoretic perspective under different scenarios, for example, cooperative relaying [12][13][14][15] and beamforming techniques [16,17], cooperative jamming (CJ) methods [18][19][20], and multiple-input multipleoutput (MIMO) schemes [21,22].…”
Section: Introductionmentioning
confidence: 99%