2015
DOI: 10.1016/j.comcom.2015.02.012
|View full text |Cite
|
Sign up to set email alerts
|

Secure inter-cluster communications with cooperative jamming against social outcasts

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
3
3

Relationship

2
4

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 25 publications
0
5
0
Order By: Relevance
“…Finally, we substitute (38) and (42) with into (11), and then substitute ( 11) into (9) to obtain (15).…”
Section: Appendix B Proof Of Theoremmentioning
confidence: 99%
See 2 more Smart Citations
“…Finally, we substitute (38) and (42) with into (11), and then substitute ( 11) into (9) to obtain (15).…”
Section: Appendix B Proof Of Theoremmentioning
confidence: 99%
“…Substituting (49) and ( 46) into (11) and then substituting (11) into (9) yields (16). P (r) can be written as P (r) = u + vr 4 , where u…”
Section: Appendix C Proof Of Theoremmentioning
confidence: 99%
See 1 more Smart Citation
“…Thus, we can have Cj,k(Ps,Pj)=qjlog21+Psgsdlog21+PsgskPjhjk+1++(1qj)log2(1+Psgsd)log2(1+Psgsk)+ where q j ∈[0,1] is the social trust index of jammers and it jointly indicates both the socially established mutual trust between them and physical link stability of the channel from jammer node to eavesdropper . Note that physical link stability can be evaluated by contact (encountering) duration and frequency for the neighbouring devices to form potential D2D links or finding friendly jammers . q j =1 means a fully connected link or a trusted and dependable node, while q j =0 means a link or a node is totally untrustworthy and cannot be relied on at all.…”
Section: System Model and Problem Formulationmentioning
confidence: 99%
“…Few works consider the physical layer security in D2D communications against eavesdropper or social outcasts, though some studies can be found on related problems such as in basic D2D links, as well as in traditional wireless relay networks. The mecha nism presented in [11] investigated the improvement of secrecy rate for cellular users by taking DUEs as friendly jammers, and [12] discussed D2D oriented secrecy performance generally in terms of clusters. In traditional cooperative relay networks, cooperative jamming (CJ) [13] [14] [15] [16] has been widely used to combat interception, and it was proven to have the potential to improve achievable secrecy rate.…”
Section: Introductionmentioning
confidence: 99%