2020
DOI: 10.1109/lwc.2019.2950303
|View full text |Cite
|
Sign up to set email alerts
|

Testbed for Cooperative Jamming Cancellation in Physical Layer Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
10
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 32 publications
(13 citation statements)
references
References 11 publications
1
10
0
Order By: Relevance
“…Moreover, by evaluating of the limits 0 = lim ξ→0 ∂ RLB s /∂ξ and 1 = lim ξ→1 ∂ RLB s /∂ξ via utilizing L'Hôpital's rule, one can easily infer that 0 > 0 and 1 < 0, hence a unique globally optimal point of ξ exists. This fact is also validated in our simulation results in Section V. Therefore, with the aim of maximizing the ESR in (31), it suffices to invoke (32) and solve ∂ RLB s ∂ξ = 0. Toward this end, the well-known and easyto-implement bisection approach is used in this paper [27].…”
Section: Optimal Power Allocationsupporting
confidence: 65%
See 1 more Smart Citation
“…Moreover, by evaluating of the limits 0 = lim ξ→0 ∂ RLB s /∂ξ and 1 = lim ξ→1 ∂ RLB s /∂ξ via utilizing L'Hôpital's rule, one can easily infer that 0 > 0 and 1 < 0, hence a unique globally optimal point of ξ exists. This fact is also validated in our simulation results in Section V. Therefore, with the aim of maximizing the ESR in (31), it suffices to invoke (32) and solve ∂ RLB s ∂ξ = 0. Toward this end, the well-known and easyto-implement bisection approach is used in this paper [27].…”
Section: Optimal Power Allocationsupporting
confidence: 65%
“…in [31] proposed a secure transmission from a multi-antenna controller to an actuator in an IoT network by deploying AN injection technique and utilizing an external multi-antenna cooperative jammer. Recently, the researchers in [32] have proposed a practical testbed to ensure secure transmission for a pointto-point communication. They utilized an external node as the cooperative jammer to overcome the passive eavesdropping.…”
Section: B Related Workmentioning
confidence: 99%
“…In contrast, we propose a hybrid transmission policy according to the type of the source packets scheduled to be transmitted. When sending RoI-related packets, our proposed system model deploys maximum ratio transmission (MRT) beamforming together with artificial noise (AN) injection, as a practical and low cost PLS technique [22], to achieve a physical enhancement for the legitimate link, while degrading the eavesdropping ability of potential Eves. For the transmission of BG packets, we simply deploy MRT in order to save power consumption and improve the packet accumulation ability of legitimate receiver, since the BG regions require less stringent security.…”
Section: Contributionsmentioning
confidence: 99%
“…Traditionally, ( 22) could be solved via numerical algorithms leading to a large computational complexity. In contrary, we propose a learning-based scheme to solve (22) in an efficient way.…”
Section: Optimized Learning-based Image Transmissionmentioning
confidence: 99%
See 1 more Smart Citation