2016
DOI: 10.3390/s16030339
|View full text |Cite
|
Sign up to set email alerts
|

Worst-Case Cooperative Jamming for Secure Communications in CIoT Networks

Abstract: The Internet of Things (IoT) is a significant branch of the ongoing advances in the Internet and mobile communications. Yet, the use of a large number of IoT devices can severely worsen the spectrum scarcity problem. The usable spectrum resources are almost entirely occupied, and thus, the increasing demands of radio access from IoT devices cannot be met. To tackle this problem, the Cognitive Internet of Things (CIoT) has been proposed. In a CIoT network, secondary users, i.e., sensors and actuators, can acces… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
21
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 25 publications
(21 citation statements)
references
References 46 publications
0
21
0
Order By: Relevance
“…On the other hand, jamming is also used to prevent eavesdroppers (Eves) from snooping legitimate communications, which is often called friendly jamming [10,11,12] or cooperative jamming [13,14]. The works in [10,12] investigate system-level issues of introducing friendly jammers.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…On the other hand, jamming is also used to prevent eavesdroppers (Eves) from snooping legitimate communications, which is often called friendly jamming [10,11,12] or cooperative jamming [13,14]. The works in [10,12] investigate system-level issues of introducing friendly jammers.…”
Section: Introductionmentioning
confidence: 99%
“…In [13], multi-antenna jammers use null-space artificial noise (AN) that increases interference of Eves, but is avoided by the legitimate user, for which the right knowledge of the channel between the jammer and the Eves is essential. In [14], the cooperative jammers harvest energy transmitted by a source and use it to generate AN to jam the Eves in cognitive IoT networks, in which an auction framework that formulates the jammer selection and the power allocation together is also provided.…”
Section: Introductionmentioning
confidence: 99%
“…Loosely speaking, the jamming signals can be transmitted from the source [14,15], the legitimate destination [22,23] and the relay [24,25,26,27,28,29,30]. As indicated in these studies, the jamming signals need to be designed carefully since the interference may also be leaked to the desired user.…”
Section: Introductionmentioning
confidence: 99%
“…Also, they developed a joint zero-forcing and successive interference cancellation method to analyze the individual secrecy performance for a multiple access wiretap channel. A friendly cooperative jamming strategy for IoT networks with imperfect eavesdropper's CSI was also investigated in [24]. The authors in [24] transformed this challenge into the worstcase eavesdropper's CSI and formulated a two-stage robust optimization problem to find the optimal solution.…”
Section: Related Workmentioning
confidence: 99%
“…According to (24), we are aware that is mainly affected by ℎ . Also, the channel state vector ℎ is inversely proportional to the distance from the jammer to Eve.…”
Section: A Fast Suboptimal Helper Selection Schemementioning
confidence: 99%