[PDF][PDF] Physical layer security game: interaction between source, eavesdropper, and friendly jammer

Z Han, N Marina, M Debbah, A Hjørungnes - EURASIP Journal on …, 2010 - Springer
… eavesdropper node, and J friendly jammer nodes as shown in Figure 1. The malicious …
the physical layer security. First, we define the game between the source and friendly jammers. …

Secure relay and jammer selection for physical layer security

H Hui, AL Swindlehurst, G Li… - IEEE Signal Processing …, 2015 - ieeexplore.ieee.org
… The intermediate nodes act as either conventional relays or as jammers to hinder the
eavesdroppers from intercepting the signal of interest. A closed-form expression for the secrecy …

Relay and jammer selection schemes for improving physical layer security in two-way cooperative networks

DH Ibrahim, ES Hassan, SA El-Dolil - computers & security, 2015 - Elsevier
… at the eavesdroppers' nodes. In the second phase, two relay nodes are selected; one node
is … While the other node behaves as a jammer node in order to confuse the eavesdroppers in …

Cooperative jammer placement for physical layer security enhancement

J Liu, Z Liu, Y Zeng, J Ma - IEEE Network, 2016 - ieeexplore.ieee.org
… scenario in which we cannot locate the jammers or the jammers are mobile nodes who
provide friendly jamming temporarily, we can only pick several users randomly to act as jammers. …

Physical layer security in heterogeneous networks with jammer selection and full-duplex users

W Tang, S Feng, Y Ding, Y Liu - IEEE Transactions on Wireless …, 2017 - ieeexplore.ieee.org
… were studied, where a secrecy protected zone around the source node and a interferer-… :
1) A new physical layer security scheme in HetNets is designed, where jammer selection along …

Physical layer security jamming: Theoretical limits and practical designs in wireless networks

K Cumanan, H Xing, P Xu, G Zheng, X Dai… - IEEE …, 2016 - ieeexplore.ieee.org
nodes and the private jammers as the players of the game. This article focuses on physical
layer security jamming techniques based on user cooperations and external nodes. Firstly, …

Improving physical layer security of uplink NOMA via energy harvesting jammers

K Cao, B Wang, H Ding, L Lv, R Dong… - … and Security, 2020 - ieeexplore.ieee.org
… 29], where nodes capable of EH are used to act as jammers that … with jammer selection, where
one of cooperative EH nodes … another intermediate node is chosen as a friendly jammer to …

Jamming strategies for physical layer security

Y Huo, Y Tian, L Ma, X Cheng… - IEEE Wireless …, 2017 - ieeexplore.ieee.org
… selection scheme was proposed in [6], in which the relay and jammers are selected from
multiple friendly intermediate nodes with the objective of optimizing the security performance. In …

Physical layer security in nonorthogonal multiple access wireless network with jammer selection

L Hu, X Zheng, C Chen - Security and Communication …, 2019 - Wiley Online Library
… the physical layer security of NOMA with friendly jammers and … For the sake of easy
deployment, all nodes in NOMA … The jammers are assumed to transmit friendly artificial noise. …

Improving physical layer security jointly using full‐duplex jamming receiver and multi‐antenna jammer in wireless networks

R Ma, S Yang, M Du, H Wu, J Ou - IET Communications, 2019 - Wiley Online Library
physical layer security are studied, where one transmitter (Alice), one full‐duplex (FD) legitimate
receiver (Bob) and one multi‐antenna jammer (… ‐antenna cooperative jammer to impair …