A Li, Y Xu, Y Wang, L Sun - International Journal of …, 2015 - Wiley Online Library
This paper deals with the use of jamming transmission for secure amplify‐and‐forward‐ based relay networks with total power constraints. An approach that the source and the relay …
Y Xiao, Y Shen, Y Zeng, Y Zhang - ICC 2019-2019 IEEE …, 2019 - ieeexplore.ieee.org
With a wide application of wireless hand-held devices in human life, the relationship among human beings may affect some wireless communication systems. Inspired by it, this paper …
J Liu, Z Liu, Y Zeng, J Ma - IEEE Network, 2016 - ieeexplore.ieee.org
Wireless networks are increasingly being employed to transfer highly sensitive information. Due to the broadcast nature of wireless channels, security issues have been taken as a …
Physical layer security is an efficient technique to realize security in wireless network without relying on conventional cryptographic techniques. In cooperative networks with secrecy …
SQ Nguyen, HY Kong - Wireless Personal Communications, 2015 - Springer
A distributed zero-beamforming-based cooperative jamming technique is useless when an eavesdropper detects the sharing seed. Further, currently alternatives are very limited when …
Physical Layer Security Performance Study for Wireless Networks with Cooperative Jamming Page 1 Physical Layer Security Performance Study for Wireless Networks with …
We consider a wireless network scenario in which the communicating nodes are assisted by a number of jammers. The goal of the jammers is to obstruct potential eavesdroppers while …
H Huang, Y Huo, R Li, Q Gao, Y Wu… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Physical layer security has attracted significant attention in the field of wireless communications. The application of artificial noise can reduce the eavesdropping ability of …
Interference is generally considered as the redundant and unwanted occurrence in wireless communication. This work proposes a novel cooperative jamming mechanism for scalable …