Physical-layer security in distributed wireless networks using matching theory

S Bayat, RHY Louie, Z Han… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
We consider the use of physical-layer security in a wireless communication system where
multiple jamming nodes assist multiple source-destination nodes in combating unwanted …

Distributed stable matching algorithm for physical layer security with multiple source-destination pairs and jammer nodes

S Bayat, RHY Louie, Z Han, Y Li… - 2012 IEEE Wireless …, 2012 - ieeexplore.ieee.org
In wireless communications, the physical layer security is an emerging security research
area that explores the possibilities of achieving high secrecy data transmission between …

Physical layer security with uncoordinated helpers implementing cooperative jamming

S Luo, J Li, A Petropulu - 2012 IEEE 7th Sensor Array and …, 2012 - ieeexplore.ieee.org
1 A wireless communication network is considered, consisting of a source, a destination and
an eavesdropper, each equipped with a single antenna. The communication is assisted by …

[PDF][PDF] Physical layer security game: interaction between source, eavesdropper, and friendly jammer

Z Han, N Marina, M Debbah, A Hjørungnes - EURASIP Journal on …, 2010 - Springer
Physical layer security is an emerging security area that achieves perfect secrecy data
transmission between intended network nodes, while malicious nodes that eavesdrop the …

Cooperative jamming for wireless physical layer security

L Dong, Z Han, AP Petropulu… - 2009 IEEE/SP 15th …, 2009 - ieeexplore.ieee.org
Cooperative jamming is an approach that has been recently proposed for improving
physical layer based security for wireless networks in the presence of an eavesdropper …

Secure relay and jammer selection for physical layer security

H Hui, AL Swindlehurst, G Li… - IEEE Signal Processing …, 2015 - ieeexplore.ieee.org
Secure relay and jammer selection for physical-layer security is studied in a wireless
network with multiple intermediate nodes and eavesdroppers, where each intermediate …

Power allocation for cooperative jamming against a strategic eavesdropper over parallel channels

Z Xu, M Baykal-Gürsoy - IEEE Transactions on Information …, 2022 - ieeexplore.ieee.org
This paper considers a friendly interferer allocating jamming power to eavesdropping
channels to increase the level of secrecy of a wireless network. The friendly interferer has …

Secure communications with cooperative jamming: Optimal power allocation and secrecy outage analysis

K Cumanan, GC Alexandropoulos… - IEEE Transactions …, 2017 - ieeexplore.ieee.org
This paper studies the secrecy rate maximization problem of a secure wireless
communication system in the presence of multiple eavesdroppers. The security of the …

Cooperative jammer placement for physical layer security enhancement

J Liu, Z Liu, Y Zeng, J Ma - IEEE Network, 2016 - ieeexplore.ieee.org
Wireless networks are increasingly being employed to transfer highly sensitive information.
Due to the broadcast nature of wireless channels, security issues have been taken as a …

Cooperative jamming for secure transmission with both active and passive eavesdroppers

J Si, Z Cheng, Z Li, J Cheng, HM Wang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Secrecy transmission is investigated for a cooperative jamming scheme, where a multi-
antenna jammer generates artificial noise (AN) to confuse eavesdroppers. Two kinds of …