A survey on cooperative jamming applied to physical layer security

M Atallah, G Kaddoum, L Kong - 2015 IEEE International …, 2015 - ieeexplore.ieee.org
Security has always played a critical role in wireless cooperative communication systems
design. Eavesdropping and jamming are two common threats to the information security in …

Secrecy transmit beamforming for heterogeneous networks

T Lv, H Gao, S Yang - IEEE Journal on Selected Areas in …, 2015 - ieeexplore.ieee.org
In this paper, we pioneer the study of physical-layer security in heterogeneous networks
(HetNets). We investigate secure communications in a two-tier downlink HetNet, which …

SmokeGrenade: An efficient key generation protocol with artificial interference

D Chen, Z Qin, X Mao, P Yang, Z Qin… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
Leveraging a wireless multipath channel as the source of common randomness, many key
generation methods have been proposed according to the information-theory security …

Secure transmission over multiple access wiretap channel by cross-time interference injection

H He, S Lyu, B Feng - IEEE Transactions on Communications, 2022 - ieeexplore.ieee.org
Due to the openness of wireless communication, information transmitted in the multiple
access channel is vulnerable to eavesdropping by illegitimate users. Classic artificial noise …

Cooperative jamming and power allocation with untrusty two‐way relay nodes

H Long, W Xiang, J Wang, Y Zhang… - Iet …, 2014 - Wiley Online Library
This study investigates the security of the two‐way relaying system with untrusty relay nodes.
Cooperative jamming schemes are considered for bi‐directional secrecy communications …

Gaining insight on friendly jamming in a real-world IEEE 802.11 network

DS Berger, F Gringoli, N Facchi, I Martinovic… - Proceedings of the …, 2014 - dl.acm.org
Frequency jamming is the fiercest attack tool to disrupt wireless communication and its
malicious aspects have received much attention in the literature. Yet, several recent works …

Secret communication in large wireless networks without eavesdropper location information

Ç Çapar, D Goeckel, B Liu… - 2012 Proceedings IEEE …, 2012 - ieeexplore.ieee.org
We present achievable scaling results on the per-node secure throughput that can be
realized in a large random wireless network of n legitimate nodes in the presence of m …

Minimum energy routing and jamming to thwart wireless network eavesdroppers

M Ghaderi, D Goeckel, A Orda… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
There is a rich recent literature on information-theoretically secure communication at the
physical layer of wireless networks, where secret communication between a single …

On secure wireless communications for service oriented computing

Y Zhang, Y Shen, H Wang, Y Zhang… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Service Oriented Computing (SOC) has initially developed for the Internet, but also identified
as an appealing computing paradigm for developing applications in distributed wireless …

Transmission protocol for secure big data in two-hop wireless networks with cooperative jamming

Y Shen, Y Zhang - Information Sciences, 2014 - Elsevier
Wireless communications nowadays are increasingly becoming irreplaceable networking
technologies for military, governmental and financial communications where the data is …