2017
DOI: 10.1109/access.2017.2768568
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Cooperative Jamming Scheme for Wireless Social Networks Without Known CSI

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
6
4

Relationship

2
8

Authors

Journals

citations
Cited by 22 publications
(8 citation statements)
references
References 29 publications
0
8
0
Order By: Relevance
“…Also, the conventional distributed algorithm (CDA) and the pragmatic distributed algorithm (PDA) are modified for maximizing the secrecy sum rate for the primary user. [220] --Proposed a social-aware cooperative jamming strategy along with optimal power allocation scheme. [221] --Proposed two models namely, single-channel multijammer (SCMJ) model and the multichannel single-jammer (MCSJ) model.…”
Section: G Unique Challenges Of Secure Cooperative Jammingmentioning
confidence: 99%
“…Also, the conventional distributed algorithm (CDA) and the pragmatic distributed algorithm (PDA) are modified for maximizing the secrecy sum rate for the primary user. [220] --Proposed a social-aware cooperative jamming strategy along with optimal power allocation scheme. [221] --Proposed two models namely, single-channel multijammer (SCMJ) model and the multichannel single-jammer (MCSJ) model.…”
Section: G Unique Challenges Of Secure Cooperative Jammingmentioning
confidence: 99%
“…A person can use these social applications at any time to contact with friends and send messages regardless of age, gender, and even socioeconomic status [19][20][21]. These messages should contain sensitive and private information, e.g., location [22], channel state information [23], routing information [24], social relationships [25], browsing data of Internet [26], health data [27], and financial transactions [28]. Obviously, the person should be worried about disclosures of personal information, which may be harmful to him either in virtual or real world [13,29,30].…”
Section: Related Workmentioning
confidence: 99%
“…Huo et al 20 designed three different CJ schemes for different user requirements, with the cooperation of macro-and microcells. In scenarios where eavesdroppers' channel state information (CSI) cannot be obtained, in some previous studies [22][23][24] different physical layer security transmission schemes were designed, via secrecy encoding together with artificial-noise-aided signaling, pace power synthesis, and power allocation, respectively.…”
Section: Introductionmentioning
confidence: 99%