2019
DOI: 10.1109/tvt.2019.2895639
|View full text |Cite
|
Sign up to set email alerts
|

A Scheme for Trustworthy Friendly Jammer Selection in Cooperative Cognitive Radio Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
19
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 38 publications
(19 citation statements)
references
References 37 publications
0
19
0
Order By: Relevance
“…Wang et al [34] evaluated the trust degree of potential jammers and designed an algorithm to select a jammer and allocate transmission power to achieve secrecy-oriented D2D cooperation. Similarly, Wen et al [35] investigated the influence of node reputation on the secrecy performance and proposed a scheme for trustworthy-friendly jammer selection in perfect and statistical CSI scenarios. Wang et al [36] formulated a double-gamma-ratio approach to describe social trust degree and obtained closed forms of connection outage probability and secrecy outage probability.…”
Section: Related Workmentioning
confidence: 99%
“…Wang et al [34] evaluated the trust degree of potential jammers and designed an algorithm to select a jammer and allocate transmission power to achieve secrecy-oriented D2D cooperation. Similarly, Wen et al [35] investigated the influence of node reputation on the secrecy performance and proposed a scheme for trustworthy-friendly jammer selection in perfect and statistical CSI scenarios. Wang et al [36] formulated a double-gamma-ratio approach to describe social trust degree and obtained closed forms of connection outage probability and secrecy outage probability.…”
Section: Related Workmentioning
confidence: 99%
“…Extensive efforts have been devoted to study the security issues of CR networks from a physical layer perspective [13]- [17]. For example, [13] and [14] aim to maximize the achievable ergodic secrecy rate of the secondary transmission.…”
Section: B Related Work 1) Terrestrial Networkmentioning
confidence: 99%
“…To counter eavesdropping, a friendly jammer in the network sent out artificial noise (AN) to specifically interfere with Eve's reception so that the transmitted message could not be decoded. References [26,27] introduced how to choose friendly jammers efficiently. In [28,29], cooperative jamming-aided secure communication for SWIPT networks was studied, where the jammer could help the source to increase the harvested energy by the energy receiver.…”
Section: Related Workmentioning
confidence: 99%
“…In this paper, both SWIPT and cooperative jamming technics were adopted in the multi-radio WMN to enhance its power consumption and physical layer security performance, respectively. While [20][21][22][23][24] only adopted the SWIPT, [25][26][27] only adopted the cooperative jamming. Although [28][29][30][31] proposed some beamforming method, considering both SWIPT and cooperative jamming, all of them were designed for the cognitive radio system.…”
mentioning
confidence: 99%