2014
DOI: 10.1002/dac.2738
|View full text |Cite
|
Sign up to set email alerts
|

Amplify‐and‐forward‐based cooperative jamming strategy with power allocation for secure communication

Abstract: SummaryThis paper deals with the use of jamming transmission for secure amplify‐and‐forward‐based relay networks with total power constraints. An approach that the source and the relay use some of their available power to transmit jamming signals in order to create interference at the eavesdropper is investigated. Assume that the relay and destination have an a priori knowledge of the jamming signals. A power allocation policy that defines how the available power is distributed between the message signal and t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
6
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 13 publications
0
6
0
Order By: Relevance
“…Recently, several literatures have studied the impact of nodes cooperation on the secrecy rate. This strategy is known as cooperative jamming (CJ), involves the transmission by adding jamming to degrade the received SNR at the eavesdropper [9][10][11][12][13][14][15][16][17][18][19][20]. CJ can be performed at the relay side, the destination side or two of the nodes, i.e.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Recently, several literatures have studied the impact of nodes cooperation on the secrecy rate. This strategy is known as cooperative jamming (CJ), involves the transmission by adding jamming to degrade the received SNR at the eavesdropper [9][10][11][12][13][14][15][16][17][18][19][20]. CJ can be performed at the relay side, the destination side or two of the nodes, i.e.…”
Section: Introductionmentioning
confidence: 99%
“…source and destination or source and relay. When CJ is operated at the relay side, the relay acts as a helper by disrupting the eavesdropper [9][10][11][12][13]. In [10], the authors proposed to select one relay as an actual relay to deliver the desired message to the destination and another relay as a helper to degrade the eavesdropper's link.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In recent year, several studies have considered the application of PLS techniques to improve the secrecy rate in cooperative wireless systems. The main strategy for accomplishing this is often known as cooperative signalling (CS) where several nodes cooperate with each other to degrade the received SNR at the eavesdropper [7–18]. As suggested in the literature, the source node, the relay node, the destination node or a combination of them can participate in CS to improve the secrecy performance of the system.…”
Section: Introductionmentioning
confidence: 99%
“…17 The optimal resource allocation problem to boost the secrecy rate is analyzed for a jamming aided amplify-and-forward (AF) cooperative relay system under eavesdropping conditions. 18 Chu 19 examined SOP and intercept probability of AF relay-based cooperative network under multi eavesdropper scenario. The secrecy performance of MISO and SISO NOMA networks with various transmit antenna selection (TAS) strategies is examined, and the closed-form expression for SOP has been derived and compared with traditional space time transmission (STT) scheme in Lei et al 20 Next, a max-min TAS approach for MIMO-NOMA network in the existence of malicious eavesdroppers has been proposed to increase the secrecy performance.…”
Section: Introductionmentioning
confidence: 99%