2018
DOI: 10.1109/tvt.2017.2744660
|View full text |Cite
|
Sign up to set email alerts
|

Cooperative-Jamming-Aided Secrecy Enhancement in Wireless Networks With Passive Eavesdroppers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
55
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 67 publications
(56 citation statements)
references
References 21 publications
1
55
0
Order By: Relevance
“…The redundancy rate R k − R s can be utilized for anti-eavesdropping. According to [5,13,21], in non-colluding Eves scenario, the maximal eavesdropped information is determined by the maximal SNR among all the Eves, thus C e = log 2 (1 + max m∈M ζ e,m ), and the secrecy outage occurs when C e > R e . Therefore, the secrecy outage probability (SOP) of LU1 can be described as [5] P out (R s , a 1 ) = Pr(R s > C s ) (8) = Pr(C e > R e ).…”
Section: System Modelmentioning
confidence: 99%
See 4 more Smart Citations
“…The redundancy rate R k − R s can be utilized for anti-eavesdropping. According to [5,13,21], in non-colluding Eves scenario, the maximal eavesdropped information is determined by the maximal SNR among all the Eves, thus C e = log 2 (1 + max m∈M ζ e,m ), and the secrecy outage occurs when C e > R e . Therefore, the secrecy outage probability (SOP) of LU1 can be described as [5] P out (R s , a 1 ) = Pr(R s > C s ) (8) = Pr(C e > R e ).…”
Section: System Modelmentioning
confidence: 99%
“…Particularly, notice from (12) that a threshold in terms of a 1 should be provided to meet the desired QoS requirement at LU2. Otherwise, the CJ scheme in [21] is exploited in our considered systems to satisfy secure transmission for LU1.…”
Section: Proposed Solution For Srm Problem Under Certain Sop Constraintmentioning
confidence: 99%
See 3 more Smart Citations