2019
DOI: 10.23919/jcc.2019.12.012
|View full text |Cite
|
Sign up to set email alerts
|

Cooperative jamming for physical layer security in hybrid satellite terrestrial relay networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
20
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 25 publications
(20 citation statements)
references
References 4 publications
0
20
0
Order By: Relevance
“…Quantum attacks are broadly classified into three major categories, including ECDLP, DLP, and IFP. Additionally, QIAs in classical cryptosystems, quantum-resistant cryptosystem, satellite, and UAV-based secure communication, Qrepeater crypto network, and quantum-safe infrastructure in fiber and wireless networks are some of the important areas considered in recent studies [40]- [47]. Abellan and Pruneri [48] discussed other dimensions in the quantum cybersecurity area, including quantum random number generator, its importance to applications, and association with encryption and decryption processes.…”
Section: Shaikh Andmentioning
confidence: 99%
See 1 more Smart Citation
“…Quantum attacks are broadly classified into three major categories, including ECDLP, DLP, and IFP. Additionally, QIAs in classical cryptosystems, quantum-resistant cryptosystem, satellite, and UAV-based secure communication, Qrepeater crypto network, and quantum-safe infrastructure in fiber and wireless networks are some of the important areas considered in recent studies [40]- [47]. Abellan and Pruneri [48] discussed other dimensions in the quantum cybersecurity area, including quantum random number generator, its importance to applications, and association with encryption and decryption processes.…”
Section: Shaikh Andmentioning
confidence: 99%
“…In [46], the authors presented a novel DF-based safe 3D mobile UAV transmitting scheme for HSTNs in the vicinity of an aerial eavesdropper operating in a round area around a functioning UAV relay. In [47], the authors looked at reliable communication in a HSTRN, in which an adversary can intercept communications sent from both the satellite and interim relays. We investigate collaborative blocking by the relays to successfully shield the information from eavesdropping in these two stages, in which the jamming frequencies are designed to maximize the detection accuracy underneath the complete power limit of relays.…”
Section: Quantum Resistant Cryptosystemsmentioning
confidence: 99%
“…For HSTRN, the relay is adopted to forward signal due to the unavailability of the direct link between satellites and legitimate users. [7][8][9][10][11][12][13] Some of the relating researches have focused on the secrecy performances of the systems with different parameters. [7][8][9][10] The authors studied the ergodic secrecy rate performance of the hybrid satellite-terrestrial relay system with multiple eavesdroppers under two relay protocols in Reference 7.…”
Section: Introductionmentioning
confidence: 99%
“…To solve this problem, Wyner characterized fading channels to achieve physical layer security based on information-theoretic approach [18]. And yet, research on physical layer secrecy in HSTRN is limited [19][20][21][22][23][24]. In [19], the authors explored the physical layer secrecy analysis of multiuser HSTRN by deriving accurate and asymptotic expressions for secrecy outage probability (SOP) and deducing the expression for probability of nonzero secrecy capacity.…”
Section: Introductionmentioning
confidence: 99%
“…Guo et al [22] presented a joint relay selection and a user scheduling scheme based on jammer to balance the system performance and actual implementation. In order to enhance the secrecy of the system under the total power constraint of relays, Yan et al [23] investigated cooperative jamming by the relays to maximize the secrecy rate. Likewise, Yan et al [24] maximized the secrecy rate of HSTRN through the joint optimization of the relay beamforming vector and the covariance matrix of artificial noise.…”
Section: Introductionmentioning
confidence: 99%