2018
DOI: 10.1109/jiot.2017.2778185
|View full text |Cite
|
Sign up to set email alerts
|

Cooperative Jamming for Physical Layer Security Enhancement in Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

2
122
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 206 publications
(124 citation statements)
references
References 35 publications
2
122
0
Order By: Relevance
“…Security vulnerabilities of BCoT can be remedied via either the security enhancement of IoT systems or loophole repairing of blockchain. For example, cooperative jamming scheme [112] was explored to improve the security of IoT systems while no extra hardware is required for existing IoT nodes. Meanwhile, [113] exploits key generations based on reciprocity and randomness of wireless channels in Long Range (LoRa) IoT network.…”
Section: B Security Vulnerabilitymentioning
confidence: 99%
“…Security vulnerabilities of BCoT can be remedied via either the security enhancement of IoT systems or loophole repairing of blockchain. For example, cooperative jamming scheme [112] was explored to improve the security of IoT systems while no extra hardware is required for existing IoT nodes. Meanwhile, [113] exploits key generations based on reciprocity and randomness of wireless channels in Long Range (LoRa) IoT network.…”
Section: B Security Vulnerabilitymentioning
confidence: 99%
“…where x = e µ (n) 1 (µ 1 −µ (n) 1 +1) is the FOTE of e µ1 around the point µ (n) 1 . According to the ER method, (34) is transformed into the following convex form…”
Section: A Multi-antennas Configurationmentioning
confidence: 99%
“…In the past, conventional encryption techniques have been applied to prevent eavesdroppers from recovering the secret messages [8], [9]. However, such encryption-based techniques have inherent difficulties and vulnerabilities dealing with secret key management [1]. Fortunately, physical layer security (PLS) has shown a great deal of potential to more accurately distinguish the signals belonging to the legitimate receiver or the eavesdropper [10]- [12].…”
Section: Introductionmentioning
confidence: 99%
“…Besides privacy concerns, jamming and eavesdropping -the two main attacks at the physical layer [13], [14] -are still an issue for IoT systems. This work mainly focuses on securityaware edge computing under jamming attacks that will block the communication link between IoT devices and edge servers; see [15] for schemes dealing with eavesdropping.…”
Section: Introductionmentioning
confidence: 99%