2017
DOI: 10.1049/iet-com.2016.1168
|View full text |Cite
|
Sign up to set email alerts
|

Joint design of jammer selection and beamforming for securing MIMO cooperative cognitive radio networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
8
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(8 citation statements)
references
References 29 publications
0
8
0
Order By: Relevance
“…To counter eavesdropping, a friendly jammer in the network sent out artificial noise (AN) to specifically interfere with Eve's reception so that the transmitted message could not be decoded. References [26,27] introduced how to choose friendly jammers efficiently. In [28,29], cooperative jamming-aided secure communication for SWIPT networks was studied, where the jammer could help the source to increase the harvested energy by the energy receiver.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…To counter eavesdropping, a friendly jammer in the network sent out artificial noise (AN) to specifically interfere with Eve's reception so that the transmitted message could not be decoded. References [26,27] introduced how to choose friendly jammers efficiently. In [28,29], cooperative jamming-aided secure communication for SWIPT networks was studied, where the jammer could help the source to increase the harvested energy by the energy receiver.…”
Section: Related Workmentioning
confidence: 99%
“…In this paper, both SWIPT and cooperative jamming technics were adopted in the multi-radio WMN to enhance its power consumption and physical layer security performance, respectively. While [20][21][22][23][24] only adopted the SWIPT, [25][26][27] only adopted the cooperative jamming. Although [28][29][30][31] proposed some beamforming method, considering both SWIPT and cooperative jamming, all of them were designed for the cognitive radio system.…”
mentioning
confidence: 99%
“…In recent years, numerous research works have been proposed for investigating the PHY security of CR systems, among which several techniques have been proposed to improve the PHY security of CR systems. The proposed solutions reported in the literature can be mainly classified into different categories, such as (i) beamforming‐based [1517], (ii) radio resource allocation‐based [17, 18], (iii) relay‐assisted transmission [1820], (iv) transmit antenna selection [2124], (v) jamming‐based [11, 16], and (vi) game theoretic‐based [25] techniques and algorithms. For instance, the authors in [17] have investigated the PHY security of joint beamforming and power allocation scheme in a CR network.…”
Section: Introductionmentioning
confidence: 99%
“…For instance, the authors in [17] have investigated the PHY security of joint beamforming and power allocation scheme in a CR network. A scheme for joint jammer selection and beamforming has been proposed in [16] for securing a multiple‐input multiple‐output (MIMO) cooperative CR network. The combination of radio resource allocation and relay selection has been proposed as another approach to improve the PHY security of CR networks [18].…”
Section: Introductionmentioning
confidence: 99%
“…Hence, according to the demand of users, a user can dynamically adopt a kind of wireless mode. Meanwhile, an eavesdropper [2] can be deployed to wiretap the wireless communications relying on either a WiFi network or a LTE network by the hostile rivals deliberately. In general, if a WiFi network and a LTE network coexist, a user may access to the WiFi network in order to reduce the costs, which may result in degrading the security of wireless communications.…”
Section: Introductionmentioning
confidence: 99%