2020
DOI: 10.1049/iet-com.2019.1042
|View full text |Cite
|
Sign up to set email alerts
|

Joint relay and jammer selection for secure cooperative networks with a full‐duplex active eavesdropper

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
6
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 39 publications
(74 reference statements)
0
6
0
Order By: Relevance
“…In Guo et al, 19 multiple energy harvesting intermediate nodes were considered to assist the secure communication of a source‐destination pair, where a best intermediate node was selected as a relay and all the remaining intermediate nodes were selected as jammers and the sum secrecy rate was maximized by optimizing the energy harvesting parameters and the beamformers. Note that the previous works 16–19 only considered to select a relay or a jammer to improve the physical layer security. The works considered to select multiple relays and multiple jammers to improve the physical layer security include 20,21 .…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In Guo et al, 19 multiple energy harvesting intermediate nodes were considered to assist the secure communication of a source‐destination pair, where a best intermediate node was selected as a relay and all the remaining intermediate nodes were selected as jammers and the sum secrecy rate was maximized by optimizing the energy harvesting parameters and the beamformers. Note that the previous works 16–19 only considered to select a relay or a jammer to improve the physical layer security. The works considered to select multiple relays and multiple jammers to improve the physical layer security include 20,21 .…”
Section: Introductionmentioning
confidence: 99%
“…In Vo et al, 17 an energy harvesting wireless sensor network with one sensor source, one destination, and multiple relays in the presence of multiple eavesdroppers was considered, where one of the relays was proposed to act as a jammer, and the closed‐form expression for the secrecy outage probability was obtained. In Zhou et al, 18 two joint relay and jammer selection schemes were proposed for a cooperative network with multiple intermediate nodes, and the closed‐form expressions for the secrecy outage probability were derived and minimized by optimizing the power allocation. In Guo et al, 19 multiple energy harvesting intermediate nodes were considered to assist the secure communication of a source‐destination pair, where a best intermediate node was selected as a relay and all the remaining intermediate nodes were selected as jammers and the sum secrecy rate was maximized by optimizing the energy harvesting parameters and the beamformers.…”
Section: Introductionmentioning
confidence: 99%
“…Jammer and user selection schemes were presented in [28], and the secrecy outage probability expressions were obtained to evaluate the secrecy performance. In [29], Zhou et al introduced joint jammer and relay selection schemes in wireless relay network to improve the wireless security.…”
Section: B Related Workmentioning
confidence: 99%
“…In [4], an optimal detector for Willie under AWGN and block fading channels is proposed in single-hop system, [4] also reveals that covert communication can be achieved by varying the transmit power at Alice. Moreover, the randomness of fading channel and nodes like Jammer and Relay can be also treated as interference for Willie's detection [5][6][7]. However, the scenario considered in [6][7][8] is that Willie can only detect the forward link (Phase 2), whereas ignoring the link between Alice and Relay (Phase 1).…”
mentioning
confidence: 99%
“…Moreover, the randomness of fading channel and nodes like Jammer and Relay can be also treated as interference for Willie's detection [5][6][7]. However, the scenario considered in [6][7][8] is that Willie can only detect the forward link (Phase 2), whereas ignoring the link between Alice and Relay (Phase 1). This is not practical for implementation.…”
mentioning
confidence: 99%