2018
DOI: 10.1049/iet-com.2017.0719
|View full text |Cite
|
Sign up to set email alerts
|

Maximising the degrees of freedom of the physical‐layer secured relay networks with artificial jamming

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 23 publications
0
2
0
Order By: Relevance
“…In [11, 12], the PLS of beamforming‐aided wireless networks has been explored, demonstrating that the secrecy capacity can indeed be improved by using beamforming methods. Additionally, in [13, 14], cooperative jamming schemes are used for improving the security of wireless communications. As an alternative, in [15], an extra user is selected to transmit artificial noise to reduce the secrecy outage probability of the chosen user.…”
Section: Introductionmentioning
confidence: 99%
“…In [11, 12], the PLS of beamforming‐aided wireless networks has been explored, demonstrating that the secrecy capacity can indeed be improved by using beamforming methods. Additionally, in [13, 14], cooperative jamming schemes are used for improving the security of wireless communications. As an alternative, in [15], an extra user is selected to transmit artificial noise to reduce the secrecy outage probability of the chosen user.…”
Section: Introductionmentioning
confidence: 99%
“…For eavesdropper with massive antenna, transmitters randomly rotate the phase of original symbols to interrupt eavesdropper, and the legitimate users are able to take proper inverse operations to recover the received signals [17]. As helper, relay can improve communication security in the presence of eavesdropper, especially when the source-destination channel is worse than the source-eavesdropper channel [18], [19], [23], [27], [52]. Besides that, some typical secure communication T approaches are proposed for special network scenario, such as wireless ad-hoc network, ultra-dense network, social network and cognitive radio system [20]- [23].…”
mentioning
confidence: 99%