2017
DOI: 10.3390/s17112697
|View full text |Cite
|
Sign up to set email alerts
|

Optimal Pricing and Power Allocation for Collaborative Jamming with Full Channel Knowledge in Wireless Sensor Networks

Abstract: This paper presents a price-searching model in which a source node (Alice) seeks friendly jammers that prevent eavesdroppers (Eves) from snooping legitimate communications by generating interference or noise. Unlike existing models, the distributed jammers also have data to send to their respective destinations and are allowed to access Alice’s channel if it can transmit sufficient jamming power, which is referred to as collaborative jamming in this paper. For the power used to deliver its own signal, the jamm… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 13 publications
0
3
0
Order By: Relevance
“…There are mainly four kinds of methods to defend against eavesdroppers. The first one is to employ friendly jammers to generate interference or noise (see, for example, Iwata et al, 2017;Jeong et al, 2017). In Iwata et al (2017), a cooperative jammer has been employed to aid with estimation errors and a lower bound on the ergodic secrecy capacity has been proposed.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…There are mainly four kinds of methods to defend against eavesdroppers. The first one is to employ friendly jammers to generate interference or noise (see, for example, Iwata et al, 2017;Jeong et al, 2017). In Iwata et al (2017), a cooperative jammer has been employed to aid with estimation errors and a lower bound on the ergodic secrecy capacity has been proposed.…”
Section: Introductionmentioning
confidence: 99%
“…In Iwata et al (2017), a cooperative jammer has been employed to aid with estimation errors and a lower bound on the ergodic secrecy capacity has been proposed. In Jeong et al (2017), a price-searching model has been proposed, and the friendly jammer has also been allowed to send messages to the legitimate users. The second one is to apply artificial noise injection.…”
Section: Introductionmentioning
confidence: 99%
“…In [19], we considered to optimize the EE of wireless powered massive MIMO sensor network based on fractional programming. However, in [8,9,10,11,12,13,19], authors have not considered the resource allocation from the perspective of economics [20,21]. Considering the actual wireless communication scenario, the power beacon (PB) and the energy receiver can belong to different service operators.…”
Section: Introductionmentioning
confidence: 99%