2020 IEEE International Conference on Communications Workshops (ICC Workshops) 2020
DOI: 10.1109/iccworkshops49005.2020.9145312
|View full text |Cite
|
Sign up to set email alerts
|

Physical Layer Security of Vehicular Networks: A Stochastic Geometry Approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 11 publications
0
2
0
Order By: Relevance
“…Ai et al [31] analyzed the average secrecy capacity for V2V communications under a double Rayleigh fading channels and considered the impacts of fading, path loss, and eavesdropper location. Wang et al [32] established an analysis framework to explore the optimal secrecy throughput of a V2V network based on a maximum SIN association scheme. Wang et al further investigated the potential of AN techniques in safeguarding security for C-V2X networks in [33].…”
Section: A Previous Workmentioning
confidence: 99%
“…Ai et al [31] analyzed the average secrecy capacity for V2V communications under a double Rayleigh fading channels and considered the impacts of fading, path loss, and eavesdropper location. Wang et al [32] established an analysis framework to explore the optimal secrecy throughput of a V2V network based on a maximum SIN association scheme. Wang et al further investigated the potential of AN techniques in safeguarding security for C-V2X networks in [33].…”
Section: A Previous Workmentioning
confidence: 99%
“…However, AN may be rather harmful to other nearby legitimate nodes in wireless networks because jamming signals raise interference. In this regard, through applying stochastic geometry theory, network-wide secrecy performances have been analytically quantified in various scenarios, e.g., the millimeter wave ad hoc network [ 38 ], three dimensional IoT networks [ 39 ], covert communication in D2D networks [ 40 ], vehicular networks [ 41 ], and uncoordinated random jamming in wireless sensor networks [ 42 ]. Further, several studies investigated the effect of an FD jamming approach, where FD nodes receive informative data from their transmitter while simultaneously sending AN for confounding Eves [ 19 , 20 ], in terms of strengthening network-wide secrecy performances in wireless distributed networks [ 21 , 22 ], under stochastic geometry frameworks.…”
Section: Introductionmentioning
confidence: 99%