2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC) 2016
DOI: 10.1109/pimrc.2016.7794718
|View full text |Cite
|
Sign up to set email alerts
|

Physical layer security with hostile jammers and eavesdroppers: Secrecy transmission capacity

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 13 publications
0
6
0
Order By: Relevance
“…For simplicity, we assume that the EV attacks one UE noting that the corresponding analysis can be extended to the case of attacking multiple UEs. In contrast to some of the existing works that introduce pilot spoofing and jamming by two separate nodes [21], we assume a single FD EV performing concurrent pilot spoofing and jammingchannel estimation which introduces a new challenge in analyzing correlated spoofing and jamming self-interferences.…”
Section: System Modelmentioning
confidence: 99%
“…For simplicity, we assume that the EV attacks one UE noting that the corresponding analysis can be extended to the case of attacking multiple UEs. In contrast to some of the existing works that introduce pilot spoofing and jamming by two separate nodes [21], we assume a single FD EV performing concurrent pilot spoofing and jammingchannel estimation which introduces a new challenge in analyzing correlated spoofing and jamming self-interferences.…”
Section: System Modelmentioning
confidence: 99%
“…where a −i represents the configuration of all other players except player i, and P n safe (I n ) is the secrecy probability of MUE on subchannel n, the expression of which is given in (9). We can see from the definition that the utility of a player i means the incremental marginal contribution it makes based on its priority.…”
Section: State Transition Function P(a X)mentioning
confidence: 99%
“…There are mainly two branches in the research of PLS, one of which is performance analyzing. The derivation of secrecy outage probability, connection outage probability or the secrecy probability have been progressed from point to point scenes (Alice and Bob with an eavesdropper) under different channel conditions to multi-node deployments like ad hoc [9] and relay [10] networks. The secrecy performance analysis of a heterogeneous network under certain access or jammer selection strategies have started to appear lately [11], [12], in which stochastic geometry plays a vital role in modeling the randomness and heterogeneity of the network.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In the papers [5]- [8] the degrading security concerns in military operations based on wireless communication, jamming based physical layer security prospects and particular environmental reliability challenges incorporated in sensor networks are reported respectively. The paper presented in [8] documents an innovative anti-deception jamming method for radar sensor networks whereas in [9] a detailed perspective analysis of the secrecy transmission capacity of hostile jammers is articulated. The paper presented in [10] describes a novel outage-based characterization approach for joint relay and jammer selection scheme in case of channel state information feedback delays.…”
Section: Introductionmentioning
confidence: 99%