2015
DOI: 10.1109/tifs.2014.2374356
|View full text |Cite
|
Sign up to set email alerts
|

Secrecy Transmission With a Helper: To Relay or to Jam

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
56
0
1

Year Published

2016
2016
2019
2019

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 95 publications
(57 citation statements)
references
References 38 publications
0
56
0
1
Order By: Relevance
“…5,10,11,[16][17][18] Furthermore, we assume all communication links have complex normal distribution. Accordingly, the channels from D1-to-D2, D1-to-relay, relay-to-D2, and jammer-to-relay are respectively denoted by h 12 12 , 1r , r2 , and jr represent the channel gains between the D2D pair, D1 and relay, the relay and D2, and the jammer and relay, respectively. We model all the channel gains as ij = d −n ij , where d ij is the distance between transmitter i and receiver j, and n is the distance-dependent path loss component.…”
Section: With Jammer Scenario (Wj)mentioning
confidence: 99%
See 3 more Smart Citations
“…5,10,11,[16][17][18] Furthermore, we assume all communication links have complex normal distribution. Accordingly, the channels from D1-to-D2, D1-to-relay, relay-to-D2, and jammer-to-relay are respectively denoted by h 12 12 , 1r , r2 , and jr represent the channel gains between the D2D pair, D1 and relay, the relay and D2, and the jammer and relay, respectively. We model all the channel gains as ij = d −n ij , where d ij is the distance between transmitter i and receiver j, and n is the distance-dependent path loss component.…”
Section: With Jammer Scenario (Wj)mentioning
confidence: 99%
“…In this figure, the untrusted relay scenario in this paper is compared with the trusted relay mentioned in other works. [4][5][6][7][8][9][10][11][12][13] It is assumed that in the second phase, OPA has been done for ξ = ξ * . Simulation results show that ESR in T1 for OPA mode is totally consistent with trusted relay mode since in this mode, the relay plays no role in providing a D2D connection and acts only as an eavesdropper.…”
Section: Figurementioning
confidence: 99%
See 2 more Smart Citations
“…As a natural extension, node cooperation by producing AN with the help of friendly jamming nodes, known as cooperative jamming has emerged as a promising technique enabling single-antenna nodes to reap the advantages of multi-antenna and enhance PHY security. [6][7][8][9] Such noise creates interference at the eavesdropper but can be viewed as a priori interference to the destination and does not affect the destination's channel, thus inherently enables secure transmission. In Dong et al, 10 a jamming strategy, where a priori jamming signal for legitimate receivers was used to interfere the eavesdropper, was proposed to enhance the secrecy for a 4-node 2-hop 1-way relay network.…”
Section: Introductionmentioning
confidence: 99%