2013
DOI: 10.1109/wcl.2013.052813.130272
|View full text |Cite
|
Sign up to set email alerts
|

Secure Transmission in Downlink Cellular Network with a Cooperative Jammer

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 14 publications
0
5
0
Order By: Relevance
“…2) Security-aware XR Communications: The wireless medium employed in XR data transmission is vulnerable to malicious attacks, necessitating the implementation of robust security protocols. Studies, such as [6], [18][19][20], have specifically addressed internal eavesdropping protection by PLS techniques in cellular networks supporting XR services. In particular, [18] investigated secure transmission strategies in multi-cellular multi-user systems and derived asymptotically achievable secrecy rates.…”
Section: A Backgroundmentioning
confidence: 99%
See 1 more Smart Citation
“…2) Security-aware XR Communications: The wireless medium employed in XR data transmission is vulnerable to malicious attacks, necessitating the implementation of robust security protocols. Studies, such as [6], [18][19][20], have specifically addressed internal eavesdropping protection by PLS techniques in cellular networks supporting XR services. In particular, [18] investigated secure transmission strategies in multi-cellular multi-user systems and derived asymptotically achievable secrecy rates.…”
Section: A Backgroundmentioning
confidence: 99%
“…Moreover, from (20), it is evident that both the resource allocation and the selected relay collectively determine the transmission delay for each XR user. Consequently, in (P1), resource allocation and user association are interdependent, preventing the separation of the optimization problem into distinct subproblems.…”
Section: Problem Formulationmentioning
confidence: 99%
“…By substituting S ⋆1 into the constraints and the objective function of problem (13), it can be verified that S ⋆1 satisfies all the constraints (13a)-(13e) and achieves the same sum secrecy rate as S ⋆1 does. This concludes the proof.…”
Section: ⋆1mentioning
confidence: 99%
“…With secrecy consideration, these spectrum-sharing users may also include some unfriendly ones who intend to overhear the secret message when they are not scheduled. Previous literature mainly focused on the worst scenario, in which all of the unscheduled users were seen as the eavesdroppers [6] or just treated them as the hostiles outside the network [7] such that the statistics were independent of the main channel. However, the secrecy outage probability, which is a useful metric to measure secrecy performance without needing exact CSI knowledge [1], has not been evaluated in the presence of an arbitrary number of eavesdropping users inside the network.…”
mentioning
confidence: 99%