2017
DOI: 10.1109/tvt.2017.2703305
|View full text |Cite
|
Sign up to set email alerts
|

Strategic Antieavesdropping Game for Physical Layer Security in Wireless Cooperative Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
7
2

Relationship

1
8

Authors

Journals

citations
Cited by 46 publications
(17 citation statements)
references
References 29 publications
0
17
0
Order By: Relevance
“…It turns out that the computational complexity of limited computing power increases exponentially with the number of sensor nodes and targets. In [18], SA can achieve high task execution efficiency when dealing with task allocation issue. In [19], authors proposed a GA scheme to improve system performance for better total system efficiency in WSNs.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…It turns out that the computational complexity of limited computing power increases exponentially with the number of sensor nodes and targets. In [18], SA can achieve high task execution efficiency when dealing with task allocation issue. In [19], authors proposed a GA scheme to improve system performance for better total system efficiency in WSNs.…”
Section: Related Workmentioning
confidence: 99%
“…In formula (18), Δτ ef ðt, t + 1Þ indicates the value of pheromones that the ant left on the path ðe, f Þ during the generation ðt, t + 1Þ. ρ is the evaporation coefficient of pheromone to avoid infinite growth of pheromone on the path.…”
Section: Path Selectionmentioning
confidence: 99%
“…The work has been carried out using simulation based approach. Wang et al [27] have addressed the problem of eavesdropping where the solution has been presented using game theory. The work is especially focused on physical layer security where an optimal cost model has been presented for this purpose.…”
Section: Related Workmentioning
confidence: 99%
“…The physical layer security techniques that do not require any computing power have attracted much attention from both academia and industry. In [7][8][9][10], the concept of friendly jammer was proposed to prevent the eavesdropping attacks from intentionally injecting noise in CPTS. In recent years, almost all previous literatures assumed that the jammer is friendly, i.e., the users have the full right to control it.…”
Section: The Remote Controller and Respond With The Sensing Informatimentioning
confidence: 99%