Telecommunications Science ›› 2013, Vol. 29 ›› Issue (1): 109-114.doi: 10.3969/j.issn.1000-0801.2013.01.017
• Overview • Previous Articles Next Articles
Hang Long,Jing Wang,Yueying Zhang,Wenbo Wang
Online:
2013-01-20
Published:
2017-07-04
Hang Long,Jing Wang,Yueying Zhang,Wenbo Wang. Cooperative Jamming Technique: Proposal, Survey and Future[J]. Telecommunications Science, 2013, 29(1): 109-114.
1 | 龙航, 袁广翔, 王静 等. 物理层安全技术:研究现状与展望. 电信科学 , 2011,27(9): 60~65 |
2 | 吴越, 易平, 李建华 . 无线通信中物理层安全问题及其解决方案. 中国通信 , 2011(5): 11~19 |
3 | 杨斌, . 无线通信物理层安全技术研究. 信息网络安全 , 2012(6): 76~79 |
4 | Negi R , Goel S . Secret communications using artificial noise. Proceedings of IEEE VTC Fall, Dallas,TX,USA, 2005: 1906~1910 |
5 | Goel S , Negi R . Guaranteeing secrecy using artificial noise. IEEE Transactions on Wireless Communications, 2008,7(6): 2180~2189 |
6 | Tekin E , Yener A . Achievable rates for the general Gaussian multiple access wire-tap channel with collective secrecy. Proceedings of Allerton Conference on Communication, Control, and Computing(ACCCC), Monticello, IL, USA, 2006 |
7 | Dong L , Han Z , Petropulu A P , et al. Cooperative jamming for wireless physical layer security. roceedings of IEEE Workshop on Statistical Signal Processing, Cardiff, UK, 2009: 417~420 |
8 | Krikidis I , Thompson J , Mclaughlin S . Relay selection for secure cooperative networks with jamming. IEEE Transactions on Wireless Communications, 2009,8(10): 5003~5011 |
9 | Dong L , Han Z , Petropulu A P , et al. Improving wireless physical layer security via cooperating relays. IEEE Transactions on Signal Processing, 2010,58(3): 1875~1888 |
10 | Jorgensen M L , Yanakiev B R , Kirkelund G E , et al. Shout to secure: physical-layer wireless security with known interference. Proceedings of IEEE Global Telecommunication Conference, Washington DC, USA, 2007: 33~38 |
11 | He X , Yener A . Two-hop secure communication using an untrusted relay: a case for cooperative jamming. Proceedings of IEEE GLOBECOM, New Orleans, LA, USA, 2008: 1~5 |
12 | Ding Z , Leung K K , Goeckel D L , et al. Opportunistic relaying for secrecy communications: cooperative jamming vs relay chatting. IEEE Transactions on Wireless Communications, 2011,10(6): 1725~1729 |
13 | Huang J , Swindlehurst K K , Goeckel A L . Secure communications via cooperative jamming in two-hop relay systems. Proceedings of IEEE GLOBECOM, Miami, Florida, USA, 2010: 1~5 |
14 | Han Z , Marina N , Debbah M , et al. Physical layer security game: interaction between source, eavesdropper and friendly jammer. Proceedings of IEEE GLOBECOM, 2009(11) |
15 | Han Z , Marina N , Debbah M , et al. Physical layer security game: how to date a girl with her boyfriend on the same table. Proceedings of International Conference on Game Theory for Networks, Istanbul, Turkey, 2009: 287~294 |
16 | Zhang R , Song L , Han Z , et al. Distributed coalition formation of relay and friendly jamme rs for secure cooperative networks. Proceedings of IEEE ICC, Kyoto, Japan, 2011: 1~6 |
17 | Tekin E , Yener A . The general Gaussian multiple access and two-way wire-tap channels: achievable rates and cooperative jamming. IEEE Transactions on Information Theory, 2008,54(6): 2735~2751 |
18 | Lai L , El Gamal H . The relay-eavesdropper channel: cooperation for secrecy. IEEE Transactions on Information Theory, 2008,54(9): 4005~4019 |
19 | Tang X , Liu R , Spasojevic P , et al. Interference-assisted secret communication. IEEE Transactions on Information Theory, 2011,57(5): 3153~3167 |
20 | Pierrot A J , Bloch M R , Spasojevic P . Strongly secure communications over the two-way wiretap channel. IEEE Transactions on Information Forensics and Security, 2011,6(3): 595~605 |
21 | Simeone O , Popovski M R , Spasojevic P . Secure communications via cooperating base stations. IEEE Communications Letters, 2008,12(3): 188~190 |
22 | Popovski P , Simeone O . Wireless secrecy in cellular systems with infrastructure-aided cooperation. IEEE Transactions on Information Forensics and Security, 2009,4(2): 242~256 |
23 | Stanojev I , Yener A . Recruiting multi-antenna transmitters as cooperative jammers: an auction-theoretic approach. Proceedings of Annual Allerton Conference on Communication, Control, and Computing, Monticello, IL, USA, 2011: 1106~1112 |
24 | Stanojev I , Yener A . Cooperative jamming via spectrum leasing. Proceedings of International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks(WiOpt), New Jersey, USA, 2011: 265~272 |
25 | Sheikholeslami A , Goeckel D , Pishro-Nik H , et al. Physical layer security from inter-session interference in large wireless networks. Proceedings of IEEE INFOCOM, Orlando, FL, USA, 2012: 1179~1187 |
26 | Zhou X , McKay M R . Physical layer security with artificial noise: secrecy capacity and optimal power allocation. roceedings of International Conference on Signal Processing and Communication Systems(ICSPCS), Omaha, NE, USA, 2009: 1~5 |
27 | Khisti A , Wornell G , Wiesel A , et al. On the Gaussian MIMO wiretap channel. Proceedings of IEEE International Symposium on Information Theory, Nice, France, 2007: 2471~2475 |
28 | Li Z , Trappe W , Yates R . Secret communication via multi-antenna transmission. Proceedings of Annual Conference on Information Sciences and Systems(CISS), Baltimore, MD, USA, 2007: 905~910 |
29 | Swindlehurst A L . Fixed SINR solutions for the MIMO wiretap channel. Proceedings of IEEE Int Conf on Acoustic, Speech and Signal Processing ICASSP, Taipei, Taiwan, 2009: 2437~2440 |
30 | Krikidis I , Thompson J S , Grant P M , et al. Power allocation for cooperative-based jamming in wireless networks with secrecy constraints. Proceedings of IEEE GLOBECOM Workshops, Miami, Florida, USA, 2010: 1177~1181 |
31 | Gabry F , Thobaben R , Skoglund M . Outage performance and power allocation for decode-and-forward relaying and cooperative jamming for the wiretap channel. Proceedings of IEEE ICC Workshops, Kyoto, Japan, 2011: 1~5 |
32 | Dehghan M , Goeckel D , Ghaderi M , et al. Energy efficiency of cooperative jamming strategies in secure wireless networks. IEEE Transactions on Wireless Communications, 2012,11(9): 3025~3029 |
33 | Zheng G , Choo L C , Wong K K . Optimal cooperative jamming to enhance physical layer security using relays. IEEE Transactions on Signal Processing, 2011,59(3): 1317~1322 |
34 | Fakoorian S A A , Swindlehurst A L . Secrecy capacity of MISO Gaussian wiretap channel with a cooperative jammer. Proceedings of IEEE International Workshop on Signal Processing Advances in Wireless Communications(SPAWC), San Francisco, CA, USA, 2011: 416~420 |
35 | Fakoorian S A A , Swindlehurst A L . Solutions for the MIMO Gaussian wiretap channel with a cooperative jammer. IEEE Transactions on Signal Processing, 2011,59(10): 5013~5022 |
36 | Sun L , Zhang T , Li Y , et al. Performance study of two-hop amplify-and-forward systems with untrustworthy relay nodes. IEEE Transactions on Vehicular Technology, 2012,61(8): 3801~3807 |
37 | Huang J , Swindlehurst A L . Cooperation strategies for secrecy in MIMO relay networks with unknown eavesdropper CSI. Proceedings of IEEE International Conference on Acoustics,Speech and Signal Processing(ICASSP), Wuhan,China, 2011: 3424~3427 |
38 | Huang J , Swindlehurst A L . Cooperative jamming for secure communications in MIMO relay networks. IEEE Transactions on Signal Processing, 2011,59(10): 4871~4884 |
39 | Liu Y , Petropulu A P , Poor H V . Joint decode-and-forward and jamming for wireless physical layer security with destination assistance. Proceedings of Asilomar Conference on Signals, Systems and Computers(ASILOMAR), Pacific Grove, CA, USA, 2011: 109~113 |
40 | Chen J , Zhang R , Song L , et al. oint relay and jammer selection for secure two-way relay networks. IEEE Transactions on Information Forensics and Security, 2012,7(1): 310~320 |
41 | Goeckel D , Vasudevan S , Towsley D , et al. Artificial noise generation from cooperative relays for everlasting secrecy in two-hop wireless networks. IEEE Journal on Selected Areas in Communications, 2011,29(10): 2067~2076 |
42 | Ding Z , Xu M , Lu J , et al. Improving wireless security for bidirectional communication scenarios. IEEE Transactions on Vehicular Technology, 2012,61(6): 2842~2848 |
43 | Guan X , Cai Y , Wang Y , et al. Increasing secrecy capacity via joint design of cooperative beam forming and jamming. roceedings ofIEEE InternationalSymposiumonPersonal Indoor and Mobile Radio Communications(PIMRC), Toronto,ON,Canada, 2011: 1274~1278 |
[1] | Jiawei HU, Xiaoqian LIU, Xinke TANG, Yuhan DONG. Trajectory planning of UUV-assisted UWOC systems based on DQN [J]. Telecommunications Science, 2023, 39(5): 42-47. |
[2] | Qingfeng DING, Song WANG. Distributed IOS-SM transmission scheme with joint antenna and IOS unit selection for high-speed railway scenario [J]. Telecommunications Science, 2023, 39(4): 31-42. |
[3] | Yueyu JIANG, Haoxin CHENG, Kang WANG, Wenjun DAI, Xiaoyu LIU. Design method of energy efficiency optimization in PLC-RF wireless transmission networks [J]. Telecommunications Science, 2023, 39(4): 111-119. |
[4] | Jingjie SHEN, Guangqiu LI, Yancui LUO, Huizhi LIU. Physical layer security of full-duplex relay-assisted D2D networks under outdated CSI [J]. Telecommunications Science, 2023, 39(3): 89-99. |
[5] | Mingrui XU, Yucai YAO, Xiaorong ZHU. A Fisco-Bcos platform based accurate performance analysis model of blockchain system [J]. Telecommunications Science, 2023, 39(1): 79-91. |
[6] | Yifan DING, Guangqiu LI, Hui LI. Physical layer security of NOMA-D2D cooperative wireless system [J]. Telecommunications Science, 2022, 38(9): 83-94. |
[7] | Yifan DING, Guangqiu LI, Hui LI. Physical layer security for SWIPT-NOMA system in presence of randomly located eavesdroppers [J]. Telecommunications Science, 2022, 38(3): 133-142. |
[8] | Yasheng DAI, Bolin MA, Guangxue YUE. Estimation of wireless channel fading model in maritime communication for complex meteorological environment [J]. Telecommunications Science, 2022, 38(3): 158-171. |
[9] | Panpan LI, Zhengxia XIE, Guangxue YUE, Xin LIU. Research progress and trends of deep learning based wireless communication receiving method [J]. Telecommunications Science, 2022, 38(2): 1-17. |
[10] | Jianfeng CHEN, Miao CUI, Guangchi ZHANG, Qingqing WU, Hui ZENG. Secure communication optimization for double-IRS assisted SWIPT system [J]. Telecommunications Science, 2022, 38(1): 47-60. |
[11] | Ying CHENG, Guangqiu LI, Jingjie SHEN, Liang WEI. Physical layer security performance of MF relay selection systems [J]. Telecommunications Science, 2021, 37(9): 95-104. |
[12] | Sai XU, Shuai HAN, Weixiao MENG. A secure transmission method based on cooperative jamming for correlated main and wiretap channels [J]. Telecommunications Science, 2021, 37(6): 105-114. |
[13] | Nannan LI, Yu HAN, Ning GAO, Shi JIN. Joint amplitude and phase partition based physical layer key generation method [J]. Telecommunications Science, 2021, 37(5): 100-112. |
[14] | Fuchao YAN,Yiliang LIU,Shuai HAN,Weixiao MENG. A survey of physical layer security in space-air-ground communication and networks [J]. Telecommunications Science, 2020, 36(9): 1-13. |
[15] | Hui QIAN,Guangqiu LI,Yifan DING. Physical layer security performance of SWIPT system in the presence of randomly located eavesdroppers [J]. Telecommunications Science, 2020, 36(5): 65-72. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|