4.7 Article

Secure Transmission in Multiple Access Wiretap Channel: Cooperative Jamming Without Sharing CSI

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

Can a multi-hop link relying on untrusted amplify-and-forward relays render security?

Milad Tatar Mamaghani et al.

Summary: This paper proposes a new secure transmission scheme to achieve data confidentiality through multiple untrusted relays, with artificial noise injection in the network for enhanced security, and presents a new expression for Ergodic Secrecy Rate in the high signal-to-noise ratio regime. Numerical results highlight that the proposed secure transmission scheme provides better secrecy rate performance compared to other schemes.

WIRELESS NETWORKS (2021)

Article Computer Science, Theory & Methods

Improving Physical Layer Security of Uplink NOMA via Energy Harvesting Jammers

Kunrui Cao et al.

Summary: This study investigates the secrecy transmission of uplink non-orthogonal multiple access (NOMA) with energy harvesting jammers. Three different friendly EH jammer selection schemes are proposed to enhance system secrecy performance. Analytical and numerical results show that these schemes can achieve better secrecy performance than conventional schemes without EH jammers, with different levels of secrecy diversity orders and convergence to the same effective secrecy throughput floor.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)

Article Telecommunications

Cooperative Jamming-Aided Secure Wireless Powered Communication Networks: A Game Theoretical Formulation

Yijie Zhong et al.

IEEE COMMUNICATIONS LETTERS (2020)

Article Engineering, Electrical & Electronic

QoS-Based Robust Cooperative-Jamming-Aided Beamforming for Correlated Wiretap Channels

Sai Xu et al.

IEEE SIGNAL PROCESSING LETTERS (2020)

Article Engineering, Electrical & Electronic

Achievable Ergodic Secrecy Rate in Bursty Interference Channels With Opportunistic User Scheduling

Jae-Hwan Lee et al.

IEEE TRANSACTIONS ON COMMUNICATIONS (2019)

Article Computer Science, Information Systems

Secure Alamouti Multiple Access Channel Transmissions: Multiuser Transmission and Multi-Antenna Eavesdroppers

T. Allen et al.

IEEE WIRELESS COMMUNICATIONS LETTERS (2019)

Article Computer Science, Information Systems

On the Performance of Low-Altitude UAV-Enabled Secure AF Relaying With Cooperative Jamming and SWIPT

Milad Tatar Mamaghani et al.

IEEE ACCESS (2019)

Article Telecommunications

Secure Beamforming for MIMO-NOMA-Based Cognitive Radio Network

Nibedita Nandan et al.

IEEE COMMUNICATIONS LETTERS (2018)

Article Engineering, Electrical & Electronic

Secure Two-Way Transmission via Wireless-Powered Untrusted Relay and External Jammer

Milad Tatar Mamaghani et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2018)

Article Computer Science, Information Systems

Cooperative Jamming for Physical Layer Security Enhancement in Internet of Things

Lin Hu et al.

IEEE INTERNET OF THINGS JOURNAL (2018)

Article Engineering, Electrical & Electronic

A New Cooperative Jamming Technique for a Two-Hop Amplify-and-Forward Relay Network With an Eavesdropper

Yongyun Choi et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2018)

Article Engineering, Electrical & Electronic

Exploiting Opportunistic Scheduling in Uplink Wiretap Networks

Xin Ge et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2017)

Article Engineering, Electrical & Electronic

Secure Communications With Cooperative Jamming: Optimal Power Allocation and Secrecy Outage Analysis

Kanapathippillai Cumanan et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2017)

Article Engineering, Electrical & Electronic

Linear Precoding for Fading Cognitive Multiple-Access Wiretap Channel With Finite-Alphabet Inputs

Juening Jin et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2017)

Article Engineering, Electrical & Electronic

Secure Communication in Uplink Transmissions: User Selection and Multiuser Secrecy Gain

Hao Deng et al.

IEEE TRANSACTIONS ON COMMUNICATIONS (2016)

Article Engineering, Electrical & Electronic

Artificial Noise Assisted Secure Transmission for Distributed Antenna Systems

Hui-Ming Wang et al.

IEEE TRANSACTIONS ON SIGNAL PROCESSING (2016)

Article Telecommunications

Social Tie Based Cooperative Jamming for Physical Layer Security

Ling Tang et al.

IEEE COMMUNICATIONS LETTERS (2015)

Article Engineering, Electrical & Electronic

Low-Overhead Distributed Jamming for SIMO Secrecy Transmission with Statistical CSI

Chao Wang et al.

IEEE SIGNAL PROCESSING LETTERS (2015)

Article Engineering, Electrical & Electronic

Uncoordinated Jammer Selection for Securing SIMOME Wiretap Channels: A Stochastic Geometry Approach

Chao Wang et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2015)

Article Telecommunications

On Ergodic Secrecy Rate for MISO Wiretap Broadcast Channels with Opportunistic Scheduling

Minyan Pei et al.

IEEE COMMUNICATIONS LETTERS (2014)

Article Computer Science, Information Systems

Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey

Amitav Mukherjee et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2014)

Article Engineering, Electrical & Electronic

On Secrecy Rate of the Generalized Artificial-Noise Assisted Secure Beamforming for Wiretap Channels

Pin-Hsun Lin et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2013)

Article Engineering, Electrical & Electronic

Joint Cooperative Beamforming and Jamming to Secure AF Relay Systems With Individual Power Constraint and No Eavesdropper's CSI

Hui-Ming Wang et al.

IEEE SIGNAL PROCESSING LETTERS (2013)

Article Engineering, Electrical & Electronic

Opportunistic Secrecy with a Strict Delay Constraint

Karim Khalil et al.

IEEE TRANSACTIONS ON COMMUNICATIONS (2013)

Article Engineering, Electrical & Electronic

Opportunistic Relaying for Secrecy Communications: Cooperative Jamming vs. Relay Chatting

Zhiguo Ding et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2011)

Article Computer Science, Information Systems

The general Gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming

Ender Tekin et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2008)

Article Computer Science, Hardware & Architecture

Relating symbolic and cryptographic secrecy

M Backes et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2005)