Secure Relay and Jammer Selection for Physical Layer Security

@article{Hui2015SecureRA,
  title={Secure Relay and Jammer Selection for Physical Layer Security},
  author={Hui Hui and Arnold Lee Swindlehurst and Guobing Li and Junli Liang},
  journal={IEEE Signal Processing Letters},
  year={2015},
  volume={22},
  pages={1147-1151}
}
Secure relay and jammer selection for physical-layer security is studied in a wireless network with multiple intermediate nodes and eavesdroppers, where each intermediate node either helps to forward messages as a relay, or broadcasts noise as a jammer. We derive a closed-form expression for the secrecy outage probability (SOP), and we develop two relay and jammer selection methods for SOP minimization. In both methods a selection vector and a corresponding threshold are designed and broadcast… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-10 OF 57 CITATIONS, ESTIMATED 74% COVERAGE

Leakage rate based hybrid untrustworthy relay selection with channel estimation error

  • 2017 25th Telecommunication Forum (TELFOR)
  • 2017
VIEW 3 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

Secrecy Outage of Dual-Hop Regenerative Multi-Relay System With Relay Selection

  • IEEE Transactions on Wireless Communications
  • 2015
VIEW 7 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

Secure Communications in Tiered 5G Wireless Networks With Cooperative Jamming

  • IEEE Transactions on Wireless Communications
  • 2019
VIEW 1 EXCERPT
CITES BACKGROUND

A Survey of Optimization Approaches for Wireless Physical Layer Security

  • IEEE Communications Surveys & Tutorials
  • 2018
VIEW 1 EXCERPT
CITES BACKGROUND

FILTER CITATIONS BY YEAR

2015
2019

CITATION STATISTICS

  • 3 Highly Influenced Citations

  • Averaged 17 Citations per year over the last 3 years

References

Publications referenced by this paper.
SHOWING 1-10 OF 17 REFERENCES

Destination assisted cooperative jamming for wireless physical layer security

  • 2012 IEEE International Workshop on Information Forensics and Security (WIFS)
  • 2012

Similar Papers

Loading similar papers…