Abstract | ||
---|---|---|
In this paper, we investigate wireless networks consisting of a legitimate transmitter (Alice), a legitimate receiver (Bob), eavesdroppers (Eves), and friendly jammers. Two network scenarios are considered depending on whether Alice and the jammers have the ability to detect the existence of Eves in their vicinity. If they do not have the ability, as a means to enhance the secrecy, Alice transmits... |
Year | DOI | Venue |
---|---|---|
2018 | 10.1109/TWC.2018.2838592 | IEEE Transactions on Wireless Communications |
Keywords | Field | DocType |
Jamming,Wireless networks,Transmitters,Receivers,Interference,Physical layer,Network security | Transmitter,Wireless network,Eavesdropping,Network security,Computer network,Physical layer,Artificial noise,Poisson point process,Jamming,Mathematics | Journal |
Volume | Issue | ISSN |
17 | 8 | 1536-1276 |
Citations | PageRank | References |
3 | 0.37 | 0 |
Authors | ||
4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Hanbae Kong | 1 | 223 | 20.47 |
Ping Wang | 2 | 4153 | 216.93 |
Niyato Dusit | 3 | 9486 | 547.06 |
Yu Cheng | 4 | 770 | 68.06 |