Security for Two-Way Untrusted Relay against Constant and Reactive Jamming with Fixed Signals
Abstract
Full Text:
PDFReferences
A. Mukherjee, S. Fakoorian, J. Huang, and A. Swindlehurst, “Principles of physical layer security in multiuser wireless networks: A survey,” IEEE Comm. Surveys Tutorials, vol. 16, no. 1, pp. 1–24, Feb. 2014.
Y. Wu, A. Khisti, C. Xiao, G. Caire, K. Wong, and X. Gao, “A survey of physical layer security techniques for 5G wireless networks and challenges ahead,” IEEE J. on Sel. Areas in Comm., vol. 36, no. 4, pp. 679–695, Apr. 2018.
T. Lv, H. Gao, and S. Yang, “Secrecy transmit beamforming for heterogeneous networks,” IEEE J. Sel. Areas in Comm., vol. 33, no. 6, pp. 1154–1170, Jun. 2015.
J. Y. Ryu, J. Lee, and T. Q. S. Quek, “Confidential cooperative communication with trust degree of potential eavesdroppers,” IEEE Trans. Wireless Comm., 2016.
Q. Yan, H. Zeng, T. Jiang, M. Li, W. Lou, and Y. T. Hou, “Jamming resilient communication using MIMO interference cancellation,” IEEE Trans. Info. Foren. and Sec., vol. 11, no. 7, pp. 1486–1499, Jul. 2016.
M. Karlsson, E. Bjrnson, and E. G. Larsson, “Jamming a TDD point-to-point link using reciprocity-based MIMO,” IEEE Transactions on Information Forensics and Security, vol. 12, no. 12, pp. 2957–2970, 2017.
A. Mukherjee and A. L. Swindlehurst, “Jamming games in the mimo wiretap channel with an active eavesdropper,” IEEE Transactions on Signal Processing, vol. 61, no. 1, pp. 82–91, 2013.
L. Xiao, X. Lu, D. Xu, Y. Tang, L.Wang, andW. Zhuang, “UAV relay in VANETs against smart jamming with reinforcement learning,” IEEE Transactions on Vehicular Technology, vol. 67, no. 5, pp. 4087–4097, 2018.
C. Pu, “Jamming-resilient multipath routing protocol for flying Ad Hoc networks,” IEEE Access, vol. 6, pp. 68 472–68 486, 2018.
L. Xiao, T. Chen, J. Liu, and H. Dai, “Anti-jamming transmission stackelberg game with observation errors,” IEEE Communications Letters, vol. 19, no. 6, pp. 949–952, 2015.
L. Li, A. P. Petropulu, and Z. Chen, “MIMO secret communications against an active eavesdropper,” IEEE Trans. Info. Foren. and Sec., vol. 12, no. 10, pp. 2387–2401, Oct. 2017.
S. Vahidian, S. Hatamnia, and B. Champagne, “On the security analysis of a cooperative incremental relaying protocol in the presence of an active eavesdropper,” IEEE Access, vol. 7, pp. 181 812–181 828, Sep. 2019.
T. Lv, Y. Yin, Y. Lu, S. Yang, E. Liu, and G. Clapworthy, “Physical detection of misbehavior in relay systems with unreliable channel state information,” IEEE J. Sel. Areas in Comm., vol. 36, no. 7, pp. 1517–1530, Jul. 2018.
H. Pirayesh, P. K. Sangdeh, and H. Zeng, “Securing ZigBee communications against constant jamming attack using neural network,” IEEE Internet of Things J., pp. 1–1, 2020.
K. Panyim, T. Hayajneh, P. Krishnamurthy, and D. Tipper, “On limited-range strategic/random jamming attacks in wireless ad hoc networks,” in 2009 IEEE 34th Conf. on Local Comp. Netw., 2009, pp. 922–929.
M. Spuhler, D. Giustiniano, V. Lenders, M. Wilhelm, and J. B. Schmitt, “Detection of reactive jamming in DSSS-based wireless communications,” IEEE Trans. on Wireless Comm., vol. 13, no. 3, pp. 1593–1603, 2014.
C. Zhang, J. Ge, J. Li, F. Gong, and H. Ding, “Complexity aware relay selection for 5G large-scale secure two-way relay systems,” IEEE Trans. on Veh. Tech., vol. 66, no. 6, pp. 5461–5465, 2017.
D. Tse and P. Viswanath, “Fundamentals of wireless communications,” Cambridge Univ. Pr., 2005.
DOI: http://dx.doi.org/10.21553/rev-jec.260
Copyright (c) 2021 REV Journal on Electronics and Communications
ISSN: 1859-378X Copyright © 2011-2024 |
|