Please use this identifier to cite or link to this item: http://hdl.handle.net/10397/87948
PIRA download icon_1.1View/Download Full Text
DC FieldValueLanguage
dc.contributorDepartment of Computing-
dc.creatorLi, G-
dc.creatorSheng, X-
dc.creatorWu, J-
dc.creatorYu, H-
dc.date.accessioned2020-09-04T00:53:04Z-
dc.date.available2020-09-04T00:53:04Z-
dc.identifier.issn0743-7315-
dc.identifier.urihttp://hdl.handle.net/10397/87948-
dc.language.isoenen_US
dc.publisherAcademic Pressen_US
dc.rights© 2020 The Author(s). Published by Elsevier Inc. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).en_US
dc.rightsThe following publication Li, G., Sheng, X., Wu, J., & Yu, H. (2020). Securing transmissions by friendly jamming scheme in wireless networks. Journal of Parallel and Distributed Computing. 2020; 144: 260-267, is available at https://doi.org/10.1016/j.jpdc.2020.04.013en_US
dc.subjectComputation complexityen_US
dc.subjectCSI of illegitimate nodesen_US
dc.subjectPhysical layer securityen_US
dc.subjectSecrecy outage probabilityen_US
dc.titleSecuring transmissions by friendly jamming scheme in wireless networksen_US
dc.typeJournal/Magazine Articleen_US
dc.identifier.spage260-
dc.identifier.epage267-
dc.identifier.volume144-
dc.identifier.doi10.1016/j.jpdc.2020.04.013-
dcterms.abstractIn this paper, we focus on the design of optimal relay and jammer selection strategy in relay-aided wireless networks. Different from previous works, assuming that the channel state information (CSI) of illegitimate nodes was available and only an eavesdropper existed, we first analyze disadvantages of joint relay and jammer selection (JRJS), average optimal relay selection (AORS), traditional maximum relay selection (TMRS) schemes. Then, we design an optimal relay and jammer selection strategy where the ratio of received SNRs at the destination generated by any two relays is maximized. By applying proposed strategy, computation complexity can be reduced. Moreover, we derive the lower and upper bounds of the secrecy outage probability based on the assumptions of existence of only illegitimate node and symmetric case for mathematical convenience. Finally, simulation shows that the proposed strategy operating with no CSI of illegitimate nodes can work efficiently compared with JRJS, TMRS and AORS strategies.-
dcterms.accessRightsopen accessen_US
dcterms.bibliographicCitationJournal of parallel and distributed computing, 2020, v. 144, p.260-267-
dcterms.isPartOfJournal of parallel and distributed computing-
dcterms.issued2020-
dc.identifier.scopus2-s2.0-85086641820-
dc.description.validate202009 bcma-
dc.description.oaVersion of Recorden_US
dc.identifier.FolderNumberOA_Scopus/WOSen_US
dc.description.pubStatusPublisheden_US
Appears in Collections:Journal/Magazine Article
Files in This Item:
File Description SizeFormat 
Li_Securing_transmissions_friendly.pdf979.63 kBAdobe PDFView/Open
Open Access Information
Status open access
File Version Version of Record
Access
View full-text via PolyU eLinks SFX Query
Show simple item record

Page views

59
Last Week
0
Last month
Citations as of May 12, 2024

Downloads

21
Citations as of May 12, 2024

SCOPUSTM   
Citations

6
Citations as of May 16, 2024

WEB OF SCIENCETM
Citations

4
Citations as of May 16, 2024

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.