Loading…

A Survey of Cooperative Jamming-Based Secure Transmission for Energy-Limited Systems

Considering the ongoing development of various devices and rich applications in intelligent Internet of Things (IoT) systems, it is a crucial issue to solve secure transmission of legitimate signals for massive data sharing in the systems. Cooperative jamming-based physical layer security is explore...

Full description

Saved in:
Bibliographic Details
Published in:Wireless communications and mobile computing 2021, Vol.2021 (1)
Main Authors: Wu, Yuandong, Huo, Yan
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c337t-df3595096d9259349da4b2a3728efde3810fc3898c028fa4d55adae7222be3243
cites cdi_FETCH-LOGICAL-c337t-df3595096d9259349da4b2a3728efde3810fc3898c028fa4d55adae7222be3243
container_end_page
container_issue 1
container_start_page
container_title Wireless communications and mobile computing
container_volume 2021
creator Wu, Yuandong
Huo, Yan
description Considering the ongoing development of various devices and rich applications in intelligent Internet of Things (IoT) systems, it is a crucial issue to solve secure transmission of legitimate signals for massive data sharing in the systems. Cooperative jamming-based physical layer security is explored to be a complement of conventional cryptographic schemes to protect private information. Yet, this method needs to solve a game between energy consumption and signal secure transmission. In this paper, we summarize the basics of cooperative jamming and universal security metrics. Using the metrics, we study a series of typical cooperative jamming strategies from two aspects, including power allocation and energy harvesting. Finally, we propose open issues and challenges of further works on cooperative jamming in an IoT system with energy constraints.
doi_str_mv 10.1155/2021/6638405
format article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2480127559</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2480127559</sourcerecordid><originalsourceid>FETCH-LOGICAL-c337t-df3595096d9259349da4b2a3728efde3810fc3898c028fa4d55adae7222be3243</originalsourceid><addsrcrecordid>eNp90DtPwzAUBWALgUQpbPwAS4wQ6kec2CNU5aVKDC2z5cbXxRWJi50U5d-TqhUj073Dp3Okg9A1JfeUCjFhhNFJUXCZE3GCRlRwksmiLE___kKdo4uUNoQQPuARWj7gRRd30OPg8DSELUTT-h3gN1PXvllnjyaBxQuough4GU2Tap-SDw12IeJZA3HdZ3Nf-3bP-tRCnS7RmTNfCa6Od4w-nmbL6Us2f39-nT7Ms4rzss2s40IJogqrmFA8V9bkK2Z4ySQ4C1xS4ioulawIk87kVghjDZSMsRVwlvMxujnkbmP47iC1ehO62AyVmuWSUFaKIXeM7g6qiiGlCE5vo69N7DUler-b3u-mj7sN_PbAP31jzY__X_8CTDVsBQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2480127559</pqid></control><display><type>article</type><title>A Survey of Cooperative Jamming-Based Secure Transmission for Energy-Limited Systems</title><source>Wiley-Blackwell Open Access Collection</source><source>Publicly Available Content Database (Proquest) (PQ_SDU_P3)</source><creator>Wu, Yuandong ; Huo, Yan</creator><contributor>Duan, Zhuojun ; Zhuojun Duan</contributor><creatorcontrib>Wu, Yuandong ; Huo, Yan ; Duan, Zhuojun ; Zhuojun Duan</creatorcontrib><description>Considering the ongoing development of various devices and rich applications in intelligent Internet of Things (IoT) systems, it is a crucial issue to solve secure transmission of legitimate signals for massive data sharing in the systems. Cooperative jamming-based physical layer security is explored to be a complement of conventional cryptographic schemes to protect private information. Yet, this method needs to solve a game between energy consumption and signal secure transmission. In this paper, we summarize the basics of cooperative jamming and universal security metrics. Using the metrics, we study a series of typical cooperative jamming strategies from two aspects, including power allocation and energy harvesting. Finally, we propose open issues and challenges of further works on cooperative jamming in an IoT system with energy constraints.</description><identifier>ISSN: 1530-8669</identifier><identifier>EISSN: 1530-8677</identifier><identifier>DOI: 10.1155/2021/6638405</identifier><language>eng</language><publisher>Oxford: Hindawi</publisher><subject>Cryptography ; Data retrieval ; Design ; Electronic surveillance ; Energy consumption ; Energy efficiency ; Energy harvesting ; Energy limitation ; Internet of Things ; Jamming ; Noise ; Random variables ; Security ; Signal processing ; Transceivers</subject><ispartof>Wireless communications and mobile computing, 2021, Vol.2021 (1)</ispartof><rights>Copyright © 2021 Yuandong Wu and Yan Huo.</rights><rights>Copyright © 2021 Yuandong Wu and Yan Huo. This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c337t-df3595096d9259349da4b2a3728efde3810fc3898c028fa4d55adae7222be3243</citedby><cites>FETCH-LOGICAL-c337t-df3595096d9259349da4b2a3728efde3810fc3898c028fa4d55adae7222be3243</cites><orcidid>0000-0003-0647-1009</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.proquest.com/docview/2480127559/fulltextPDF?pq-origsite=primo$$EPDF$$P50$$Gproquest$$Hfree_for_read</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2480127559?pq-origsite=primo$$EHTML$$P50$$Gproquest$$Hfree_for_read</linktohtml><link.rule.ids>314,780,784,4024,25753,27923,27924,27925,37012,44590,75126</link.rule.ids></links><search><contributor>Duan, Zhuojun</contributor><contributor>Zhuojun Duan</contributor><creatorcontrib>Wu, Yuandong</creatorcontrib><creatorcontrib>Huo, Yan</creatorcontrib><title>A Survey of Cooperative Jamming-Based Secure Transmission for Energy-Limited Systems</title><title>Wireless communications and mobile computing</title><description>Considering the ongoing development of various devices and rich applications in intelligent Internet of Things (IoT) systems, it is a crucial issue to solve secure transmission of legitimate signals for massive data sharing in the systems. Cooperative jamming-based physical layer security is explored to be a complement of conventional cryptographic schemes to protect private information. Yet, this method needs to solve a game between energy consumption and signal secure transmission. In this paper, we summarize the basics of cooperative jamming and universal security metrics. Using the metrics, we study a series of typical cooperative jamming strategies from two aspects, including power allocation and energy harvesting. Finally, we propose open issues and challenges of further works on cooperative jamming in an IoT system with energy constraints.</description><subject>Cryptography</subject><subject>Data retrieval</subject><subject>Design</subject><subject>Electronic surveillance</subject><subject>Energy consumption</subject><subject>Energy efficiency</subject><subject>Energy harvesting</subject><subject>Energy limitation</subject><subject>Internet of Things</subject><subject>Jamming</subject><subject>Noise</subject><subject>Random variables</subject><subject>Security</subject><subject>Signal processing</subject><subject>Transceivers</subject><issn>1530-8669</issn><issn>1530-8677</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><sourceid>PIMPY</sourceid><recordid>eNp90DtPwzAUBWALgUQpbPwAS4wQ6kec2CNU5aVKDC2z5cbXxRWJi50U5d-TqhUj073Dp3Okg9A1JfeUCjFhhNFJUXCZE3GCRlRwksmiLE___kKdo4uUNoQQPuARWj7gRRd30OPg8DSELUTT-h3gN1PXvllnjyaBxQuough4GU2Tap-SDw12IeJZA3HdZ3Nf-3bP-tRCnS7RmTNfCa6Od4w-nmbL6Us2f39-nT7Ms4rzss2s40IJogqrmFA8V9bkK2Z4ySQ4C1xS4ioulawIk87kVghjDZSMsRVwlvMxujnkbmP47iC1ehO62AyVmuWSUFaKIXeM7g6qiiGlCE5vo69N7DUler-b3u-mj7sN_PbAP31jzY__X_8CTDVsBQ</recordid><startdate>2021</startdate><enddate>2021</enddate><creator>Wu, Yuandong</creator><creator>Huo, Yan</creator><general>Hindawi</general><general>Hindawi Limited</general><scope>RHU</scope><scope>RHW</scope><scope>RHX</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7XB</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0N</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope><orcidid>https://orcid.org/0000-0003-0647-1009</orcidid></search><sort><creationdate>2021</creationdate><title>A Survey of Cooperative Jamming-Based Secure Transmission for Energy-Limited Systems</title><author>Wu, Yuandong ; Huo, Yan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c337t-df3595096d9259349da4b2a3728efde3810fc3898c028fa4d55adae7222be3243</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Cryptography</topic><topic>Data retrieval</topic><topic>Design</topic><topic>Electronic surveillance</topic><topic>Energy consumption</topic><topic>Energy efficiency</topic><topic>Energy harvesting</topic><topic>Energy limitation</topic><topic>Internet of Things</topic><topic>Jamming</topic><topic>Noise</topic><topic>Random variables</topic><topic>Security</topic><topic>Signal processing</topic><topic>Transceivers</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Wu, Yuandong</creatorcontrib><creatorcontrib>Huo, Yan</creatorcontrib><collection>Hindawi Publishing Complete</collection><collection>Hindawi Publishing Subscription Journals</collection><collection>Hindawi Publishing Open Access</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>AUTh Library subscriptions: ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer science database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Computing Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Publicly Available Content Database (Proquest) (PQ_SDU_P3)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>Wireless communications and mobile computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Wu, Yuandong</au><au>Huo, Yan</au><au>Duan, Zhuojun</au><au>Zhuojun Duan</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Survey of Cooperative Jamming-Based Secure Transmission for Energy-Limited Systems</atitle><jtitle>Wireless communications and mobile computing</jtitle><date>2021</date><risdate>2021</risdate><volume>2021</volume><issue>1</issue><issn>1530-8669</issn><eissn>1530-8677</eissn><abstract>Considering the ongoing development of various devices and rich applications in intelligent Internet of Things (IoT) systems, it is a crucial issue to solve secure transmission of legitimate signals for massive data sharing in the systems. Cooperative jamming-based physical layer security is explored to be a complement of conventional cryptographic schemes to protect private information. Yet, this method needs to solve a game between energy consumption and signal secure transmission. In this paper, we summarize the basics of cooperative jamming and universal security metrics. Using the metrics, we study a series of typical cooperative jamming strategies from two aspects, including power allocation and energy harvesting. Finally, we propose open issues and challenges of further works on cooperative jamming in an IoT system with energy constraints.</abstract><cop>Oxford</cop><pub>Hindawi</pub><doi>10.1155/2021/6638405</doi><orcidid>https://orcid.org/0000-0003-0647-1009</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1530-8669
ispartof Wireless communications and mobile computing, 2021, Vol.2021 (1)
issn 1530-8669
1530-8677
language eng
recordid cdi_proquest_journals_2480127559
source Wiley-Blackwell Open Access Collection; Publicly Available Content Database (Proquest) (PQ_SDU_P3)
subjects Cryptography
Data retrieval
Design
Electronic surveillance
Energy consumption
Energy efficiency
Energy harvesting
Energy limitation
Internet of Things
Jamming
Noise
Random variables
Security
Signal processing
Transceivers
title A Survey of Cooperative Jamming-Based Secure Transmission for Energy-Limited Systems
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-24T16%3A36%3A45IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Survey%20of%20Cooperative%20Jamming-Based%20Secure%20Transmission%20for%20Energy-Limited%20Systems&rft.jtitle=Wireless%20communications%20and%20mobile%20computing&rft.au=Wu,%20Yuandong&rft.date=2021&rft.volume=2021&rft.issue=1&rft.issn=1530-8669&rft.eissn=1530-8677&rft_id=info:doi/10.1155/2021/6638405&rft_dat=%3Cproquest_cross%3E2480127559%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c337t-df3595096d9259349da4b2a3728efde3810fc3898c028fa4d55adae7222be3243%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2480127559&rft_id=info:pmid/&rfr_iscdi=true