Loading…
A Survey of Cooperative Jamming-Based Secure Transmission for Energy-Limited Systems
Considering the ongoing development of various devices and rich applications in intelligent Internet of Things (IoT) systems, it is a crucial issue to solve secure transmission of legitimate signals for massive data sharing in the systems. Cooperative jamming-based physical layer security is explore...
Saved in:
Published in: | Wireless communications and mobile computing 2021, Vol.2021 (1) |
---|---|
Main Authors: | , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c337t-df3595096d9259349da4b2a3728efde3810fc3898c028fa4d55adae7222be3243 |
---|---|
cites | cdi_FETCH-LOGICAL-c337t-df3595096d9259349da4b2a3728efde3810fc3898c028fa4d55adae7222be3243 |
container_end_page | |
container_issue | 1 |
container_start_page | |
container_title | Wireless communications and mobile computing |
container_volume | 2021 |
creator | Wu, Yuandong Huo, Yan |
description | Considering the ongoing development of various devices and rich applications in intelligent Internet of Things (IoT) systems, it is a crucial issue to solve secure transmission of legitimate signals for massive data sharing in the systems. Cooperative jamming-based physical layer security is explored to be a complement of conventional cryptographic schemes to protect private information. Yet, this method needs to solve a game between energy consumption and signal secure transmission. In this paper, we summarize the basics of cooperative jamming and universal security metrics. Using the metrics, we study a series of typical cooperative jamming strategies from two aspects, including power allocation and energy harvesting. Finally, we propose open issues and challenges of further works on cooperative jamming in an IoT system with energy constraints. |
doi_str_mv | 10.1155/2021/6638405 |
format | article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2480127559</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2480127559</sourcerecordid><originalsourceid>FETCH-LOGICAL-c337t-df3595096d9259349da4b2a3728efde3810fc3898c028fa4d55adae7222be3243</originalsourceid><addsrcrecordid>eNp90DtPwzAUBWALgUQpbPwAS4wQ6kec2CNU5aVKDC2z5cbXxRWJi50U5d-TqhUj073Dp3Okg9A1JfeUCjFhhNFJUXCZE3GCRlRwksmiLE___kKdo4uUNoQQPuARWj7gRRd30OPg8DSELUTT-h3gN1PXvllnjyaBxQuough4GU2Tap-SDw12IeJZA3HdZ3Nf-3bP-tRCnS7RmTNfCa6Od4w-nmbL6Us2f39-nT7Ms4rzss2s40IJogqrmFA8V9bkK2Z4ySQ4C1xS4ioulawIk87kVghjDZSMsRVwlvMxujnkbmP47iC1ehO62AyVmuWSUFaKIXeM7g6qiiGlCE5vo69N7DUler-b3u-mj7sN_PbAP31jzY__X_8CTDVsBQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2480127559</pqid></control><display><type>article</type><title>A Survey of Cooperative Jamming-Based Secure Transmission for Energy-Limited Systems</title><source>Wiley-Blackwell Open Access Collection</source><source>Publicly Available Content Database (Proquest) (PQ_SDU_P3)</source><creator>Wu, Yuandong ; Huo, Yan</creator><contributor>Duan, Zhuojun ; Zhuojun Duan</contributor><creatorcontrib>Wu, Yuandong ; Huo, Yan ; Duan, Zhuojun ; Zhuojun Duan</creatorcontrib><description>Considering the ongoing development of various devices and rich applications in intelligent Internet of Things (IoT) systems, it is a crucial issue to solve secure transmission of legitimate signals for massive data sharing in the systems. Cooperative jamming-based physical layer security is explored to be a complement of conventional cryptographic schemes to protect private information. Yet, this method needs to solve a game between energy consumption and signal secure transmission. In this paper, we summarize the basics of cooperative jamming and universal security metrics. Using the metrics, we study a series of typical cooperative jamming strategies from two aspects, including power allocation and energy harvesting. Finally, we propose open issues and challenges of further works on cooperative jamming in an IoT system with energy constraints.</description><identifier>ISSN: 1530-8669</identifier><identifier>EISSN: 1530-8677</identifier><identifier>DOI: 10.1155/2021/6638405</identifier><language>eng</language><publisher>Oxford: Hindawi</publisher><subject>Cryptography ; Data retrieval ; Design ; Electronic surveillance ; Energy consumption ; Energy efficiency ; Energy harvesting ; Energy limitation ; Internet of Things ; Jamming ; Noise ; Random variables ; Security ; Signal processing ; Transceivers</subject><ispartof>Wireless communications and mobile computing, 2021, Vol.2021 (1)</ispartof><rights>Copyright © 2021 Yuandong Wu and Yan Huo.</rights><rights>Copyright © 2021 Yuandong Wu and Yan Huo. This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c337t-df3595096d9259349da4b2a3728efde3810fc3898c028fa4d55adae7222be3243</citedby><cites>FETCH-LOGICAL-c337t-df3595096d9259349da4b2a3728efde3810fc3898c028fa4d55adae7222be3243</cites><orcidid>0000-0003-0647-1009</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.proquest.com/docview/2480127559/fulltextPDF?pq-origsite=primo$$EPDF$$P50$$Gproquest$$Hfree_for_read</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2480127559?pq-origsite=primo$$EHTML$$P50$$Gproquest$$Hfree_for_read</linktohtml><link.rule.ids>314,780,784,4024,25753,27923,27924,27925,37012,44590,75126</link.rule.ids></links><search><contributor>Duan, Zhuojun</contributor><contributor>Zhuojun Duan</contributor><creatorcontrib>Wu, Yuandong</creatorcontrib><creatorcontrib>Huo, Yan</creatorcontrib><title>A Survey of Cooperative Jamming-Based Secure Transmission for Energy-Limited Systems</title><title>Wireless communications and mobile computing</title><description>Considering the ongoing development of various devices and rich applications in intelligent Internet of Things (IoT) systems, it is a crucial issue to solve secure transmission of legitimate signals for massive data sharing in the systems. Cooperative jamming-based physical layer security is explored to be a complement of conventional cryptographic schemes to protect private information. Yet, this method needs to solve a game between energy consumption and signal secure transmission. In this paper, we summarize the basics of cooperative jamming and universal security metrics. Using the metrics, we study a series of typical cooperative jamming strategies from two aspects, including power allocation and energy harvesting. Finally, we propose open issues and challenges of further works on cooperative jamming in an IoT system with energy constraints.</description><subject>Cryptography</subject><subject>Data retrieval</subject><subject>Design</subject><subject>Electronic surveillance</subject><subject>Energy consumption</subject><subject>Energy efficiency</subject><subject>Energy harvesting</subject><subject>Energy limitation</subject><subject>Internet of Things</subject><subject>Jamming</subject><subject>Noise</subject><subject>Random variables</subject><subject>Security</subject><subject>Signal processing</subject><subject>Transceivers</subject><issn>1530-8669</issn><issn>1530-8677</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><sourceid>PIMPY</sourceid><recordid>eNp90DtPwzAUBWALgUQpbPwAS4wQ6kec2CNU5aVKDC2z5cbXxRWJi50U5d-TqhUj073Dp3Okg9A1JfeUCjFhhNFJUXCZE3GCRlRwksmiLE___kKdo4uUNoQQPuARWj7gRRd30OPg8DSELUTT-h3gN1PXvllnjyaBxQuough4GU2Tap-SDw12IeJZA3HdZ3Nf-3bP-tRCnS7RmTNfCa6Od4w-nmbL6Us2f39-nT7Ms4rzss2s40IJogqrmFA8V9bkK2Z4ySQ4C1xS4ioulawIk87kVghjDZSMsRVwlvMxujnkbmP47iC1ehO62AyVmuWSUFaKIXeM7g6qiiGlCE5vo69N7DUler-b3u-mj7sN_PbAP31jzY__X_8CTDVsBQ</recordid><startdate>2021</startdate><enddate>2021</enddate><creator>Wu, Yuandong</creator><creator>Huo, Yan</creator><general>Hindawi</general><general>Hindawi Limited</general><scope>RHU</scope><scope>RHW</scope><scope>RHX</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7XB</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0N</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope><orcidid>https://orcid.org/0000-0003-0647-1009</orcidid></search><sort><creationdate>2021</creationdate><title>A Survey of Cooperative Jamming-Based Secure Transmission for Energy-Limited Systems</title><author>Wu, Yuandong ; Huo, Yan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c337t-df3595096d9259349da4b2a3728efde3810fc3898c028fa4d55adae7222be3243</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Cryptography</topic><topic>Data retrieval</topic><topic>Design</topic><topic>Electronic surveillance</topic><topic>Energy consumption</topic><topic>Energy efficiency</topic><topic>Energy harvesting</topic><topic>Energy limitation</topic><topic>Internet of Things</topic><topic>Jamming</topic><topic>Noise</topic><topic>Random variables</topic><topic>Security</topic><topic>Signal processing</topic><topic>Transceivers</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Wu, Yuandong</creatorcontrib><creatorcontrib>Huo, Yan</creatorcontrib><collection>Hindawi Publishing Complete</collection><collection>Hindawi Publishing Subscription Journals</collection><collection>Hindawi Publishing Open Access</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>AUTh Library subscriptions: ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer science database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Computing Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Publicly Available Content Database (Proquest) (PQ_SDU_P3)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>Wireless communications and mobile computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Wu, Yuandong</au><au>Huo, Yan</au><au>Duan, Zhuojun</au><au>Zhuojun Duan</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Survey of Cooperative Jamming-Based Secure Transmission for Energy-Limited Systems</atitle><jtitle>Wireless communications and mobile computing</jtitle><date>2021</date><risdate>2021</risdate><volume>2021</volume><issue>1</issue><issn>1530-8669</issn><eissn>1530-8677</eissn><abstract>Considering the ongoing development of various devices and rich applications in intelligent Internet of Things (IoT) systems, it is a crucial issue to solve secure transmission of legitimate signals for massive data sharing in the systems. Cooperative jamming-based physical layer security is explored to be a complement of conventional cryptographic schemes to protect private information. Yet, this method needs to solve a game between energy consumption and signal secure transmission. In this paper, we summarize the basics of cooperative jamming and universal security metrics. Using the metrics, we study a series of typical cooperative jamming strategies from two aspects, including power allocation and energy harvesting. Finally, we propose open issues and challenges of further works on cooperative jamming in an IoT system with energy constraints.</abstract><cop>Oxford</cop><pub>Hindawi</pub><doi>10.1155/2021/6638405</doi><orcidid>https://orcid.org/0000-0003-0647-1009</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1530-8669 |
ispartof | Wireless communications and mobile computing, 2021, Vol.2021 (1) |
issn | 1530-8669 1530-8677 |
language | eng |
recordid | cdi_proquest_journals_2480127559 |
source | Wiley-Blackwell Open Access Collection; Publicly Available Content Database (Proquest) (PQ_SDU_P3) |
subjects | Cryptography Data retrieval Design Electronic surveillance Energy consumption Energy efficiency Energy harvesting Energy limitation Internet of Things Jamming Noise Random variables Security Signal processing Transceivers |
title | A Survey of Cooperative Jamming-Based Secure Transmission for Energy-Limited Systems |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-24T16%3A36%3A45IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Survey%20of%20Cooperative%20Jamming-Based%20Secure%20Transmission%20for%20Energy-Limited%20Systems&rft.jtitle=Wireless%20communications%20and%20mobile%20computing&rft.au=Wu,%20Yuandong&rft.date=2021&rft.volume=2021&rft.issue=1&rft.issn=1530-8669&rft.eissn=1530-8677&rft_id=info:doi/10.1155/2021/6638405&rft_dat=%3Cproquest_cross%3E2480127559%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c337t-df3595096d9259349da4b2a3728efde3810fc3898c028fa4d55adae7222be3243%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2480127559&rft_id=info:pmid/&rfr_iscdi=true |