Tang et al., 2017 - Google Patents
Physical layer security in heterogeneous networks with jammer selection and full-duplex usersTang et al., 2017
View PDF- Document ID
- 13965575385827949146
- Author
- Tang W
- Feng S
- Ding Y
- Liu Y
- Publication year
- Publication venue
- IEEE Transactions on Wireless Communications
External Links
Snippet
In this paper, we enhance physical layer security for downlink heterogeneous networks by using friendly jammers and full-duplex users. The jammers are selected to transmit jamming signal if their interfering power on the scheduled users is below a threshold, meanwhile the …
- 238000000034 method 0 abstract description 23
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna systems, i.e. transmission or reception using multiple antennas
- H04B7/022—Site diversity; Macro-diversity
- H04B7/024—Co-operative use of antennas of several sites, e.g. in co-ordinated multipoint or co-operative multiple-input multiple-output [MIMO] systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/04—Large scale networks; Deep hierarchical networks
- H04W84/042—Public Land Mobile systems, e.g. cellular systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/14—Relay systems
- H04B7/15—Active relay systems
- H04B7/155—Ground-based stations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W16/00—Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
- H04W16/24—Cell structures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organizing networks, e.g. ad-hoc networks or sensor networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/065—Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W72/00—Local resource management, e.g. wireless traffic scheduling or selection or allocation of wireless resources
- H04W72/04—Wireless resource allocation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W72/00—Local resource management, e.g. wireless traffic scheduling or selection or allocation of wireless resources
- H04W72/12—Dynamic Wireless traffic scheduling; Dynamically scheduled allocation on shared channel
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W52/00—Power Management, e.g. TPC [Transmission Power Control], power saving or power classes
- H04W52/04—TPC [Transmission power control]
- H04W52/18—TPC being performed according to specific parameters
- H04W52/24—TPC being performed according to specific parameters using SIR [Signal to Interference Ratio] or other wireless path parameters
- H04W52/243—TPC being performed according to specific parameters using SIR [Signal to Interference Ratio] or other wireless path parameters taking into account interferences
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/08—Access point devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W92/00—Interfaces specially adapted for wireless communication networks
- H04W92/16—Interfaces between hierarchically similar devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W40/00—Communication routing or communication path finding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W4/00—Mobile application services or facilities specially adapted for wireless communication networks
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Tang et al. | Physical layer security in heterogeneous networks with jammer selection and full-duplex users | |
Siddiqui et al. | Interference management in 5G and beyond network: Requirements, challenges and future directions | |
Li et al. | Security-reliability tradeoff analysis for cooperative NOMA in cognitive radio networks | |
Lei et al. | Secrecy outage analysis for cooperative NOMA systems with relay selection schemes | |
Wang et al. | Physical layer security in heterogeneous cellular networks | |
Sánchez et al. | Survey on physical layer security for 5G wireless networks | |
Jameel et al. | A comprehensive survey on cooperative relaying and jamming strategies for physical layer security | |
Liu et al. | Non-orthogonal multiple access in large-scale heterogeneous networks | |
Wang et al. | Artificial noise aided physical layer security in multi-antenna small-cell networks | |
Wang et al. | Physical layer security in random cellular networks | |
Wang et al. | Multi-objective resource allocation in a NOMA cognitive radio network with a practical non-linear energy harvesting model | |
Zheng et al. | Safeguarding decentralized wireless networks using full-duplex jamming receivers | |
Gupta et al. | Downlink multi-antenna heterogeneous cellular network with load balancing | |
Nguyen et al. | Secrecy outage performance analysis for energy harvesting sensor networks with a jammer using relay selection strategy | |
Sun et al. | Secure transmissions in wireless information and power transfer millimeter-wave ultra-dense networks | |
Ren et al. | Secure wireless information and power transfer in heterogeneous networks | |
Xu et al. | Energy-efficient beamforming for heterogeneous industrial IoT networks with phase and distortion noises | |
Sharma et al. | Physical layer security using beamforming techniques for 5G and beyond networks: A systematic review | |
Cao et al. | Security-reliability tradeoff analysis for underlay cognitive two-way relay networks | |
So-In et al. | On security and throughput for energy harvesting untrusted relays in IoT systems using NOMA | |
Hu et al. | Secrecy energy efficiency in wireless powered heterogeneous networks: A distributed ADMM approach | |
Umer et al. | Secrecy spectrum and energy efficiency analysis in massive MIMO-enabled multi-tier hybrid HetNets | |
Cao et al. | Physical-Layer Security for Intelligent-Reflecting-Surface-Aided Wireless-Powered Communication Systems | |
Nguyen et al. | Reliable and secure transmission in multiple antennas hybrid satellite-terrestrial cognitive networks relying on NOMA | |
Zhao et al. | Physical-layer security for mobile users in NOMA-enabled visible light communication networks |