pith. machine review for the scientific record. sign in

arxiv: 1701.05764 · v1 · submitted 2017-01-20 · 💻 cs.IT · math.IT

Recognition: unknown

Physical Layer Security Jamming: Theoretical Limits and Practical Designs in Wireless Networks

Authors on Pith no claims yet
classification 💻 cs.IT math.IT
keywords jammingsecuritylayerphysicalwirelesslimitspracticaltheoretical
0
0 comments X
read the original abstract

Physical layer security has been recently recognized as a promising new design paradigm to provide security in wireless networks. In addition to the existing conventional cryptographic methods, physical layer security exploits the dynamics of fading channels to enhance secured wireless links. In this approach, jamming plays a key role by generating noise signals to confuse the potential eavesdroppers, and significantly improves quality and reliability of secure communications between legitimate terminals. This article presents theoretical limits and practical designs of jamming approaches for physical layer security. In particular, the theoretical limits explore the achievable secrecy rates of user cooperation based jamming whilst the centralized, and game theoretic based precoding techniques are reviewed for practical implementations. In addition, the emerging wireless energy harvesting techniques are exploited to harvest the required energy to transmit jamming signals. Future directions of these approaches, and the associated research challenges are also briefly outlined.

This paper has not been read by Pith yet.

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Forward citations

Cited by 1 Pith paper

Reviewed papers in the Pith corpus that reference this work. Sorted by Pith novelty score.

  1. UAVs as Dynamic Nodes in Communication Networks

    cs.ET 2026-04 unverdicted novelty 4.0

    UAVs serve multiple dynamic roles in wireless networks, and a novel UAV-Network-in-a-Box architecture is proposed for emergency temporary coverage.