Source-Based Jamming for Physical-Layer Security on Untrusted Full-Duplex Relay.
Saman AtapattuNathan RossYindi JingMalin PremaratnePublished in: IEEE Commun. Lett. (2019)
Keyphrases
- physical layer
- multi hop
- wireless communication
- application layer
- network layer
- resource utilization
- mac protocol
- multipath
- communication systems
- security policies
- wireless networks
- communication protocol
- bit error rate
- smart grid
- channel coding
- wireless sensor networks
- cognitive radio
- fading channels
- ad hoc networks
- computer simulation
- wireless ad hoc networks
- data transmission
- mobile ad hoc networks
- network security
- quality of service