1 |
FAUZIA I , MUDASSAR A , MUHAMMAD N , et al. Physical layer security for beyond 5G/6G networks: emerging technologies and future directions[J]. Journal of Network and Computer Applications, 2022, 206, 103431.
doi: 10.1016/j.jnca.2022.103431
|
2 |
孙子文, 徐宜敏. 无线传感器网络的混合抗干扰攻击方法[J]. 系统工程与电子技术, 2019, 41 (9): 2132- 2140.
doi: 10.3969/j.issn.1001-506X.2019.09.29
|
|
SUN Z W , XU Y M . Hybrid anti-jamming attack method for wireless sensor networks[J]. Systems Engineering and Electronics, 2019, 41 (9): 2132- 2140.
doi: 10.3969/j.issn.1001-506X.2019.09.29
|
3 |
SALAM H A , KHAN B M . IWSN-standards, challenges and future[J]. IEEE Potentials, 2016, 35 (2): 9- 16.
doi: 10.1109/MPOT.2015.2422931
|
4 |
SU Y S , LIU Y , FAN R , et al. A secure relay selection scheme based on cooperative jamming for underwater acoustic sensor networks[J]. Computer Networks, 2022, 217, 109307.
doi: 10.1016/j.comnet.2022.109307
|
5 |
DARSENA D , GELLI G , IUDICE I , et al. Detection and blind channel estimation for UAV-aided wireless sensor networks in smart cities under mobile jamming attack[J]. IEEE Internet of Things Journal, 2022, 9 (14): 11932- 11950.
doi: 10.1109/JIOT.2021.3132381
|
6 |
HAN H Z , HUANG Y C , HU H , et al. Mobile jammer enabled secure UAV communication with short packet transmission[J]. AEU-International Journal of Electronics and Communications, 2022, 157, 154434.
|
7 |
SHEN D Q , HUO Y , GAO Q H . A friendly jamming handover scheme for a conscious mobile eavesdropper in IoT systems[J]. Procedia Computer Science, 2022, 202, 15- 20.
doi: 10.1016/j.procs.2022.04.003
|
8 |
ZHANG T Y , WEN H , TANG J , et al. Cooperative jamming secure scheme for IWNs random mobile users aided by edge computing intelligent node selection[J]. IEEE Trans.on Industrial Informatics, 2021, 7 (17): 4999- 5009.
|
9 |
DHRMARAJ B S , JAICHANDRAN R , BHARATHI P S , et al. The defense against jamming attack in cognitive radio networks: energy efficiency management perspective[J]. Microprocessors and Microsystems, 2021, 82, 103816.
doi: 10.1016/j.micpro.2020.103816
|
10 |
ALSULAMI B S , BAJRACHARYA C , RAWAT D B . Game theory-based attack and defense analysis in virtual wireless networks with jammers and eavesdroppers[J]. Digital Communications and Networks, 2021, 7 (3): 327- 334.
doi: 10.1016/j.dcan.2021.04.002
|
11 |
LI X R , DAI H N , SHUKLA M K , et al. Friendly-jamming schemes to secure ultra-reliable and low-latency communications in 5G and beyond communications[J]. Computer Stan-dards & Interfaces, 2021, 78, 103540.
|
12 |
HAMAMREH J M , FURQAN H M , ARSLAN H . Classifications and applications of physical layer security techniques for confidentiality: a comprehensive survey[J]. IEEE Communications Surveys & Tutorials, 2019, 2 (21): 1773- 1828.
|
13 |
雷菁, 李为, 鲁信金. 5G通信背景下物理层安全技术研究[J]. 无线电通信技术, 2020, 46 (2): 150- 158.
|
|
LEI J , LI W , LU X J . Research on physical layer security technology in 5G communication[J]. Radio Communications Technology, 2020, 46 (2): 150- 158.
|
14 |
WANG K , YUAN L , MIYAZAKI T , et al. Jamming and eavesdropping defense in green cyber-physical transportation systems using a Stackelberg game[J]. IEEE Trans.on Industrial Informatics, 2018, 14 (9): 4232- 4242.
doi: 10.1109/TII.2018.2841033
|
15 |
JIA L L , YAO F Q , SUN Y M , et al. Bayesian Stackelberg game for antijamming transmission with incomplete information[J]. IEEE Communications Letters, 2016, 20 (10): 1991- 1994.
doi: 10.1109/LCOMM.2016.2598808
|
16 |
HU L , WEN H , WU B , et al. Cooperative jamming for physical layer security enhancement in internet of things[J]. IEEE Internet of Things Journal, 2018, 5 (1): 219- 228.
doi: 10.1109/JIOT.2017.2778185
|
17 |
ROMERO E , BLESA J , ARAUJO A . An adaptive energy aware strategy based on game theory to add privacy in the physical layer for cognitive WSNs[J]. Ad Hoc Networks, 2019, 92, 101800.
doi: 10.1016/j.adhoc.2018.10.026
|
18 |
HUANG S C , HUANG X J , CHEN W W , et al. Physical layer security of vehicular networks with cooperative jamming helpers[J]. Physical Communication, 2022, 53, 101762.
doi: 10.1016/j.phycom.2022.101762
|
19 |
TANG J C , CHEN G J , COON J P . Secrecy performance analysis of wireless communications in the presence of UAV jammer and randomly located UAV eavesdroppers[J]. IEEE Trans.on Information Forensics and Security, 2019, 14 (11): 3026- 3041.
doi: 10.1109/TIFS.2019.2912074
|
20 |
裔传俊, 刘亮. 链路质量感知的无线传感器网络生命最大化算法[J]. 计算机应用研究, 2016, 33 (11): 3411- 3416.
|
|
YI C J , LIU L . Link quality-aware algorithms for maximizing lifetime in wireless sensor networks[J]. Application Research of Computers, 2016, 33 (11): 3411- 3416.
|
21 |
JIA L L , YAO F Q , SUN Y M , et al. Bayesian Stackelberg game for antijamming transmission with incomplete information[J]. IEEE Communications Letters, 2016, 20 (10): 1991- 1994.
doi: 10.1109/LCOMM.2016.2598808
|
22 |
WANG Q , CHEN Z , MEI W D , et al. Improving physical layer security using UAV-enabled mobile relaying[J]. IEEE Wireless Communications Letters, 2017, 6 (3): 310- 313.
doi: 10.1109/LWC.2017.2680449
|
23 |
LEUNG-YAN-CHEONG S , HELLMAN M . The Gaussian wire-tap channel[J]. IEEE Trans.on Information Theory, 1978, 24 (4): 451- 456.
doi: 10.1109/TIT.1978.1055917
|
24 |
WU R J , VANGORDER R A . Nonlinear dynamics of discrete time multi level leader-follower games[J]. Applied Mathematics and Computation, 2018, 320, 240- 250.
doi: 10.1016/j.amc.2017.09.034
|
25 |
GUPTA R , GUPTA J . Future generation communications with game strategies: a comprehensive survey[J]. Computer Communications, 2022, 192, 1- 32.
doi: 10.1016/j.comcom.2022.05.024
|
26 |
SUMA S , BHARATI H . An optimized routing scheme for congestion avoidance using mobile nodes in wireless sensor network[J]. Sensors, 2022, 24, 100457.
|
27 |
CHETTRI L , BERA R . A comprehensive survey on internet of things (IoT) toward 5G wireless systems[J]. IEEE Internet of Things Journal, 2020, 7 (1): 16- 32.
doi: 10.1109/JIOT.2019.2948888
|
28 |
ZHANG X B , WANG H , XU Y F , et al. Put others before itself: a multi-leader one-follower anti-jamming Stackelberg game against tracking jammer[J]. China Communications, 2021, 18 (11): 168- 181.
doi: 10.23919/JCC.2021.11.012
|
29 |
BHUVANA S D , JAICHANDRAN R , BHARATHI P S , et al. The defense against jamming attack in cognitive radio networks: energy efficiency management perspective[J]. Microprocessors and Microsystems, 2021, 82, 103816.
doi: 10.1016/j.micpro.2020.103816
|
30 |
DUAN B W, CAI Y M, ZHENG J C, et al. Cooperative jammer power allocation—a nash bargaining solution method[C]//Proc. of the International Conference on Wireless Communications & Signal Processing, 2015.
|