A journal of IEEE and CAA , publishes high-quality papers in English on original theoretical/experimental research and development in all areas of automation
Volume 10 Issue 10
Oct.  2023

IEEE/CAA Journal of Automatica Sinica

  • JCR Impact Factor: 11.8, Top 4% (SCI Q1)
    CiteScore: 17.6, Top 3% (Q1)
    Google Scholar h5-index: 77, TOP 5
Turn off MathJax
Article Contents
H. Zhang, J. W. Sun, X. Wang, and C. L. Gong, “Achieving physical layer security against location unknown eavesdroppers via friendly jammer,” IEEE/CAA J. Autom. Sinica, vol. 10, no. 10, pp. 2038–2040, Oct. 2023. doi: 10.1109/JAS.2023.123258
Citation: H. Zhang, J. W. Sun, X. Wang, and C. L. Gong, “Achieving physical layer security against location unknown eavesdroppers via friendly jammer,” IEEE/CAA J. Autom. Sinica, vol. 10, no. 10, pp. 2038–2040, Oct. 2023. doi: 10.1109/JAS.2023.123258

Achieving Physical Layer Security Against Location Unknown Eavesdroppers via Friendly Jammer

doi: 10.1109/JAS.2023.123258
More Information
  • loading
  • [1]
    J. Chen, J. Sun, and G. Wang, “From unmanned systems to autonomous intelligent systems,” Engineering, vol. 12, pp. 16–19, 2022. doi: 10.1016/j.eng.2021.10.007
    [2]
    Z. Zuo, C. Liu, Q.-L. Han, and J. Song, “Unmanned aerial vehicles: Control methods and future challenges,” IEEE/CAA J. Autom. Sinica, vol. 9, no. 4, pp. 601–614, 2022. doi: 10.1109/JAS.2022.105410
    [3]
    H. Zhang and W. X. Zheng, “Denial-of-service power dispatch against linear quadratic control via a fading channel,” IEEE Trans. Autom. Control, vol. 63, no. 9, pp. 3032–3039, 2018. doi: 10.1109/TAC.2018.2789479
    [4]
    H. Zhang, Y. Qi, J. Wu, L. Fu, and L. He, “DoS attack energy management against remote state estimation,” IEEE Trans. Control Netw. Syst., vol. 5, no. 1, pp. 383–394, 2018. doi: 10.1109/TCNS.2016.2614099
    [5]
    M. Liu, C. Zhao, Z. Zhang, R. Deng, P. Cheng, and J. Chen, “Converter-based moving target defense against deception attacks in DC microgrids,” IEEE Trans. Smart Grid, vol. 13, pp. 3984–3996, 2021.
    [6]
    Y. Zhu, H. Zhang, H. Li, J. Zhang, and D. Zhang, “Optimal jamming strategy against two-state switched system,” IEEE Commun. Lett., vol. 26, no. 3, pp. 706–710, 2022. doi: 10.1109/LCOMM.2022.3142080
    [7]
    J. Wang, C. Jiang, Z. Han, Y. Ren, R. G. Maunder, and L. Hanzo, “Taking drones to the next level: Cooperative distributed unmanned-aerial-vehicular networks for small and mini drones,” IEEE Veh. Technol. Mag., vol. 12, no. 3, pp. 73–82, 2017. doi: 10.1109/MVT.2016.2645481
    [8]
    H. Tran and C. So-In, “Enhanced intrusion detection system for an EH IoT architecture using a cooperative UAV relay and friendly UAV jammer,” IEEE/CAA J. Autom. Sinica, vol. 8, no. 11, pp. 1786–1799, 2021. doi: 10.1109/JAS.2021.1004171
    [9]
    H. El Hammouti, D. Hamza, B. Shihada, M.-S. Alouini, and J. S. Shamma, “The optimal and the greedy: Drone association and positioning schemes for internet of UAVs,” IEEE Internet Things J., vol. 8, no. 18, pp. 14066–14079, 2021. doi: 10.1109/JIOT.2021.3070209
    [10]
    Y. Zhou, P. L. Yeoh, H. Chen, Y. Li, R. Schober, L. Zhuo, and B. Vucetic, “Improving physical layer security via a UAV friendly jammer for unknown eavesdropper location,” IEEE Trans. Veh. Technol., vol. 67, no. 11, pp. 11280–11284, 2018. doi: 10.1109/TVT.2018.2868944
    [11]
    X. Zhou, Q. Wu, S. Yan, F. Shu, and J. Li, “UAV-enabled secure communications: Joint trajectory and transmit power optimization,” IEEE Trans. Veh. Technol., vol. 68, no. 4, pp. 4069–4073, 2019. doi: 10.1109/TVT.2019.2900157
    [12]
    A. Al-Hourani, S. Kandeepan, and S. Lardner, “Optimal lap altitude for maximum coverage,” IEEE Wireless Commun. Lett., vol. 3, no. 6, pp. 569–572, 2014. doi: 10.1109/LWC.2014.2342736

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(5)

    Article Metrics

    Article views (172) PDF downloads(41) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return