{"id":"https://openalex.org/W2766889259","doi":"https://doi.org/10.1109/mwc.2017.1700015","title":"Jamming Strategies for Physical Layer Security","display_name":"Jamming Strategies for Physical Layer Security","publication_year":2017,"publication_date":"2017-10-27","ids":{"openalex":"https://openalex.org/W2766889259","doi":"https://doi.org/10.1109/mwc.2017.1700015","mag":"2766889259"},"language":"en","primary_location":{"id":"doi:10.1109/mwc.2017.1700015","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mwc.2017.1700015","pdf_url":null,"source":{"id":"https://openalex.org/S146764194","display_name":"IEEE Wireless Communications","issn_l":"1536-1284","issn":["1536-1284","1558-0687"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Wireless Communications","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5049709192","display_name":"Yan Huo","orcid":"https://orcid.org/0000-0003-0647-1009"},"institutions":[{"id":"https://openalex.org/I21193070","display_name":"Beijing Jiaotong University","ror":"https://ror.org/01yj56c84","country_code":"CN","type":"education","lineage":["https://openalex.org/I21193070"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yan Huo","raw_affiliation_strings":["Beijing Jiaotong University"],"affiliations":[{"raw_affiliation_string":"Beijing Jiaotong University","institution_ids":["https://openalex.org/I21193070"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000641851","display_name":"Yuqi Tian","orcid":null},"institutions":[{"id":"https://openalex.org/I21193070","display_name":"Beijing Jiaotong University","ror":"https://ror.org/01yj56c84","country_code":"CN","type":"education","lineage":["https://openalex.org/I21193070"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuqi Tian","raw_affiliation_strings":["Beijing Jiaotong University"],"affiliations":[{"raw_affiliation_string":"Beijing Jiaotong University","institution_ids":["https://openalex.org/I21193070"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037484949","display_name":"Liran Ma","orcid":"https://orcid.org/0000-0002-1003-1770"},"institutions":[{"id":"https://openalex.org/I128956969","display_name":"Texas Christian University","ror":"https://ror.org/054b0b564","country_code":"US","type":"education","lineage":["https://openalex.org/I128956969"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Liran Ma","raw_affiliation_strings":["Texas Christian University"],"affiliations":[{"raw_affiliation_string":"Texas Christian University","institution_ids":["https://openalex.org/I128956969"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100692488","display_name":"Xiuzhen Cheng","orcid":"https://orcid.org/0000-0001-5912-4647"},"institutions":[{"id":"https://openalex.org/I193531525","display_name":"George Washington University","ror":"https://ror.org/00y4zzh67","country_code":"US","type":"education","lineage":["https://openalex.org/I193531525"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xiuzhen Cheng","raw_affiliation_strings":["The George Washington University"],"affiliations":[{"raw_affiliation_string":"The George Washington University","institution_ids":["https://openalex.org/I193531525"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5080987681","display_name":"Tao Jing","orcid":"https://orcid.org/0000-0001-5277-1729"},"institutions":[{"id":"https://openalex.org/I21193070","display_name":"Beijing Jiaotong University","ror":"https://ror.org/01yj56c84","country_code":"CN","type":"education","lineage":["https://openalex.org/I21193070"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tao Jing","raw_affiliation_strings":["Beijing Jiaotong University"],"affiliations":[{"raw_affiliation_string":"Beijing Jiaotong University","institution_ids":["https://openalex.org/I21193070"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5049709192"],"corresponding_institution_ids":["https://openalex.org/I21193070"],"apc_list":null,"apc_paid":null,"fwci":8.4476,"has_fulltext":false,"cited_by_count":117,"citation_normalized_percentile":{"value":0.98104549,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"25","issue":"1","first_page":"148","last_page":"153"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.991599977016449,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.988099992275238,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/jamming","display_name":"Jamming","score":0.889565110206604},{"id":"https://openalex.org/keywords/physical-layer","display_name":"Physical layer","score":0.8644654750823975},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8150734305381775},{"id":"https://openalex.org/keywords/provisioning","display_name":"Provisioning","score":0.6596938371658325},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6262387037277222},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.5268558263778687},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5205293893814087},{"id":"https://openalex.org/keywords/layer","display_name":"Layer (electronics)","score":0.44102755188941956},{"id":"https://openalex.org/keywords/complement","display_name":"Complement (music)","score":0.4222482442855835},{"id":"https://openalex.org/keywords/physical-security","display_name":"Physical security","score":0.4213572144508362},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.41612130403518677},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.2659454345703125}],"concepts":[{"id":"https://openalex.org/C2779079576","wikidata":"https://www.wikidata.org/wiki/Q17092823","display_name":"Jamming","level":2,"score":0.889565110206604},{"id":"https://openalex.org/C19247436","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"Physical layer","level":3,"score":0.8644654750823975},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8150734305381775},{"id":"https://openalex.org/C172191483","wikidata":"https://www.wikidata.org/wiki/Q1071806","display_name":"Provisioning","level":2,"score":0.6596938371658325},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6262387037277222},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.5268558263778687},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5205293893814087},{"id":"https://openalex.org/C2779227376","wikidata":"https://www.wikidata.org/wiki/Q6505497","display_name":"Layer (electronics)","level":2,"score":0.44102755188941956},{"id":"https://openalex.org/C112313634","wikidata":"https://www.wikidata.org/wiki/Q7886648","display_name":"Complement (music)","level":5,"score":0.4222482442855835},{"id":"https://openalex.org/C2776157020","wikidata":"https://www.wikidata.org/wiki/Q851598","display_name":"Physical security","level":2,"score":0.4213572144508362},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.41612130403518677},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.2659454345703125},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C127716648","wikidata":"https://www.wikidata.org/wiki/Q104053","display_name":"Phenotype","level":3,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C178790620","wikidata":"https://www.wikidata.org/wiki/Q11351","display_name":"Organic chemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C188082640","wikidata":"https://www.wikidata.org/wiki/Q1780899","display_name":"Complementation","level":4,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/mwc.2017.1700015","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mwc.2017.1700015","pdf_url":null,"source":{"id":"https://openalex.org/S146764194","display_name":"IEEE Wireless Communications","issn_l":"1536-1284","issn":["1536-1284","1558-0687"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Wireless Communications","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Partnerships for the goals","id":"https://metadata.un.org/sdg/17","score":0.41999998688697815}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W1973488415","https://openalex.org/W2013605702","https://openalex.org/W2032915554","https://openalex.org/W2072487832","https://openalex.org/W2080147975","https://openalex.org/W2085616549","https://openalex.org/W2088250588","https://openalex.org/W2111142436","https://openalex.org/W2116892602","https://openalex.org/W2129132793","https://openalex.org/W2133108373","https://openalex.org/W2296556513","https://openalex.org/W2313096159","https://openalex.org/W2535351647","https://openalex.org/W2963206535"],"related_works":["https://openalex.org/W2972424885","https://openalex.org/W2104478100","https://openalex.org/W2107866095","https://openalex.org/W1680452241","https://openalex.org/W2097805107","https://openalex.org/W2051457655","https://openalex.org/W2561179371","https://openalex.org/W3092569272","https://openalex.org/W2551856726","https://openalex.org/W3193292754"],"abstract_inverted_index":{"This":[0],"article":[1],"provides":[2],"a":[3,18,31,68],"comprehensive":[4],"overview":[5],"on":[6],"jamming":[7,48,84,106],"strategies":[8,85],"in":[9,96],"the":[10,43,55,59,72,92,102],"physical":[11,24,44,76],"layer":[12,25,45,77],"for":[13,61],"securing":[14],"wireless":[15],"communications.":[16],"As":[17],"complement":[19],"to":[20,53,71,111],"traditional":[21],"cryptography-based":[22],"approaches,":[23],"based":[26],"security":[27,46,78],"provisioning":[28],"techniques":[29],"offer":[30],"number":[32],"of":[33,58,75,105],"promising":[34],"features":[35],"that":[36,107],"have":[37],"not":[38],"been":[39],"previously":[40],"available.":[41],"Among":[42],"techniques,":[47],"is":[49],"an":[50],"effective":[51],"way":[52],"degrade":[54],"channel":[56],"quality":[57],"eavesdroppers":[60],"ensuring":[62],"security.":[63],"We":[64],"start":[65],"by":[66],"giving":[67],"brief":[69],"introduction":[70],"fundamental":[73],"principles":[74],"and":[79,90],"jamming.":[80],"Then":[81],"we":[82,100],"classify":[83],"from":[86],"three":[87],"different":[88],"perspectives":[89],"explain":[91],"major":[93],"related":[94],"designs":[95],"various":[97],"scenarios.":[98],"Finally,":[99],"discuss":[101],"open":[103],"issues":[104],"can":[108],"be":[109],"helpful":[110],"foster":[112],"future":[113],"research.":[114]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":9},{"year":2023,"cited_by_count":10},{"year":2022,"cited_by_count":14},{"year":2021,"cited_by_count":17},{"year":2020,"cited_by_count":19},{"year":2019,"cited_by_count":28},{"year":2018,"cited_by_count":11}],"updated_date":"2026-03-24T08:02:53.985720","created_date":"2025-10-10T00:00:00"}
