{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,13]],"date-time":"2026-05-13T06:40:09Z","timestamp":1778654409710,"version":"3.51.4"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2018,5,10]],"date-time":"2018-05-10T00:00:00Z","timestamp":1525910400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1007\/s11276-018-1732-1","type":"journal-article","created":{"date-parts":[[2018,5,10]],"date-time":"2018-05-10T03:45:33Z","timestamp":1525923933000},"page":"4077-4095","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Friendship-based cooperative jamming for secure communication in Poisson networks"],"prefix":"10.1007","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3248-5909","authenticated-orcid":false,"given":"Yuanyu","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Yulong","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Xiaohong","family":"Jiang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,10]]},"reference":[{"issue":"12","key":"1732_CR1","doi-asserted-by":"publisher","first-page":"2130","DOI":"10.1109\/JPROC.2011.2169033","volume":"99","author":"N Kayastha","year":"2011","unstructured":"Kayastha, N., Niyato, D., Ping Wang, & Hossain, E. (2011). Applications, architectures, and protocol design issues for mobile social networks: A survey. Proceedings of the IEEE, 99(12), 2130\u20132158.","journal-title":"Proceedings of the IEEE"},{"issue":"4","key":"1732_CR2","doi-asserted-by":"publisher","first-page":"1989","DOI":"10.1109\/TNET.2015.2437955","volume":"24","author":"Y Qin","year":"2016","unstructured":"Qin, Y., Jia, R., Zhang, J., Wu, W., & Wang, X. (2016). Impact of social relation and group size in multicast ad hoc networks. IEEE\/ACM Transactions on Networking, 24(4), 1989\u20132004.","journal-title":"IEEE\/ACM Transactions on Networking"},{"issue":"1","key":"1732_CR3","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1109\/TWC.2014.2334661","volume":"14","author":"Y Zhang","year":"2015","unstructured":"Zhang, Y., Pan, E., Song, L., Saad, W., Dawy, Z., & Han, Z. (2015). Social network aware device-to-device communication in wireless networks. IEEE Transactions on Wireless Communications, 14(1), 177\u2013190.","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"6","key":"1732_CR4","doi-asserted-by":"publisher","first-page":"1189","DOI":"10.1109\/TMC.2014.2347052","volume":"14","author":"X Chen","year":"2015","unstructured":"Chen, X., & Huang, J. (2015). Imitation-based social spectrum sharing. IEEE Transactions on Mobile Computing, 14(6), 1189\u20131202.","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"3","key":"1732_CR5","doi-asserted-by":"publisher","first-page":"904","DOI":"10.1109\/JSYST.2013.2281262","volume":"9","author":"F Xia","year":"2015","unstructured":"Xia, F., Liu, L., Li, J., Ma, J., & Vasilakos, A. V. (2015). Socially aware networking: A survey. IEEE Systems Journal, 9(3), 904\u2013921.","journal-title":"IEEE Systems Journal"},{"issue":"2","key":"1732_CR6","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1109\/MWC.2011.5751298","volume":"18","author":"Y-S Shiu","year":"2011","unstructured":"Shiu, Y.-S., Chang, S. Y., Wu, H.-C., Huang, S. C. H., & Chen, H.-H. (2011). Physical layer security in wireless networks: A tutorial. IEEE Wireless Communications, 18(2), 66\u201374.","journal-title":"IEEE Wireless Communications"},{"issue":"1","key":"1732_CR7","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/MWC.2014.6757895","volume":"21","author":"X Liang","year":"2014","unstructured":"Liang, X., Zhang, K., Shen, X., & Lin, X. (2014). Security and privacy in mobile social networks: Challenges and solutions. IEEE Wireless Communications, 21(1), 33\u201341.","journal-title":"IEEE Wireless Communications"},{"issue":"5","key":"1732_CR8","doi-asserted-by":"publisher","first-page":"623","DOI":"10.1007\/s11036-015-0605-4","volume":"20","author":"T Hayajneh","year":"2015","unstructured":"Hayajneh, T., Almashaqbeh, G., & Ullah, S. (2015). A green approach for selfish misbehavior detection in 802.11-based wireless networks. Mobile Networks and Applications, 20(5), 623\u2013635.","journal-title":"Mobile Networks and Applications"},{"issue":"8","key":"1732_CR9","doi-asserted-by":"publisher","first-page":"2165","DOI":"10.1007\/s11276-014-0736-8","volume":"20","author":"T Hayajneh","year":"2014","unstructured":"Hayajneh, T., Almashaqbeh, G., Ullah, S., & Vasilakos, A. V. (2014). A survey of wireless technologies coexistence in WBAN: Analysis and open research issues. Wireless Networks, 20(8), 2165\u20132199.","journal-title":"Wireless Networks"},{"key":"1732_CR10","doi-asserted-by":"crossref","unstructured":"Hayajneh, T., Krishnamurthy, P., Tipper, D., & Kim, T. (2009). Detecting malicious packet dropping in the presence of collisions and channel errors in wireless ad hoc networks. In IEEE International Conference on Communications, 2009. ICC\u201909 (pp. 1\u20136). IEEE.","DOI":"10.1109\/ICC.2009.5198910"},{"key":"1732_CR11","doi-asserted-by":"crossref","unstructured":"Panyim, K., Hayajneh, T., Krishnamurthy, P., & Tipper, D. (2009). On limited-range strategic\/random jamming attacks in wireless ad hoc networks. In IEEE 34th Conference on Local Computer Networks, 2009. LCN 2009 (pp. 922\u2013929). IEEE.","DOI":"10.1109\/LCN.2009.5355041"},{"key":"1732_CR12","volume-title":"Cryptography and network security: Principles and practice","author":"W Stallings","year":"2010","unstructured":"Stallings, W. (2010). Cryptography and network security: Principles and practice (5th ed.). Upper Saddle River: Prentice Hall.","edition":"5"},{"key":"1732_CR13","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1016\/j.jnca.2015.09.001","volume":"58","author":"BJ Mohd","year":"2015","unstructured":"Mohd, B. J., Hayajneh, T., & Vasilakos, A. V. (2015). A survey on lightweight block ciphers for low-resource devices. Journal of Network and Computer Applications, 58, 73\u201393.","journal-title":"Journal of Network and Computer Applications"},{"key":"1732_CR14","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511977985","volume-title":"Physical-layer security: From information theory to security engineering","author":"M Bloch","year":"2011","unstructured":"Bloch, M., & Barros, J. (2011). Physical-layer security: From information theory to security engineering. Cambridge: Cambridge University Press."},{"issue":"3","key":"1732_CR15","doi-asserted-by":"publisher","first-page":"1550","DOI":"10.1109\/SURV.2014.012314.00178","volume":"16","author":"A Mukherjee","year":"2014","unstructured":"Mukherjee, A., Fakoorian, S. A. A., Huang, J., & Swindlehurst, A. L. (2014). Principles of physical layer security in multiuser wireless networks: A survey. IEEE Communications Surveys & Tutorials, 16(3), 1550\u20131573.","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"4","key":"1732_CR16","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MCOM.2015.7081071","volume":"53","author":"N Yang","year":"2015","unstructured":"Yang, N., Wang, L., Geraci, G., Elkashlan, M., Yuan, J., & Di Renzo, M. (2015). Safeguarding 5G wireless communication networks using physical layer security. IEEE Communications Magazine, 53(4), 20\u201327.","journal-title":"IEEE Communications Magazine"},{"key":"1732_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.comcom.2015.02.012","volume":"63","author":"L Wang","year":"2015","unstructured":"Wang, L., Cao, C., & Huaqing, W. (2015). Secure inter-cluster communications with cooperative jamming against social outcasts. Computer Communications, 63, 1\u201310.","journal-title":"Computer Communications"},{"issue":"2","key":"1732_CR18","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1109\/TSC.2015.2478453","volume":"11","author":"Y Zhang","year":"2018","unstructured":"Zhang, Y., Shen, Y., Wang, H., Zhang, Y., & Jiang, X. (2018). On secure wireless communications for service oriented computing. IEEE Transactions on Services Computing, 11(2), 318\u2013328.","journal-title":"IEEE Transactions on Services Computing"},{"issue":"3","key":"1732_CR19","doi-asserted-by":"publisher","first-page":"1281","DOI":"10.1109\/TASE.2015.2497663","volume":"13","author":"Y Zhang","year":"2016","unstructured":"Zhang, Y., Shen, Y., Wang, H., Yong, J., & Jiang, X. (2016). On secure wireless communications for loT under eavesdropper collusion. IEEE Transactions on Automation Science and Engineering, 13(3), 1281\u20131293.","journal-title":"IEEE Transactions on Automation Science and Engineering"},{"issue":"10","key":"1732_CR20","doi-asserted-by":"publisher","first-page":"1790","DOI":"10.1109\/LCOMM.2015.2462826","volume":"19","author":"L Tang","year":"2015","unstructured":"Tang, L., Chen, H., & Li, Q. (2015). Social tie based cooperative jamming for physical layer security. IEEE Communications Letters, 19(10), 1790\u20131793.","journal-title":"IEEE Communications Letters"},{"key":"1732_CR21","doi-asserted-by":"crossref","unstructured":"Kleinberg, J. (2000). The small-world phenomenon: An algorithmic perspective. In Proceedings of the Thirty-second Annual ACM Symposium on Theory of Computing, STOC \u201900 (pp. 163\u2013170).","DOI":"10.1145\/335305.335325"},{"issue":"1","key":"1732_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/0022250X.2011.629062","volume":"38","author":"H Inaltekin","year":"2014","unstructured":"Inaltekin, H., Chiang, M., & Poor, H. V. (2014). Delay of social search on small-world graphs. The Journal of Mathematical Sociology, 38(1), 1\u201346.","journal-title":"The Journal of Mathematical Sociology"},{"issue":"2","key":"1732_CR23","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1561\/1300000015","volume":"3","author":"M Haenggi","year":"2009","unstructured":"Haenggi, M., & Ganti, R. K. (2009). Interference in large wireless networks. Foundations and Trends in Networking, 3(2), 127\u2013248.","journal-title":"Foundations and Trends\u00ae in Networking"},{"issue":"1","key":"1732_CR24","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1109\/TIFS.2011.2165946","volume":"7","author":"PC Pinto","year":"2012","unstructured":"Pinto, P. C., Barros, J., & Win, M. Z. (2012). Secure communication in stochastic wireless networks\u2014Part I: Connectivity. IEEE Transactions on Information Forensics and Security, 7(1), 125\u2013138.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"1","key":"1732_CR25","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1109\/TIFS.2011.2165947","volume":"7","author":"PC Pinto","year":"2012","unstructured":"Pinto, P. C., Barros, J., & Win, M. Z. (2012). Secure communication in stochastic wireless networks\u2014Part II: Maximum rate and collusion. Information Forensics and Security, 7(1), 139\u2013147.","journal-title":"Information Forensics and Security"},{"issue":"1","key":"1732_CR26","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/TNET.2013.2297339","volume":"23","author":"A Rabbachin","year":"2015","unstructured":"Rabbachin, A., Conti, A., & Win, M. Z. (2015). Wireless network intrinsic secrecy. IEEE\/ACM Transactions on Networking, 23(1), 56\u201369.","journal-title":"IEEE\/ACM Transactions on Networking"},{"issue":"8","key":"1732_CR27","doi-asserted-by":"publisher","first-page":"2764","DOI":"10.1109\/TWC.2011.061511.102257","volume":"10","author":"X Zhou","year":"2011","unstructured":"Zhou, X., Ganti, R. K., Andrews, J. G., & Hjorungnes, A. (2011). On the throughput cost of physical layer security in decentralized wireless networks. IEEE Transactions on Wireless Communications, 10(8), 2764\u20132775.","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"6","key":"1732_CR28","doi-asserted-by":"publisher","first-page":"2776","DOI":"10.1109\/TWC.2013.041713.120865","volume":"12","author":"H Wang","year":"2013","unstructured":"Wang, H., Zhou, X., & Reed, M. C. (2013). Physical layer security in cellular networks: A stochastic geometry approach. IEEE Transactions on Wireless Communications, 12(6), 2776\u20132787.","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"6","key":"1732_CR29","doi-asserted-by":"publisher","first-page":"2006","DOI":"10.1109\/TCOMM.2014.2314664","volume":"62","author":"G Geraci","year":"2014","unstructured":"Geraci, G., Dhillon, H. S., Andrews, J. G., Yuan, J., & Collings, I. B. (2014). Physical layer security in downlink multi-antenna cellular networks. IEEE Transactions on Communications, 62(6), 2006\u20132021.","journal-title":"IEEE Transactions on Communications"},{"issue":"1","key":"1732_CR30","first-page":"229","volume":"63","author":"C Ma","year":"2015","unstructured":"Ma, C., Liu, J., Tian, X., Hui, Y., Cui, Y., & Wang, X. (2015). Interference exploitation in D2D-enabled cellular networks: A secrecy perspective. IEEE Transactions on Communications, 63(1), 229\u2013242.","journal-title":"IEEE Transactions on Communications"},{"issue":"2","key":"1732_CR31","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1109\/TIFS.2015.2500178","volume":"11","author":"X Xu","year":"2016","unstructured":"Xu, X., He, B., Yang, W., Zhou, X., & Cai, Y. (2016). Secure transmission design for cognitive radio networks with poisson distributed eavesdroppers. IEEE Transactions on Information Forensics and Security, 11(2), 373\u2013387.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"1732_CR32","doi-asserted-by":"crossref","unstructured":"Liu, Y., Wang, L., Zaidi, S. A. R., Elkashlan, M., & Duong, T. Q. (2015). Secure D2D communication in large-scale cognitive cellular networks with wireless power transfer. In 2015 IEEE International Conference on Communications (ICC) (pp. 4309\u20134314).","DOI":"10.1109\/ICC.2015.7249000"},{"issue":"3","key":"1732_CR33","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1109\/LCOMM.2011.011811.102433","volume":"15","author":"X Zhou","year":"2011","unstructured":"Zhou, X., McKay, M. R., Maham, B., & Hjrungnes, A. (2011). Rethinking the secrecy outage formulation: A secure transmission design perspective. IEEE Communications Letters, 15(3), 302\u2013304.","journal-title":"IEEE Communications Letters"},{"key":"1732_CR34","volume-title":"Wireless communications: Principles and practice","author":"T Rappaport","year":"2001","unstructured":"Rappaport, T. (2001). Wireless communications: Principles and practice (2nd ed.). Upper Saddle River: Prentice Hall.","edition":"2"},{"key":"1732_CR35","unstructured":"Cho, E., Myers, S. A., & Leskovec, J. (2011). Friendship and mobility: User movement in location-based social networks. In Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD \u201911 (pp. 1082\u20131090). New York: ACM."},{"issue":"8","key":"1732_CR36","doi-asserted-by":"publisher","first-page":"4265","DOI":"10.1109\/TWC.2015.2418316","volume":"14","author":"N Zhang","year":"2015","unstructured":"Zhang, N., Cheng, N., Lu, N., Zhang, X., Mark, J. W., & Shen, X. (2015). Partner selection and incentive mechanism for physical layer security. IEEE Transactions on Wireless Communications, 14(8), 4265\u20134276.","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"1732_CR37","doi-asserted-by":"publisher","DOI":"10.1002\/9781118658222","volume-title":"Stochastic geometry and its applications","author":"SN Chiu","year":"2013","unstructured":"Chiu, S. N., Stoyan, D., Kendall, W. S., & Mecke, J. (2013). Stochastic geometry and its applications (3rd ed.). Hoboken: Wiley.","edition":"3"},{"key":"1732_CR38","unstructured":"C++ simulator for friendship-based cooperative jamming in Poisson networks. \n                    http:\/\/mdlval.blogspot.jp\/2016\/01\/c-simulator-for-friendship-based.html\n                    \n                  ."},{"issue":"4","key":"1732_CR39","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/MWC.2016.7553029","volume":"23","author":"B Bai","year":"2016","unstructured":"Bai, B., Wang, L., Han, Z., Chen, W., & Svensson, T. (2016). Caching based socially-aware D2D communications in wireless content delivery networks: A hypergraph framework. IEEE Wireless Communications, 23(4), 74\u201381.","journal-title":"IEEE Wireless Communications"},{"key":"1732_CR40","doi-asserted-by":"publisher","first-page":"3907","DOI":"10.1109\/ACCESS.2016.2600526","volume":"4","author":"J Wang","year":"2016","unstructured":"Wang, J., Jiang, C., Quek, T. Q. S., Wang, X., & Ren, Y. (2016). The value strength aided information diffusion in socially-aware mobile networks. IEEE Access, 4, 3907\u20133919.","journal-title":"IEEE Access"},{"key":"1732_CR41","doi-asserted-by":"crossref","unstructured":"Zhang, K., Wang, J., Jiang, C., Chen, K. C., & Ren, Y. (2017). Asymmetric normalization aided information diffusion for socially-aware mobile networks. In 2017 IEEE International Conference on Communications (ICC) (pp. 1\u20136).","DOI":"10.1109\/ICC.2017.7997221"},{"key":"1732_CR42","volume-title":"Table of integrals, series and products","author":"IS Gradshteyn","year":"2000","unstructured":"Gradshteyn, I. S., & Ryzhik, I. M. (2000). Table of integrals, series and products (6th ed.). New York: Academic Press.","edition":"6"},{"key":"1732_CR43","unstructured":"Tanbourgi, R., J\u00e4kel, H., & Jondral, F. K. (2012). Interference in Poisson networks with isotropically distributed nodes. arXiv preprint \n                    arXiv:1211.4755\n                    \n                  ."}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-018-1732-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11276-018-1732-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-018-1732-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,30]],"date-time":"2019-10-30T18:26:00Z","timestamp":1572459960000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11276-018-1732-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,10]]},"references-count":43,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2019,10]]}},"alternative-id":["1732"],"URL":"https:\/\/doi.org\/10.1007\/s11276-018-1732-1","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"value":"1022-0038","type":"print"},{"value":"1572-8196","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,5,10]]},"assertion":[{"value":"10 May 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}