| 1 | 
																						 
											   FAUZIA I ,  MUDASSAR A ,  MUHAMMAD N , et al.  Physical layer security for beyond 5G/6G networks: emerging technologies and future directions[J]. Journal of Network and Computer Applications, 2022, 206, 103431. 
											 												 
																									doi: 10.1016/j.jnca.2022.103431
																																			 											 | 
										
																													
																						| 2 | 
																						 
											  孙子文, 徐宜敏.  无线传感器网络的混合抗干扰攻击方法[J]. 系统工程与电子技术, 2019, 41 (9): 2132- 2140. 
											 												 
																									doi: 10.3969/j.issn.1001-506X.2019.09.29
																																			 											 | 
										
																													
																						 | 
																						 
											   SUN Z W ,  XU Y M .  Hybrid anti-jamming attack method for wireless sensor networks[J]. Systems Engineering and Electronics, 2019, 41 (9): 2132- 2140. 
											 												 
																									doi: 10.3969/j.issn.1001-506X.2019.09.29
																																			 											 | 
										
																													
																						| 3 | 
																						 
											   SALAM H A ,  KHAN B M .  IWSN-standards, challenges and future[J]. IEEE Potentials, 2016, 35 (2): 9- 16. 
											 												 
																									doi: 10.1109/MPOT.2015.2422931
																																			 											 | 
										
																													
																						| 4 | 
																						 
											   SU Y S ,  LIU Y ,  FAN R , et al.  A secure relay selection scheme based on cooperative jamming for underwater acoustic sensor networks[J]. Computer Networks, 2022, 217, 109307. 
											 												 
																									doi: 10.1016/j.comnet.2022.109307
																																			 											 | 
										
																													
																						| 5 | 
																						 
											   DARSENA D ,  GELLI G ,  IUDICE I , et al.  Detection and blind channel estimation for UAV-aided wireless sensor networks in smart cities under mobile jamming attack[J]. IEEE Internet of Things Journal, 2022, 9 (14): 11932- 11950. 
											 												 
																									doi: 10.1109/JIOT.2021.3132381
																																			 											 | 
										
																													
																						| 6 | 
																						 
											   HAN H Z ,  HUANG Y C ,  HU H , et al.  Mobile jammer enabled secure UAV communication with short packet transmission[J]. AEU-International Journal of Electronics and Communications, 2022, 157, 154434.
											 											 | 
										
																													
																						| 7 | 
																						 
											   SHEN D Q ,  HUO Y ,  GAO Q H .  A friendly jamming handover scheme for a conscious mobile eavesdropper in IoT systems[J]. Procedia Computer Science, 2022, 202, 15- 20. 
											 												 
																									doi: 10.1016/j.procs.2022.04.003
																																			 											 | 
										
																													
																						| 8 | 
																						 
											   ZHANG T Y ,  WEN H ,  TANG J , et al.  Cooperative jamming secure scheme for IWNs random mobile users aided by edge computing intelligent node selection[J]. IEEE Trans.on Industrial Informatics, 2021, 7 (17): 4999- 5009.
											 											 | 
										
																													
																						| 9 | 
																						 
											   DHRMARAJ B S ,  JAICHANDRAN R ,  BHARATHI P S , et al.  The defense against jamming attack in cognitive radio networks: energy efficiency management perspective[J]. Microprocessors and Microsystems, 2021, 82, 103816. 
											 												 
																									doi: 10.1016/j.micpro.2020.103816
																																			 											 | 
										
																													
																						| 10 | 
																						 
											   ALSULAMI B S ,  BAJRACHARYA C ,  RAWAT D B .  Game theory-based attack and defense analysis in virtual wireless networks with jammers and eavesdroppers[J]. Digital Communications and Networks, 2021, 7 (3): 327- 334. 
											 												 
																									doi: 10.1016/j.dcan.2021.04.002
																																			 											 | 
										
																													
																						| 11 | 
																						 
											   LI X R ,  DAI H N ,  SHUKLA M K , et al.  Friendly-jamming schemes to secure ultra-reliable and low-latency communications in 5G and beyond communications[J]. Computer Stan-dards & Interfaces, 2021, 78, 103540.
											 											 | 
										
																													
																						| 12 | 
																						 
											   HAMAMREH J M ,  FURQAN H M ,  ARSLAN H .  Classifications and applications of physical layer security techniques for confidentiality: a comprehensive survey[J]. IEEE Communications Surveys & Tutorials, 2019, 2 (21): 1773- 1828.
											 											 | 
										
																													
																						| 13 | 
																						 
											  雷菁, 李为, 鲁信金.  5G通信背景下物理层安全技术研究[J]. 无线电通信技术, 2020, 46 (2): 150- 158. 
											 											 | 
										
																													
																						 | 
																						 
											   LEI J ,  LI W ,  LU X J .  Research on physical layer security technology in 5G communication[J]. Radio Communications Technology, 2020, 46 (2): 150- 158. 
											 											 | 
										
																													
																						| 14 | 
																						 
											   WANG K ,  YUAN L ,  MIYAZAKI T , et al.  Jamming and eavesdropping defense in green cyber-physical transportation systems using a Stackelberg game[J]. IEEE Trans.on Industrial Informatics, 2018, 14 (9): 4232- 4242. 
											 												 
																									doi: 10.1109/TII.2018.2841033
																																			 											 | 
										
																													
																						| 15 | 
																						 
											   JIA L L ,  YAO F Q ,  SUN Y M , et al.  Bayesian Stackelberg game for antijamming transmission with incomplete information[J]. IEEE Communications Letters, 2016, 20 (10): 1991- 1994. 
											 												 
																									doi: 10.1109/LCOMM.2016.2598808
																																			 											 | 
										
																													
																						| 16 | 
																						 
											   HU L ,  WEN H ,  WU B , et al.  Cooperative jamming for physical layer security enhancement in internet of things[J]. IEEE Internet of Things Journal, 2018, 5 (1): 219- 228. 
											 												 
																									doi: 10.1109/JIOT.2017.2778185
																																			 											 | 
										
																													
																						| 17 | 
																						 
											   ROMERO E ,  BLESA J ,  ARAUJO A .  An adaptive energy aware strategy based on game theory to add privacy in the physical layer for cognitive WSNs[J]. Ad Hoc Networks, 2019, 92, 101800. 
											 												 
																									doi: 10.1016/j.adhoc.2018.10.026
																																			 											 | 
										
																													
																						| 18 | 
																						 
											   HUANG S C ,  HUANG X J ,  CHEN W W , et al.  Physical layer security of vehicular networks with cooperative jamming helpers[J]. Physical Communication, 2022, 53, 101762. 
											 												 
																									doi: 10.1016/j.phycom.2022.101762
																																			 											 | 
										
																													
																						| 19 | 
																						 
											   TANG J C ,  CHEN G J ,  COON J P .  Secrecy performance analysis of wireless communications in the presence of UAV jammer and randomly located UAV eavesdroppers[J]. IEEE Trans.on Information Forensics and Security, 2019, 14 (11): 3026- 3041. 
											 												 
																									doi: 10.1109/TIFS.2019.2912074
																																			 											 | 
										
																													
																						| 20 | 
																						 
											  裔传俊, 刘亮.  链路质量感知的无线传感器网络生命最大化算法[J]. 计算机应用研究, 2016, 33 (11): 3411- 3416. 
											 											 | 
										
																													
																						 | 
																						 
											   YI C J ,  LIU L .  Link quality-aware algorithms for maximizing lifetime in wireless sensor networks[J]. Application Research of Computers, 2016, 33 (11): 3411- 3416. 
											 											 | 
										
																													
																						| 21 | 
																						 
											   JIA L L ,  YAO F Q ,  SUN Y M , et al.  Bayesian Stackelberg game for antijamming transmission with incomplete information[J]. IEEE Communications Letters, 2016, 20 (10): 1991- 1994. 
											 												 
																									doi: 10.1109/LCOMM.2016.2598808
																																			 											 | 
										
																													
																						| 22 | 
																						 
											   WANG Q ,  CHEN Z ,  MEI W D , et al.  Improving physical layer security using UAV-enabled mobile relaying[J]. IEEE Wireless Communications Letters, 2017, 6 (3): 310- 313. 
											 												 
																									doi: 10.1109/LWC.2017.2680449
																																			 											 | 
										
																													
																						| 23 | 
																						 
											   LEUNG-YAN-CHEONG S ,  HELLMAN M .  The Gaussian wire-tap channel[J]. IEEE Trans.on Information Theory, 1978, 24 (4): 451- 456. 
											 												 
																									doi: 10.1109/TIT.1978.1055917
																																			 											 | 
										
																													
																						| 24 | 
																						 
											   WU R J ,  VANGORDER R A .  Nonlinear dynamics of discrete time multi level leader-follower games[J]. Applied Mathematics and Computation, 2018, 320, 240- 250. 
											 												 
																									doi: 10.1016/j.amc.2017.09.034
																																			 											 | 
										
																													
																						| 25 | 
																						 
											   GUPTA R ,  GUPTA J .  Future generation communications with game strategies: a comprehensive survey[J]. Computer Communications, 2022, 192, 1- 32. 
											 												 
																									doi: 10.1016/j.comcom.2022.05.024
																																			 											 | 
										
																													
																						| 26 | 
																						 
											   SUMA S ,  BHARATI H .  An optimized routing scheme for congestion avoidance using mobile nodes in wireless sensor network[J]. Sensors, 2022, 24, 100457.
											 											 | 
										
																													
																						| 27 | 
																						 
											   CHETTRI L ,  BERA R .  A comprehensive survey on internet of things (IoT) toward 5G wireless systems[J]. IEEE Internet of Things Journal, 2020, 7 (1): 16- 32. 
											 												 
																									doi: 10.1109/JIOT.2019.2948888
																																			 											 | 
										
																													
																						| 28 | 
																						 
											   ZHANG X B ,  WANG H ,  XU Y F , et al.  Put others before itself: a multi-leader one-follower anti-jamming Stackelberg game against tracking jammer[J]. China Communications, 2021, 18 (11): 168- 181. 
											 												 
																									doi: 10.23919/JCC.2021.11.012
																																			 											 | 
										
																													
																						| 29 | 
																						 
											   BHUVANA S D ,  JAICHANDRAN R ,  BHARATHI P S , et al.  The defense against jamming attack in cognitive radio networks: energy efficiency management perspective[J]. Microprocessors and Microsystems, 2021, 82, 103816. 
											 												 
																									doi: 10.1016/j.micpro.2020.103816
																																			 											 | 
										
																													
																						| 30 | 
																						 
											 DUAN B W, CAI Y M, ZHENG J C, et al. Cooperative jammer power allocation—a nash bargaining solution method[C]//Proc. of the International Conference on Wireless Communications & Signal Processing, 2015.
											 											 |