Cooperative Relaying and Jamming Design for Secure LPWAN Wireless Communication

被引:0
作者
Chen Dianxia [1 ]
Ma Xiaoshan [2 ]
Yang Lin [3 ]
Yu Kan [4 ]
Feng Zhiyong [4 ]
机构
[1] Education, Tianjin Ren'ai College
[2] Academy of Military Sciences of PLA
[3] National Key Laboratory of Science and Technology on Information System Security, Systems Engineering Institute,AMS, PLA
[4] Key Laboratory of Universal Wireless Communications, Ministry of Education, Beijing University of Posts and
关键词
D O I
暂无
中图分类号
TN92 [无线通信];
学科分类号
080402 ; 080904 ; 0810 ; 081001 ;
摘要
Physical layer security methods based on joint relay and jammer selection(JRJS) have been widely investigated in the study of secure wireless communications. Different from current works on JRJS schemes, which assumed that the global channel state information(CSI) of the eavesdroppers(Eves)was known beforehand, then the optimal relaying and jamming relays were determined. More importantly,the time complexity of selecting optimal jamming relay is O(N2), where N is the maximum number of relays/Eves. In this paper, for the scenario where the source wants to exchange the message with the destination, via relaying scheme due to longer communication distance and limited transmission power, in the presence of multiple Eves, with the assumption of Eves' perfect CSI and average CSI, we propose two kinds of JRJS methods. In particular, the time complexity of finding the optimal jammer can be reduced to O(N). Furthermore, we present a novel JRJS scheme for no CSI of Eves by minimizing the difference between expected signal and interfering signal at the destination. Finally, simulations show that the designed methods are more effective than JRJS and other existing strategies in terms of security performance.
引用
收藏
页码:100 / 116
页数:17
相关论文
共 50 条
  • [21] Cooperative Jamming for Secure Communication With Finite Alphabet Inputs
    Cao, Kuo
    Cai, Yueming
    Wu, Yongpeng
    Yang, Weiwei
    IEEE COMMUNICATIONS LETTERS, 2017, 21 (09) : 2025 - 2028
  • [22] Cooperative Jamming-Aided Secure Wireless Powered Communication Networks: A Game Theoretical Formulation
    Zhong, Yijie
    Zhou, Fuhui
    Wang, Yuhao
    Deng, Xiaohua
    Al-Dhahir, Naofal
    IEEE COMMUNICATIONS LETTERS, 2020, 24 (05) : 1081 - 1085
  • [23] Secure Analysis in UAV-Based mmWave Relaying Networks with Cooperative Jamming
    Pang, Xiaowei
    Liu, Mingqian
    Zhao, Nan
    Chen, Yunfei
    Li, Yonghui
    Yu, F. Richard
    IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2021), 2021,
  • [24] Joint Cooperative Relaying and Jamming for Maximum Secrecy Capacity in Wireless Networks
    Wang, Li
    Cao, Chunyan
    Song, Mei
    Cheng, Yu
    2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2014, : 4448 - 4453
  • [25] Secure two-user AF relaying networks using cooperative jamming
    Mallat, Walid
    Alouane, Wided Hadj
    Boujemaa, Hatem
    Touati, Farid
    2018 14TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2018, : 741 - 746
  • [26] Hybrid Cooperative Relaying and Jamming for Secure Two-Way Relay Networks
    Wang, Hui-Ming
    Luo, Miao
    Yin, Qinye
    2012 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2012, : 4846 - 4850
  • [27] On Secure Wireless Sensor Networks With Cooperative Energy Harvesting Relaying
    Anh-Nhat Nguyen
    Van Nhan Vo
    So-In, Chakchai
    Dac-Binh Ha
    Sanguanpong, Surasak
    Baig, Zubair Ahmed
    IEEE ACCESS, 2019, 7 : 139212 - 139225
  • [28] Energy Efficiency of Cooperative Jamming Strategies in Secure Wireless Networks
    Dehghan, Mostafa
    Goeckel, Dennis L.
    Ghaderi, Majid
    Ding, Zhiguo
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2012, 11 (09) : 3025 - 3029
  • [29] SOME COOPERATIVE RELAYING TECHNIQUES FOR WIRELESS COMMUNICATION SYSTEMS
    Kahveci, Salim
    2014 22ND SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2014, : 1690 - 1693
  • [30] Jamming and Physical Layer Security for Cooperative Wireless Communication
    Rohokale, Vandana
    Prasad, Neeli
    Prasad, Ramjee
    INTERNET OF THINGS AND M2M COMMUNICATIONS, 2013, : 161 - 181