Secure transmission in wireless ad-hoc networks without CSI at the destination

被引:0
作者
He, Hongliang [1 ]
Li, Xingmei [1 ]
机构
[1] China Univ Geosci, Sch Mech Engn & Elect Informat, Wuhan 430074, Peoples R China
基金
中国国家自然科学基金;
关键词
Physical-layer security; Ad hoc network; Artificial noise; Generator matrix; PHYSICAL LAYER SECURITY; ARTIFICIAL NOISE; DUPLEX RECEIVER; MULTIPLE-ACCESS; IDENTIFICATION; EAVESDROPPER;
D O I
10.1016/j.adhoc.2023.103310
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the openness of wireless communication, the transmission in ad hoc networks is vulnerable to eavesdropping by illegitimate users. The traditional work generally assumes that both the transmitter and the receiver know the channel state information (CSI) of the legitimate channel, but less consideration is given to the scenario where the receiver does not know the CSI. In order to improve the security performance in this scenario, we propose novel transmission schemes by introducing artificial noise or self-interference across time. The artificial noise scheme can improve security significantly but consumes remarkable power, so we instead fuse multiple signals through a Hadamard matrix to actively introduce self-interference. It turns out that the latter scheme has obvious advantages since it improves security and saves power simultaneously. We analyze the achievable secrecy rate of the proposed scheme, and exhibit simulation results to verify the theoretical analysis.
引用
收藏
页数:8
相关论文
共 31 条
[1]   The capacity of discrete-time memoryless Rayleigh-Fading channels [J].
Abou-Faycal, IC ;
Trott, MD ;
Shamai, S .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2001, 47 (04) :1290-1301
[2]   Secure Modulation Based on Constellation Mapping Obfuscation in OFDM Based TDD Systems [J].
Bang, Inkyu ;
Kim, Taehoon .
IEEE ACCESS, 2020, 8 :197644-197653
[3]   Optimal Secrecy Capacity-Delay Tradeoff in Large-Scale Mobile Ad Hoc Networks [J].
Cao, Xuanyu ;
Zhang, Jinbei ;
Fu, Luoyi ;
Wu, Weijie ;
Wang, Xinbing .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2016, 24 (02) :1139-1152
[4]   Physical Layer Security in Three-Tier Wireless Sensor Networks: A Stochastic Geometry Approach [J].
Deng, Yansha ;
Wang, Lifeng ;
Elkashlan, Maged ;
Nallanathan, Arumugam ;
Mallik, Ranjan K. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (06) :1128-1138
[5]   IDENTIFICATION OF NONMINIMUM PHASE SYSTEMS USING HIGHER-ORDER STATISTICS [J].
GIANNAKIS, GB ;
MENDEL, JM .
IEEE TRANSACTIONS ON ACOUSTICS SPEECH AND SIGNAL PROCESSING, 1989, 37 (03) :360-377
[6]   Secrecy-Oriented Antenna Assignment Optimization at Full-Duplex Receiver With Self-Interference [J].
Guo, Tianwen ;
Wang, Baoyun ;
Wu, Wei ;
Deng, Ping .
IEEE WIRELESS COMMUNICATIONS LETTERS, 2018, 7 (04) :562-565
[7]   Secrecy Capacity Optimization via Cooperative Relaying and Jamming for WANETs [J].
Han, Biao ;
Li, Jie ;
Su, Jinshu ;
Guo, Minyi ;
Zhao, Baokang .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2015, 26 (04) :1117-1128
[8]   Secure Transmission in Multiple Access Wiretap Channel: Cooperative Jamming Without Sharing CSI [J].
He, Hongliang ;
Luo, Xizhao ;
Weng, Jian ;
Wei, Kaimin .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 :3401-3411
[9]   Joint Artificial Noise and Repetition Coding for Secure Wireless Communications in TDD Systems [J].
He, Hongliang ;
Ren, Pinyi .
IEEE WIRELESS COMMUNICATIONS LETTERS, 2019, 8 (06) :1700-1703
[10]  
Jiang K., 2017, P IEEE INT C COMP CO, P1