Cooperative Jamming in a Two-Hop Relay Wireless Network with Buffer-Aided Relays

被引:5
作者
Sasaki, Kenta [1 ]
Liao, Xuening [1 ,2 ]
Jiang, Xiaohong [1 ]
机构
[1] Future Univ Hakodate, Sch Syst Informat Sci, Hakodate, Hokkaido, Japan
[2] Shaanxi Normal Univ, Sch Comp Sci, Xian, Shaanxi, Peoples R China
来源
2017 FIFTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING (CANDAR) | 2017年
关键词
network security; jamming; buffer-aided relaying; random selection; PHYSICAL-LAYER SECURITY; SELECTION; SECRECY;
D O I
10.1109/CANDAR.2017.70
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we consider a two-hop relay wireless network with one source, one destination, one eavesdropper and multiple half-duplex (HD) relays each having a finite buffer. We assume two cases of the eavesdropper's channel state information (CSI), i.e., the perfect CSI case where the instantaneous CSI of the eavesdropper channels are available, and the partial CSI case where only the average CSI of the eavesdropper channels are available. Cooperative jamming schemes are proposed for both eavesdropper's CSI cases, where two relays are selected in each hop, one is selected as a message relay and another as a jammer to transmit jamming signals to degrade the eavesdropper channel. The security performance in terms of the secrecy outage probability (SOP) is analyzed by simulation. We also make comparison between our proposed cooperative jamming schemes with the random jammer selection scheme. Results show that the proposed cooperative jamming scheme outperforms the random jammer selection scheme and the joint consideration of the buffer-aided relay selection and jamming can achieve better security performance.
引用
收藏
页码:565 / 569
页数:5
相关论文
共 24 条
  • [1] [Anonymous], IEEE T WIRELESS COMM
  • [2] [Anonymous], ARXIV160504487
  • [3] [Anonymous], IEEE T VEHICULAR TEC
  • [4] [Anonymous], REN FAIL, DOI DOI 10.1175/WAF-D-14-00073.1
  • [5] [Anonymous], IEEE INT C AC SPEECH
  • [6] [Anonymous], IEEE C VEH TECHN
  • [7] [Anonymous], WIR COMM NETW C WCNC
  • [8] Wireless information-theoretic security
    Bloch, Matthieu
    Barros, Joao
    Rodrigues, Miguel R. D.
    McLaughlin, Steven W.
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) : 2515 - 2534
  • [9] Max-Ratio Relay Selection in Secure Buffer-Aided Cooperative Wireless Networks
    Chen, Gaojie
    Tian, Zhao
    Gong, Yu
    Chen, Zhi
    Chambers, Jonathon A.
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (04) : 719 - 729
  • [10] Physical-Layer Security of a Buffer-Aided Full-Duplex Relaying System
    El Shafie, Ahmed
    Sultan, Ahmed
    Al-Dhahir, Naofal
    [J]. IEEE COMMUNICATIONS LETTERS, 2016, 20 (09) : 1856 - 1859