Power Allocation for Cooperative-Based Jamming in Wireless Networks with Secrecy Constraints

被引:12
作者
Krikidis, Ioannis [1 ]
Thompson, John S. [2 ]
Grant, Peter M. [2 ]
McLaughlin, Steve [2 ]
机构
[1] Univ Patras, Dept Comp Engn & Informat, Rion 26500, Greece
[2] Univ Edinburgh, Inst Digest Commun, Edinburgh EH8 9YL, Midlothian, Scotland
来源
2010 IEEE GLOBECOM WORKSHOPS | 2010年
基金
英国工程与自然科学研究理事会;
关键词
Eavesdropper channel; jamming; power allocation; dirty-paper-coding; achievable secrecy rate; ACHIEVABLE RATES;
D O I
10.1109/GLOCOMW.2010.5700121
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper deals with the use of jamming transmission for physical layer security in wireless networks with power constraints. An approach that incorporates a dirty-paper coding (DPC) design with the jamming process under a total power constraint is investigated. The proposed scheme enables both the source and the jammer nodes to create intentional interference on the eavesdropper node and significantly improves the achievable secure rate of the system. A power allocation (PA) policy that defines how the available power is distributed between the source and the jammer node as well as between the superimposed terms of the DPC design is investigated. We show that the PA policy has an important impact on the secrecy performance of the jamming process and determines how the interference should be transmitted between the two independent jamming channels.
引用
收藏
页码:1177 / 1181
页数:5
相关论文
共 14 条
[1]  
AGGARWAL V, 2009, EURASIP J WIRELE JUN, P1
[2]   Secrecy capacity of wireless channels [J].
Barros, Joao ;
Rodrigues, Miguel R. D. .
2006 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1-6, PROCEEDINGS, 2006, :356-+
[3]   WRITING ON DIRTY PAPER [J].
COSTA, MHM .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (03) :439-441
[4]   Achievable rates in cognitive radio channels [J].
Devroye, N ;
Mitran, P ;
Tarokh, V .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2006, 52 (05) :1813-1827
[5]  
DONG L, 2009, IEEE P WORKSH STAT S, P417
[6]  
DONG L, 2008, P ALL C COMM CONT CO
[7]   Secrecy in Cooperative Relay Broadcast Channels [J].
Ekrem, Ersen ;
Ulukus, Sennur .
2008 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS, VOLS 1-6, 2008, :2217-2221
[8]   Guaranteeing secrecy using artificial noise [J].
Goel, Satashu ;
Negi, Rohit .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2008, 7 (06) :2180-2189
[9]  
JOVICIC A, 2006, COGNITIVE RADI UNPUB
[10]  
KRIKIDIS I, 2009, POWER ALLOCATION SEC