Cooperative Jamming and Aloha Protocol for Physical Layer Security

被引:2
作者
Gupta, Vaibhav Kumar [1 ]
Jindal, Poonam [1 ]
机构
[1] Natl Inst Technol, Dept ECE, Kurukshetra 136119, Haryana, India
来源
2014 FOURTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION TECHNOLOGIES (ACCT 2014) | 2014年
关键词
Aloha; friendly jammer; physical layer security; path loss exponent; secrecy capacity; WIRE-TAP CHANNEL; SECRECY;
D O I
10.1109/ACCT.2014.56
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cooperative jamming, a potential supplement can be used to improve physical layer based security by transmitting a weighted jamming signal to create interference at the eavesdropper. The secrecy rate is derived for cooperative jamming technique in terms of network throughput. We have analysed the effect of Aloha protocol with cooperative jamming on the secrecy capacity of large scale network. To implement cooperative jamming with Aloha protocol a transmitter can be considered as a source or as a friendly jammer with the massage transmission probability p. We observed that an optimum level of security can be achieved for a specific value of jammer power using cooperative jamming and at the moderate value of massage transmission probability p using cooperative jamming with Aloha protocol.
引用
收藏
页码:64 / 68
页数:5
相关论文
共 21 条
[1]  
CSISZAR I, 1978, IEEE T INFORM THEORY, V24, P339, DOI 10.1109/TIT.1978.1055892
[2]  
Dong Lun, 2011, P 46 ANN ALL C URB C, P1132
[3]  
Ghosh S., 2011, IEEE, International Conference on Management and Service Science (MASS), P1, DOI DOI 10.1155/2011/693759
[4]   Modeling Location Uncertainty for Eavesdroppers: A Secrecy Graph Approach [J].
Goel, Satashu ;
Aggarwal, Vaneet ;
Yener, Aylin ;
Calderbank, A. Robert .
2010 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, 2010, :2627-2631
[5]   The Secrecy Graph and Some of its Properties [J].
Haenggi, Martin .
2008 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS, VOLS 1-6, 2008, :539-543
[6]  
Koyluoglu O. O., 2010, IEEE T INFORM THEORY, V58, P3000
[7]   The relay-eavesdropper channel: Cooperation for secrecy [J].
Lai, Lifeng ;
El Gamal, Hesham .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (09) :4005-4019
[8]  
LEUNGYANCHEONG SK, 1978, IEEE T INFORM THEORY, V24, P451, DOI 10.1109/TIT.1978.1055917
[9]  
Liang Y., 2008, IEEE Trans. Inf. Theory, V54, P2470
[10]   Secrecy Throughput of MANETs with Malicious Nodes [J].
Liang, Yingbin ;
Poor, H. Vincent ;
Ying, Lei .
2009 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1- 4, 2009, :1189-+