A Novel Cooperative Jamming Scheme for Wireless Social Networks Without Known CSI

被引:22
作者
Huang, Liang [1 ]
Fans, Xin [1 ]
Huo, Yan [1 ]
Hu, Chunqiang [2 ]
Tian, Yuqian [1 ]
Qian, Jin [3 ]
机构
[1] Beijing Jiaotong Univ, Sch Elect & Informat Engn, Beijing 100044, Peoples R China
[2] Chongqing Univ, Sch Software Engn, Chongqing 400044, Peoples R China
[3] Taizhou Univ, Coll Comp Sci & Technol, Taizhou 225300, Peoples R China
基金
中国国家自然科学基金;
关键词
Power synthesis; cooperative jamming; secrecy rate; simulated annealing algorithm; feasible solution search; PHYSICAL LAYER SECURITY; CAPACITY;
D O I
10.1109/ACCESS.2017.2768568
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Considering a wireless social network, we investigate a cooperative jamming scheme based on the space power synthesis with unknown channel state information (CSI) of eavesdroppers. In particular, we provide a multiple jammers-based anti-eavesdropping model and formulate it by a superposition principle of various jamming signals in a free space. Based on the model, we analyze the superimposed effects of jammers with different locations in a fixed area, and then present corresponding jamming schemes to minimize synthetic jamming power at a legitimate receiver but satisfying basic interference in other locations. Furthermore, we also provide power allocation schemes to maximize the worst-case secrecy rate of a legitimate receiver. Numerical simulation results demonstrate that the secrecy performance of our cooperative jamming schemes can satisfy the requirements of secure transmission in a fixed area. Besides, our proposed power allocation schemes can further improve secrecy rate without known exact CSI of eavesdroppers.
引用
收藏
页码:26476 / 26486
页数:11
相关论文
共 34 条
[1]  
[Anonymous], 2002, Wireless Communications: Principles and Practice
[2]  
[Anonymous], 2016, 2016 IEEE WIR COMM N
[3]  
[Anonymous], 2017, IEEE C COMP COMM MAY
[4]   Secrecy capacity of wireless channels [J].
Barros, Joao ;
Rodrigues, Miguel R. D. .
2006 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1-6, PROCEEDINGS, 2006, :356-+
[5]   SIMULATED ANNEALING [J].
BERTSIMAS, D ;
TSITSIKLIS, J .
STATISTICAL SCIENCE, 1993, 8 (01) :10-15
[6]   Wireless information-theoretic security [J].
Bloch, Matthieu ;
Barros, Joao ;
Rodrigues, Miguel R. D. ;
McLaughlin, Steven W. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) :2515-2534
[7]  
Dong LuYan Dong LuYan, 2011, Proceedings of the International Conference on pipelines and trenchless technology, Beijing, China, 26-29 October 2011, P1
[8]   Joint design of jammer selection and beamforming for securing MIMO cooperative cognitive radio networks [J].
Gao, Qinghe ;
Huo, Yan ;
Ma, Liran ;
Xing, Xiaoshuang ;
Cheng, Xiuzhen ;
Jing, Tao ;
Liu, Hang .
IET COMMUNICATIONS, 2017, 11 (08) :1264-1274
[9]   SIMULATED ANNEALING - A PROOF OF CONVERGENCE [J].
GRANVILLE, V ;
KRIVANEK, M ;
RASSON, JP .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 1994, 16 (06) :652-656
[10]  
Guru Bhag., 2004, ELECTROMAGNETIC FIEL, V2nd