Secure Transmission for Wireless Communication Systems With Friendly Jammers

被引:1
|
作者
Jiang, Xiao [1 ]
Li, Peng [1 ]
Zou, Yulong [2 ]
Li, Bin [2 ]
Wang, Ruchuan [1 ]
机构
[1] Nanjing Univ Posts & Telecommun, Sch Comp Sci, Nanjing 210023, Peoples R China
[2] Nanjing Univ Posts & Telecommun, Sch Telecommun & Informat Engn, Nanjing 210003, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
Cooperative jamming; opportunistic jammer selection; physical-layer security; secrecy outage probability; PHYSICAL LAYER SECURITY; SECRECY OUTAGE ANALYSIS; NONORTHOGONAL MULTIPLE-ACCESS; ANTENNA SELECTION; RELAY SELECTION; NOMA; NETWORKS;
D O I
10.1109/TVT.2023.3299083
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this article, we investigate the physical layer security for a wireless communication system consisting of a base station (BS) and a user (U) in the face of an eavesdropper (E). A friendly jammer is opportunistically selected from multiple jammers to create intentional interference upon E. However, the legitimate user U is not aware of the information transmitted by the jammer and thus cannot remove the interfering signal. In this context, we propose interference-limited opportunistic jammer selection (IL-OJS) scheme and interference-canceled opportunistic jammer selection (IC-OJS) scheme to reduce the damage of interference to U for improving physical layer security. Specifically, in the IL-OJS scheme, the selected jammer sets an interference threshold. When the interference to U is less than the threshold value, the selected jammer will work (i.e., emit artificial noise), and vice versa, it will stop jamming. By contrast, IC-OJS scheme utilizes a specially designed signal to eliminate interference received by U from the selected jammer. For comparison, we also present the conventional non-jammer (NJ) scheme as a benchmark. Exact and asymptotic closed-form secrecy outage probability expressions for NJ, IL-OJS, and IC-OJS schemes are derived over Nakagami-$m$ fading channels. Numerical results show that the secrecy performance of proposed IL-OJS and IC-OJS schemes is better than that of NJ scheme. Additionally, the secrecy outage probability performance of IL-OJS and IC-OJS schemes can be improved by increasing the number of jammers.
引用
收藏
页码:16308 / 16322
页数:15
相关论文
共 50 条
  • [1] Secure Communication with Wireless Powered Friendly Jammers under Multiple Eavesdroppers
    He, Dongxuan
    Zhou, He
    Wang, Hua
    Yang, Dewei
    2019 IEEE 89TH VEHICULAR TECHNOLOGY CONFERENCE (VTC2019-SPRING), 2019,
  • [2] Secure transmission for IoT wireless energy-carrying communication systems
    Wang, Pingxin
    Jing, Zhen
    Zhang, Zhi
    Wang, Qing
    Li, Congcong
    Zhu, Hongxia
    PLOS ONE, 2023, 18 (08):
  • [3] An approach for secure wireless communication using friendly noise
    Aggarwal, Parag
    Trivedi, Aditya
    Proceedings of the 2014 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2014, 2014, : 1578 - 1584
  • [4] Secure Communication With a Wireless-Powered Friendly Jammer
    Liu, Wanchun
    Zhou, Xiangyun
    Durrani, Salman
    Popovski, Petar
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (01) : 401 - 415
  • [5] An Approach for Secure Wireless Communication Using Friendly Noise
    Aggarwal, Parag
    Trivedi, Aditya
    2014 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2014, : 1578 - 1584
  • [6] Secure transmission of wireless energy-carrying communication systems for the Internet of Things
    Zhou, Gang
    Peng, Mingyang
    Li, Yan
    Wang, Jian
    Lian, Chen
    APPLIED MATHEMATICS AND NONLINEAR SCIENCES, 2023, 8 (01) : 3135 - 3148
  • [7] Deep Learning for Secure Transmission in Wireless Communication Networks
    Olowononi, Felix O.
    Rawat, Danda B.
    Kamhoua, Charles A.
    2022 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), 2022, : 379 - 384
  • [8] Secure Transmission Scheme in MIMO Communication Systems with Simultaneous Wireless Information and Power Transfer
    Wang, Shaohang
    Wang, Baoyun
    PROCEEDINGS OF THE 2015 10TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA CHINACOM 2015, 2015, : 301 - 306
  • [9] Adaptive Secure Transmission for Wireless Powered Communication Networks
    Yong Wang
    Weiwei Yang
    Tao Zhang
    Yong Chen
    Xiaohui Shang
    Quan Wang
    中国通信, 2021, 18 (03) : 155 - 173
  • [10] Adaptive Secure Transmission for Wireless Powered Communication Networks
    Wang, Yong
    Yang, Weiwei
    Zhang, Tao
    Chen, Yong
    Shang, Xiaohui
    Wang, Quan
    CHINA COMMUNICATIONS, 2021, 18 (03) : 155 - 173