Secure Transmission for Wireless Communication Systems With Friendly Jammers

被引:1
|
作者
Jiang, Xiao [1 ]
Li, Peng [1 ]
Zou, Yulong [2 ]
Li, Bin [2 ]
Wang, Ruchuan [1 ]
机构
[1] Nanjing Univ Posts & Telecommun, Sch Comp Sci, Nanjing 210023, Peoples R China
[2] Nanjing Univ Posts & Telecommun, Sch Telecommun & Informat Engn, Nanjing 210003, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
Cooperative jamming; opportunistic jammer selection; physical-layer security; secrecy outage probability; PHYSICAL LAYER SECURITY; SECRECY OUTAGE ANALYSIS; NONORTHOGONAL MULTIPLE-ACCESS; ANTENNA SELECTION; RELAY SELECTION; NOMA; NETWORKS;
D O I
10.1109/TVT.2023.3299083
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this article, we investigate the physical layer security for a wireless communication system consisting of a base station (BS) and a user (U) in the face of an eavesdropper (E). A friendly jammer is opportunistically selected from multiple jammers to create intentional interference upon E. However, the legitimate user U is not aware of the information transmitted by the jammer and thus cannot remove the interfering signal. In this context, we propose interference-limited opportunistic jammer selection (IL-OJS) scheme and interference-canceled opportunistic jammer selection (IC-OJS) scheme to reduce the damage of interference to U for improving physical layer security. Specifically, in the IL-OJS scheme, the selected jammer sets an interference threshold. When the interference to U is less than the threshold value, the selected jammer will work (i.e., emit artificial noise), and vice versa, it will stop jamming. By contrast, IC-OJS scheme utilizes a specially designed signal to eliminate interference received by U from the selected jammer. For comparison, we also present the conventional non-jammer (NJ) scheme as a benchmark. Exact and asymptotic closed-form secrecy outage probability expressions for NJ, IL-OJS, and IC-OJS schemes are derived over Nakagami-$m$ fading channels. Numerical results show that the secrecy performance of proposed IL-OJS and IC-OJS schemes is better than that of NJ scheme. Additionally, the secrecy outage probability performance of IL-OJS and IC-OJS schemes can be improved by increasing the number of jammers.
引用
收藏
页码:16308 / 16322
页数:15
相关论文
共 50 条
  • [21] Resource Allocation for Secure Transmission in Wireless Powered Communication Networks
    Tong, Xun
    Kong, Shuaiying
    Shen, Guanqun
    Zhang, Shubin
    Chi, Kaikai
    2022 IEEE 23RD INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE SWITCHING AND ROUTING (IEEE HPSR), 2022, : 163 - 168
  • [22] Energy Management for Secure Transmission in Wireless Powered Communication Networks
    Zhang, Shubin
    Kong, Shuaiying
    Chi, Kaikai
    Huang, Liang
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (02) : 1171 - 1181
  • [23] Secure Communication Using Interference Cancellation Against Multiple Jammers
    Thai, Chan Dai Truyen
    Bao, Vo-Nguyen Quoc
    Vo, Nguyen-Son
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2022, 71 (12) : 12811 - 12825
  • [24] Secure communication through jammers jointly optimized in geography and time
    Allouche, Yair
    Arkin, Esther M.
    Cassuto, Yuval
    Efrat, Alon
    Grebla, Guy
    Mitchell, Joseph S. B.
    Sankararaman, Swaminathan
    Segal, Michael
    PERVASIVE AND MOBILE COMPUTING, 2017, 41 : 83 - 105
  • [25] Secure upgraded spatial modulation for wireless transmission systems
    Rengaraj, Ramaprabha
    Loganathan, Lavanya Dhamodharan
    Konganathan, Gunaseelan
    COMPUTER NETWORKS, 2023, 226
  • [26] Secure Transmission in Integrated Communication-Radar Systems
    Yang, Lanxin
    Wang, Mingjing
    Bai, Yechao
    Lou, Mengting
    Tang, Lan
    IEEE SYSTEMS JOURNAL, 2023, 17 (03): : 4102 - 4113
  • [27] To Harvest and Jam: A Paradigm of Self-Sustaining Friendly Jammers for Secure AF Relaying
    Xing, Hong
    Wong, Kai-Kit
    Chu, Zheng
    Nallanathan, Arumugam
    IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2015, 63 (24) : 6616 - 6631
  • [28] Wireless secure communication systems design basedon chaotic synchronization
    Dai, Zhi-cheng
    Wang, Bing-wen
    Li, Peng
    2006 10TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS, 2006, : 155 - +
  • [29] Secure image transmission through LTE wireless communications systems
    Farouk Abduh Kamil Al-Fahaidy
    Radwan AL-Bouthigy
    Mohammad Yahya H. Al-Shamri
    Safwan Abdulkareem
    EURASIP Journal on Image and Video Processing, 2024
  • [30] Secure image transmission through LTE wireless communications systems
    Al-Fahaidy, Farouk Abduh Kamil
    AL-Bouthigy, Radwan
    Al-Shamri, Mohammad Yahya H.
    Abdulkareem, Safwan
    EURASIP JOURNAL ON IMAGE AND VIDEO PROCESSING, 2024, 2024 (01)