Abstract
Recently, the physical layer security technologies based on artificial noise and beamforming has been getting in focus. Although those schemes provide an idea to design security policies for wireless networks, most existing works mainly concentrate on the secrecy capacity analysis for known Channel State Information (CSI) of eavesdroppers, as well as the corresponding power allocation and algorithm optimization. Since the eavesdroppers may hide their own personal state information and steal confidential message in the wireless networks, we investigate the space power synthesis for multiple jamming signal in this work, so as to achieve the cooperative jamming in the case of unknown CSI. According to the superposition principle of various electromagnetic waves in space, the multiple jammers-based anti-eavesdropping model is formulated. Taking into account the free space fading, we study the total impact caused by the jammers with different locations in a limited region, and present the corresponding schemes to minimize the synthetic jamming power of all jammers at the legitimate user. Numerical simulation results demonstrate that our solutions to the cooperative jamming problem can make the strength of the synthesized interference power at the legitimate user be the lowest value in a confined region. Based on this, we can improve the system secrecy capacity when the CSI of eavesdropper is unknown.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Cai, Z., Duan, Y., Bourgeois, A.G.: Delay efficient opportunistic routing in asynchronous multi-channel cognitive radio networks. J. Combin. Optim. 29(4), 815–835 (2015)
Duan, Y., Liu, G., Cai, Z.: Opportunistic channel-hopping based effective rendezvous establishment in cognitive radio networks. In: Wang, X., Zheng, R., Jing, T., Xing, K. (eds.) WASA 2012. LNCS, vol. 7405, pp. 324–336. Springer, Heidelberg (2012). doi:10.1007/978-3-642-31869-6_28
Yu, L., Sapra, K., Shen, H., Ye, L.: Cooperative end-to-end traffic redundancy elimination for reducing cloud bandwidth cost. In: IEEE International Conference on Network Protocols, pp. 1–10 (2012)
Mukherjee, A., Fakoorian, S.A.A., Huang, J., Swindlehurst, A.L.: Principles of physical layer security in multiuser wireless networks: a survey. IEEE Commun. Surv. Tutor. 16(3), 1550–1573 (2014). Thrid
Jiang, K., Jing, T., Li, Z., Huo, Y., Zhang, F.: Analysis of secrecy performance in fading multiple access wiretap channel with SIC receiver. In: IEEE INFOCOM 2017 - The 36th Annual IEEE International Conference on Computer Communications, pp. 1–9, May 2016
Shiu, Y.S., Chang, S.Y., Wu, H.C., Huang, S.C.H., Chen, H.H.: Physical layer security in wireless networks: a tutorial. IEEE Wirel. Commun. 18(2), 66–74 (2011)
Jing, T., Shi, H., Huo, Y., Ma, L., Cai, Z.: A novel channel assignment scheme for multi-radio multi-channel wireless mesh networks. In: Cheng, Y., Eun, D.Y., Qin, Z., Song, M., Xing, K. (eds.) WASA 2011. LNCS, vol. 6843, pp. 261–270. Springer, Heidelberg (2011). doi:10.1007/978-3-642-23490-3_24
Guan, X., Li, A., Cai, Z., Ohtsuki, T.: Coalition graph game for robust routing in cooperative cognitive radio networks. Mobile Netw. Appl. 20(2), 147–156 (2015)
Ozarow, L.H., Wyner, A.D.: Wire-tap channel ii. AT T Bell Lab. Tech. J. 63(10), 2135–2157 (1984)
Tekin, E., Yener, A.: The general Gaussian multiple-access and two-way wiretap channels: achievable rates and cooperative jamming. IEEE Trans. Inf. Theory 54(6), 2735–2751 (2008)
Negi, R., Goel, S.: Secret communication using artificial noise. In: 2005 IEEE 62nd Vehicular Technology Conference on VTC-2005-Fall, 2005, vol. 3, pp. 1906–1910, September 2005
Weingarten, H., Steinberg, Y., Shamai, S.S.: The capacity region of the gaussian multiple-input multiple-output broadcast channel. IEEE Trans. Inf. Theory 52(9), 3936–3964 (2006)
Shen, W., Ning, P., He, X., Dai, H.: Ally friendly jamming: how to jam your enemy and maintain your own wireless connectivity at the same time. In: 2013 IEEE Symposium on Security and Privacy, pp. 174–188, May 2013
Oggier, F., Hassibi, B.: The secrecy capacity of the mimo wiretap channel. IEEE Trans. Inf. Theory 57(8), 4961–4972 (2011)
Li, Z., Jing, T., Cheng, X., Huo, Y., Zhou, W., Chen, D.: Cooperative jamming for secure communications in MIMO cooperative cognitive radio networks. In: 2015 IEEE International Conference on Communications (ICC), pp. 7609–7614, June 2015
Li, Z., Jing, T., Huo, Y., Qian, J.: Worst-case jamming for secure communications in multi-antenna cooperative cognitive radio networks with energy harvesting. In: 2015 International Conference on Identification, Information, and Knowledge in the Internet of Things (IIKI), pp. 110–115, October 2015
Lin, P.H., Gabry, F., Thobaben, R., Jorswieck, E.A., Skoglund, M.: Multi-phase smart relaying and cooperative jamming in secure cognitive radio networks. IEEE Trans. Cogn. Commun. Netw. 2(1), 38–52 (2016)
Nguyen, V.D., Duong, T.Q., Dobre, O.A., Shin, O.S.: Joint information and jamming beamforming for secrecy rate maximization in cognitive radio networks. IEEE Trans. Inf. Forensics Secur. 11(11), 2609–2623 (2016)
Vilela, J.P., Bloch, M., Barros, J., McLaughlin, S.W.: Wireless secrecy regions with friendly jamming. IEEE Trans. Inf. Forensics Secur. 6(2), 256–266 (2011)
Li, H., Wang, X., Hou, W.: Security enhancement in cooperative jamming using compromised secrecy region minimization. In: 2013 13th Canadian Workshop on Information Theory, pp. 214–218, June 2013
Li, Z., Jing, T., Ma, L., Huo, Y., Qian, J.: Worst-case cooperative jamming for secure communications in CIoT networks. Sensors 16(3), 339 (2016)
Acknowledgments
We are very grateful to all reviewers who have helped improve the quality of this paper. This work was supported by the National Natural Science Foundation of China (Grant Nos. 61471028 and 61572070) and the Fundamental Research Funds for the Central Universities (Grant No. 2016JBZ003).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Fan, X., Huang, L., Huo, Y., Hu, C., Tian, Y., Qian, J. (2017). Space Power Synthesis-Based Cooperative Jamming for Unknown Channel State Information. In: Ma, L., Khreishah, A., Zhang, Y., Yan, M. (eds) Wireless Algorithms, Systems, and Applications. WASA 2017. Lecture Notes in Computer Science(), vol 10251. Springer, Cham. https://doi.org/10.1007/978-3-319-60033-8_42
Download citation
DOI: https://doi.org/10.1007/978-3-319-60033-8_42
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-60032-1
Online ISBN: 978-3-319-60033-8
eBook Packages: Computer ScienceComputer Science (R0)