Browse > Article

A Method Enabling Exploitation of Spatial Diversity and Physical Layer Security in an Extreme Case of Source-Wiretapping without a Jamming Beamformer  

Tran, Truc Thanh (Institute of Research and Development, Duy Tan University, Danang Department of Information and Communication)
Kong, Hyung Yun (Department of Electrical Engineering, University of Ulsan)
Publication Information
Abstract
This article exploits spatial diversity for jamming to prevent wiretapping in the extreme case in which an eavesdropper is located near the source and a common jamming signal is unavailable. To address this challenge, the jamming signal is allowed to carry a random binary message. Then, it is proposed that the active intermediate node transmits this jamming signal and the decoding of this signal at both source and destination is physically secured as result of using the physical-layer security method. If the source and the destination securely and correctly decode this jamming message, the source transmits another message which is created from combining its information message and the decoded message using the network-coding method. Therefore, this method prevents the transmissions from being eavesdropped upon by the source-wiretapping.
Keywords
Jamming; physical-layer secrecy; secrecy rate;
Citations & Related Records
연도 인용수 순위
  • Reference
1 E. Silva et al., "Identity-based key management in mobile ad hoc networks: Techniques and applications," IEEE Wireless Commun., vol. 15, no. 5, pp. 46-52, 2008.   DOI
2 J. Barros andM. R. D. Rodrigues, "Secrecy capacity of wireless channels," in Proc. ISIT, 2006, pp. 356-360.
3 M. Bloch et al., "Wireless information-theoretic security," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515-2534, 2008.   DOI
4 S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, 2008.   DOI
5 H. Jing and A. L. Swindlehurst, "Cooperative jamming for secure communications in MIMO relay networks," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4871-4884, 2011.   DOI
6 A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas; part ii: The mimome wiretap channel," IEEE Trans. Inf. Theory, on, vol. 56, no. 11, pp. 5515-5532, 2010.   DOI
7 I. Krikidis, J. S. Thompson, and S. McLaughlin, "Relay selection for secure cooperative networks with jamming," IEEE Trans. Wireless Commun., vol. 8, no. 10, pp. 5003-5011, 2009.   DOI
8 F. Oggier and B. Hassibi, "The secrecy capacity of the mimo wiretap channel," in Proc. IEEE ISIT, 2008, pp. 524-528.
9 P. Parada and R. Blahut, "Secrecy capacity of simo and slow fading channels," in Proc. IEEE ISIT, 2005, pp. 2152-2155.
10 L. Ruoheng et al.,"Discrete memoryless interference and broadcast channels with confidential messages: Secrecy rate regions," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2493-2507, 2008.   DOI
11 S. Shafiee and S. Ulukus, "Achievable rates in Gaussian miso channels with secrecy constraints," in Proc. IEEE ISIT, 2007, pp. 2466-2470.
12 X. Sun et al., "Opportunistic selection for decode-and-forward cooperative networks with secure probabilistic constraints," Wireless Personal Communi., vol. 70, no. 4, pp. 1633-1652, 2013.   DOI
13 L. Yupeng, L. Jiangyuan, and A. P. Petropulu, "Destination assisted cooperative jamming for wireless physical-layer security," IEEE Trans. Inf. Forensics Security, vol. 8, no. 4, pp. 682-694, 2013.   DOI
14 V. Aggarwal et al. "Secrecy capacity of a class of orthogonal relay eavesdropper channels," in Proc. IEEE ITA, 2009, pp. 295-300.
15 R. Bustin, L. Ruoheng, and H. V. Poor, "An mmse approach to the secrecy capacity of the mimo gaussian wiretap channel," in Proc. IEEE ISIT, 2009, pp. 2602-2606.
16 A. Khisti et al. "On the gaussian mimo wiretap channel," in Proc. IEEE ISIT, 2007, pp. 2471-2475.
17 A. L. Swindlehurst, "Fixed sinr solutions for the mimo wiretap channel," in Proc. IEEE ICASSP 2009, 2009, pp. 2437-2440.
18 L. Jiangyuan, A. P. Petropulu, and S. Weber, "On cooperative relaying schemes for wireless physical layer security," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4985-4997, 2011.   DOI
19 M. Yuksel and E. Erkip, "Secure communication with a relay helping the wire-tapper," in Proc. IEEE ITW, 2007, pp. 595-600.
20 D. Lun et al., "Improving wireless physical layer security via cooperating relays," IEEE Proc. Signal Process., vol. 58, no. 3, pp. 1875-1888, 2010.   DOI
21 J. MinChul and K. Il-Min, "Relay selection with anc and tdbc protocols in bidirectional relay networks," IEEE Trans. Commun., vol. 58, no. 12, pp. 3500-3511, 2010.   DOI
22 P. Popovski and H. Yomo, "Wireless network coding by amplify-andforward for bi-directional traffic flows," IEEE Commun. Lett., vol. 11, no. 1, pp. 16-18, 2007.   DOI
23 L. Qiang et al., "Cognitive spectrum sharing with two-way relaying systems," IEEE Trans. Veh. Technol., vol. 60, no. 3, pp. 1233-1240, 2011.   DOI
24 D. Zhiguo et al., "Opportunistic relaying for secrecy communications: Cooperative jamming vs. relay chatting," IEEE Trans. Wireless Commun., vol. 10, no. 6, pp. 1725-1729, 2011.   DOI