Browse > Article
http://dx.doi.org/10.1109/JCN.2016.000011

Asymptotically Optimal Cooperative Jamming for Physical Layer Security  

Yang, Jun (Department of Statistical Sciences, University of Toronto)
Salari, Soheil (Department of Electrical and Computer Engineering, Queen's University)
Kim, Il-Min (Department of Electrical and Computer Engineering, Queen's University)
Kim, Dong In (School of Information and Communication Engineering, Sungkyunkwan University (SKKU))
Kim, Seokki (Electronics and Telecommunications Research Institute (ETRI))
Lim, Kwangae (Electronics and Telecommunications Research Institute (ETRI))
Publication Information
Abstract
Design of effective cooperative jamming (CJ) algorithm is studied in this paper to maximize the achievable secrecy rate when the total transmit power of the source and multiple trusted terminals is constrained. Recently, the same problem was studied in [1] and an optimal algorithm was proposed involving a one-dimensional exhaustive searching.However, the computational complexity of such exhaustive searching could be very high, which may limit the practical use of the optimal algorithm. We propose an asymptotically optimal algorithm, involving only a fast line searching, which can guarantee to achieve the global optimality when the total transmit power goes to infinity. Numerical results demonstrate that the proposed asymptotically optimal algorithm essentially gives the same performance as the algorithm in [1, (44)] but with much lower computational complexity.
Keywords
Cooperative jamming; physical layer security; secrecy rate;
Citations & Related Records
연도 인용수 순위
  • Reference
1 L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, Mar. 2010.   DOI
2 A. Wolf and E. A. Jorswieck, "On the zero forcing optimality for friendly jamming in MISO wiretap channels," in Proc. IEEE SPAWC, Nice, France, Apr. 2010, pp. 1-5.
3 G. Zheng, L. C. Choo, and K. K. Wong, "Optimal cooperative jamming to enhance physical layer security using relays," IEEE Trans. Signal Process., vol. 59, no. 3, pp. 1317-1322, Mar. 2011.   DOI
4 E. A. Jorswieck, "Secrecy capacity of single- and multi-antenna channels with simple helpers," in Proc. IEEE SCC, Nice, France, Apr. 2007, pp. 931-935.
5 M. Lai, X. Lifeng, and H. El Gamal, "Cooperative secrecy: The relayeavesdropper channel," in Proc. IEEE Int. Symp. Information Theory, Nice, France, Apr. 2007, pp. 931-935.
6 J. Li, A. P. Petropulu, and S. Weber, "On cooperative relaying schemes for wireless physical layer security," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4985-4997, Oct. 2011.   DOI
7 A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, pp. 1355-1387, 1975.   DOI
8 S. Leung-Yan-Cheong, andM. Hellman, "The Gaussian wire-tap channel," IEEE Trans. Inf. Theory, vol. 24, no. 4, pp. 451-456, July 1978.   DOI
9 E. Tekin and A. Yener, "The general Gaussian multiple-access and twoway wiretap channels: Achievable rates and cooperative jamming," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2735-2751, June 2008.   DOI
10 R. Liu, I. Maric, P. Spasojevic, and R. D. Yates,"Discrete memoryless interference and broadcast channels With confidential messages: Secrecy rate regions," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2493-2507, June 2008.   DOI
11 X. Tang, R. Liu, P. Spasojevic, and H. V. Poor, "Interference-assisted secret communication," in Proc. IEEE Information Theory Workshop, Porto, Portugal, Apr. 2008, pp. 164-168.
12 D. Tse and V. Pramod, Fundamentals of wireless communication, Harvard: Cambridge Univ. Press, 2005.
13 S. Goel and R. Negi, "Obtaining secrecy through intentional uncertainty," in Securing Wireless Communications at the Physical Layer, R. Liu, and W. Trappe, Eds., Springer, 2010, Ch. 2.
14 X. He and A. Yender, "Cooperative jamming: The tale of friendly interference for secrecy," in Securing Wireless Communications at the Physical Layer, R. Liu, and W. Trappe, Eds., Springer, 2010, Ch. 4.
15 I. Csiszar and J. Korner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.   DOI
16 S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, June 2008.   DOI
17 F. Oggier and B. Hassibi, "The secrecy capacity of the MIMO wiretap channel," in Proc. IEEE Int. Symp. Information Theory, Toronto, Canada, 2008, pp. 524-528.
18 T. Liu and S. Shamai, "A note on the secrecy capacity of the multipleantenna wiretap channel," IEEE Trans. Inf. Theory, vol. 55, no. 6, pp. 2547-2553, June 2009.   DOI
19 Y. Liang, G. Kramer, H. V. Poor, and S. Shamai, "Compound wire-tap channels," in Proc. 45th Annu. Allerton Conf. Communication, Control, and Computing, 2007.
20 S. Boyd and L. Vandenberghe, Convex optimization, Harvard: Cambridge Univ. Press, 2004.
21 A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas-Part II: TheMIMOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5515-5532, Nov. 2010.   DOI
22 J. Yang, I. M. Kim, and D. I. Kim,"Joint design of optimal cooperative jamming and power allocation for linear precoding," IEEE Trans. Commun., vol. 62, no. 9, pp. 3285-3298, Sept. 2014.   DOI
23 J. Yang, I. M. Kim, and D. I. Kim,"Optimal cooperative jamming for multiuser broadcast channel with multiple eavesdroppers," IEEE Trans. Wireless Commun., vol. 12, no. 6, pp. 2840-2852, June 2013.   DOI
24 J. Nocedal and J. Stephen, Securing wireless communications at the physical layer, New York: Springer, 2000.
25 M. F. Hanif, L.-N. Tran, M. Juntti, and S. Glisic, "On linear precoding strategies for secrecy rate maximization in multiuser multiantenna wireless networks," IEEE Trans. Signal Process., vol. 62, no. 14, pp. 2840-2852, July 2014.
26 A. Khisti and G.W.Wornell, "Secure transmission with multiple antennas I: The MISOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 7, pp. 3088-3104, July 2010.   DOI