Intelligent Reflecting Surface Enhanced Secure Transmission Against Both Jamming and Eavesdropping Attacks
نویسندگان
چکیده
Both the jammer and eavesdropper pose severe threat to wireless communications due broadcast nature of channels. In this paper, an intelligent reflecting surface (IRS) assisted secure communication system is considered, where a base station (BS) wishes reliably convey information user, in presence both whose transmit informations are not completely known. Specifically, with imperfect third-party node's channel state (CSI) no knowledge jammer's beamforming, we aim maximize achievable rate by jointly designing BS's beamforming IRS's reflect while limiting leakage potential eavesdropper. Due non-convexity intractability original problem induced incompleted information, utilize auxiliary variables, Cauchy-Schwarz inequality, General Sign-Definiteness transformation convert optimization into tractable convex problem, then obtain high-quality optimal solution using successive approximation penalty concave procedure. Numerical simulations demonstrate superiority our proposed algorithm compared existing approaches, also reveal impact key parameters on performance.
منابع مشابه
Eavesdropping and Jamming Communication Networks
Eavesdropping and jamming communication networks is an important part of any military engagement. However, until recently there has been very limited research in this area. Two recent papers by Commander et al. [2, 3] addressing this problem represent the current state-of-the-art in the study of the WIRELESS NETWORK JAMMING PROBLEM. In this chapter, we survey the problem and highlight the resul...
متن کاملPerformance Analysis of cooperative SWIPT System: Intelligent Reflecting Surface versus Decode-and-Forward
In this paper, we explore the impacts of utilizing intelligent reflecting surfaces (IRS) in a power-splitting based simultaneous wireless information and power transfer (PS-SWIPT) system and compare its performance with the traditional decode and forward relaying system. To analyze a more practical system, it is also assumed that the receiving nodes are subject to decoding cost, and they are on...
متن کاملSecure Transmission of Underlay Cognitive Radio with Passive Eavesdropping
The security in cognitive radio networks (CRNs) has attracted recently a significant attention due to the open environment of the spectrum sharing networks, which make them more vulnerable to wireless attacks. In this paper, we consider the problem of physical layer security in CRNs. Our objective is to enhance the secrecy performance of the secondary user (SU) in the presence of passive eavesd...
متن کاملSecure Network Coding Against the Contamination and Eavesdropping Adversaries
In this paper, we propose an algorithm that targets contamination and eavesdropping adversaries. We consider the case when the number of independent packets available to the eavesdropper is less than the multicast capacity of the network. By means of our algorithm every node can verify the integrity of the received packets easily and an eavesdropper is unable to get any “meaningful information”...
متن کاملData-Aided Secure Massive MIMO Transmission with Active Eavesdropping
In this paper, we study the design of secure communication for time division duplexing multi-cell multi-user massive multiple-input multiple-output (MIMO) systems with active eavesdropping. We assume that the eavesdropper actively attacks the uplink pilot transmission and the uplink data transmission before eavesdropping the downlink data transmission phase of the desired users. We exploit both...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Vehicular Technology
سال: 2021
ISSN: ['0018-9545', '1939-9359']
DOI: https://doi.org/10.1109/tvt.2021.3104580