Improving Secrecy with Nearly Collinear Main and Wiretap Channels via a Cooperative Jamming Relay
نویسندگان
چکیده
In physical layer security (PHY-security), the frequently observed high correlation between the main and wiretap channels can cause a significant loss of secrecy. This paper investigates a slow fading scenario, where a transmitter (Alice) sends a confidential message to a legitimate receiver (Bob) while a passive eavesdropper (Eve) attempts to decode the message from its received signal. It is assumed that Alice is equipped with multiple antennas while Bob and Eve each have a single antenna (i.e., a MISOSE system). In a MISOSE system, high correlation results in nearly collinear main and wiretap channel vectors, which help Eve to see and intercept confidential information. Unfortunately, the signal processing techniques at Alice, such as beamforming and artificial noise (AN), are helpless, especially in the extreme case of completely collinear main and wiretap channel vectors. On this background, we first investigate the achievable secrecy outage probability via beamforming and AN at Alice with the optimal power allocation between the informationbearing signal and AN. Then, an ingenious model, in which a cooperative jamming relay (Relay) is introduced, is proposed to effectively mitigate the adverse effects of high correlation. Based on the proposed model, the power allocation between the information-bearing signal at Alice and the AN at Relay is also studied to maximize secrecy. Finally, to validate our proposed schemes, numerical simulations are conducted, and the results show that a significant performance gain with respect to secrecy is achieved.
منابع مشابه
Performance Study of Untrusted Relay Network Utilizing Cooperative Jammer
Abstract—In this paper, the problem of secure transmission in two-hop amplify-and-forward (AF) systems with an untrusted relay is investigated. To prevent the untrusted relay from intercepting the source message and to achieve positive secrecy rate, the destination-based cooperative jamming (DBCJ) technique is used. In this method the destination sends an intended jamming signal to the relay. T...
متن کاملSecure Polar Coding for the Two-Way Wiretap Channel
This paper studies polar coding for secure communications over the general two-way wiretap channel, where two legitimate users communicate with each other simultaneously while a passive eavesdropper overhears a combination of their exchanged signals. The legitimate users wish to design a coding scheme such that the interference between their codewords can be leveraged to jam the eavesdropper. T...
متن کاملOn the Application of Noisy Network Coding to the Relay-Eavesdropper Channel
In this paper, we consider the design of a new secrecy transmission scheme for a four-node relay-eavesdropper channel. The key idea of the proposed scheme is to combine noisy network coding with the interference assisted strategy for wiretap channel with a helping interferer. A new achievable secrecy rate is characterized for both discrete memoryless and Gaussian channels. Such a new rate can b...
متن کاملUAV-Enabled Cooperative Jamming for Improving Secrecy of Ground Wiretap Channel
This letter proposes a novel UAV-enabled mobile jamming scheme to improve the secrecy rate of ground wiretap channel. Specifically, a UAV is employed to transmit jamming signals to combat against eavesdropping. Such a mobile jamming scheme is particularly appealing since the UAV-enabled jammer can fly close to the eavesdropper and opportunistically jam it by leveraging the UAV’s mobility. We ai...
متن کاملRobust MIMO Harvest-and-Jam Helpers and Relaying for Secret Communications
Cooperative jamming has been demonstrated to be an effective means to provide secret wireless communications and yet this is realized at the expense of the power consumption of the friendly jammers. This paper considers the scenario where friendly jammers harvest energy wirelessly from the signal transmitted by the source, and then use only the harvested energy to transmit the jamming signals f...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1708.04051 شماره
صفحات -
تاریخ انتشار 2017