Skip to main content

Space Power Synthesis-Based Cooperative Jamming for Unknown Channel State Information

  • Conference paper
  • First Online:
Wireless Algorithms, Systems, and Applications (WASA 2017)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 10251))

Abstract

Recently, the physical layer security technologies based on artificial noise and beamforming has been getting in focus. Although those schemes provide an idea to design security policies for wireless networks, most existing works mainly concentrate on the secrecy capacity analysis for known Channel State Information (CSI) of eavesdroppers, as well as the corresponding power allocation and algorithm optimization. Since the eavesdroppers may hide their own personal state information and steal confidential message in the wireless networks, we investigate the space power synthesis for multiple jamming signal in this work, so as to achieve the cooperative jamming in the case of unknown CSI. According to the superposition principle of various electromagnetic waves in space, the multiple jammers-based anti-eavesdropping model is formulated. Taking into account the free space fading, we study the total impact caused by the jammers with different locations in a limited region, and present the corresponding schemes to minimize the synthetic jamming power of all jammers at the legitimate user. Numerical simulation results demonstrate that our solutions to the cooperative jamming problem can make the strength of the synthesized interference power at the legitimate user be the lowest value in a confined region. Based on this, we can improve the system secrecy capacity when the CSI of eavesdropper is unknown.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Cai, Z., Duan, Y., Bourgeois, A.G.: Delay efficient opportunistic routing in asynchronous multi-channel cognitive radio networks. J. Combin. Optim. 29(4), 815–835 (2015)

    Article  MathSciNet  MATH  Google Scholar 

  2. Duan, Y., Liu, G., Cai, Z.: Opportunistic channel-hopping based effective rendezvous establishment in cognitive radio networks. In: Wang, X., Zheng, R., Jing, T., Xing, K. (eds.) WASA 2012. LNCS, vol. 7405, pp. 324–336. Springer, Heidelberg (2012). doi:10.1007/978-3-642-31869-6_28

    Chapter  Google Scholar 

  3. Yu, L., Sapra, K., Shen, H., Ye, L.: Cooperative end-to-end traffic redundancy elimination for reducing cloud bandwidth cost. In: IEEE International Conference on Network Protocols, pp. 1–10 (2012)

    Google Scholar 

  4. Mukherjee, A., Fakoorian, S.A.A., Huang, J., Swindlehurst, A.L.: Principles of physical layer security in multiuser wireless networks: a survey. IEEE Commun. Surv. Tutor. 16(3), 1550–1573 (2014). Thrid

    Article  Google Scholar 

  5. Jiang, K., Jing, T., Li, Z., Huo, Y., Zhang, F.: Analysis of secrecy performance in fading multiple access wiretap channel with SIC receiver. In: IEEE INFOCOM 2017 - The 36th Annual IEEE International Conference on Computer Communications, pp. 1–9, May 2016

    Google Scholar 

  6. Shiu, Y.S., Chang, S.Y., Wu, H.C., Huang, S.C.H., Chen, H.H.: Physical layer security in wireless networks: a tutorial. IEEE Wirel. Commun. 18(2), 66–74 (2011)

    Article  Google Scholar 

  7. Jing, T., Shi, H., Huo, Y., Ma, L., Cai, Z.: A novel channel assignment scheme for multi-radio multi-channel wireless mesh networks. In: Cheng, Y., Eun, D.Y., Qin, Z., Song, M., Xing, K. (eds.) WASA 2011. LNCS, vol. 6843, pp. 261–270. Springer, Heidelberg (2011). doi:10.1007/978-3-642-23490-3_24

    Chapter  Google Scholar 

  8. Guan, X., Li, A., Cai, Z., Ohtsuki, T.: Coalition graph game for robust routing in cooperative cognitive radio networks. Mobile Netw. Appl. 20(2), 147–156 (2015)

    Article  Google Scholar 

  9. Ozarow, L.H., Wyner, A.D.: Wire-tap channel ii. AT T Bell Lab. Tech. J. 63(10), 2135–2157 (1984)

    Article  MATH  Google Scholar 

  10. Tekin, E., Yener, A.: The general Gaussian multiple-access and two-way wiretap channels: achievable rates and cooperative jamming. IEEE Trans. Inf. Theory 54(6), 2735–2751 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  11. Negi, R., Goel, S.: Secret communication using artificial noise. In: 2005 IEEE 62nd Vehicular Technology Conference on VTC-2005-Fall, 2005, vol. 3, pp. 1906–1910, September 2005

    Google Scholar 

  12. Weingarten, H., Steinberg, Y., Shamai, S.S.: The capacity region of the gaussian multiple-input multiple-output broadcast channel. IEEE Trans. Inf. Theory 52(9), 3936–3964 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  13. Shen, W., Ning, P., He, X., Dai, H.: Ally friendly jamming: how to jam your enemy and maintain your own wireless connectivity at the same time. In: 2013 IEEE Symposium on Security and Privacy, pp. 174–188, May 2013

    Google Scholar 

  14. Oggier, F., Hassibi, B.: The secrecy capacity of the mimo wiretap channel. IEEE Trans. Inf. Theory 57(8), 4961–4972 (2011)

    Article  MathSciNet  Google Scholar 

  15. Li, Z., Jing, T., Cheng, X., Huo, Y., Zhou, W., Chen, D.: Cooperative jamming for secure communications in MIMO cooperative cognitive radio networks. In: 2015 IEEE International Conference on Communications (ICC), pp. 7609–7614, June 2015

    Google Scholar 

  16. Li, Z., Jing, T., Huo, Y., Qian, J.: Worst-case jamming for secure communications in multi-antenna cooperative cognitive radio networks with energy harvesting. In: 2015 International Conference on Identification, Information, and Knowledge in the Internet of Things (IIKI), pp. 110–115, October 2015

    Google Scholar 

  17. Lin, P.H., Gabry, F., Thobaben, R., Jorswieck, E.A., Skoglund, M.: Multi-phase smart relaying and cooperative jamming in secure cognitive radio networks. IEEE Trans. Cogn. Commun. Netw. 2(1), 38–52 (2016)

    Article  Google Scholar 

  18. Nguyen, V.D., Duong, T.Q., Dobre, O.A., Shin, O.S.: Joint information and jamming beamforming for secrecy rate maximization in cognitive radio networks. IEEE Trans. Inf. Forensics Secur. 11(11), 2609–2623 (2016)

    Article  Google Scholar 

  19. Vilela, J.P., Bloch, M., Barros, J., McLaughlin, S.W.: Wireless secrecy regions with friendly jamming. IEEE Trans. Inf. Forensics Secur. 6(2), 256–266 (2011)

    Article  Google Scholar 

  20. Li, H., Wang, X., Hou, W.: Security enhancement in cooperative jamming using compromised secrecy region minimization. In: 2013 13th Canadian Workshop on Information Theory, pp. 214–218, June 2013

    Google Scholar 

  21. Li, Z., Jing, T., Ma, L., Huo, Y., Qian, J.: Worst-case cooperative jamming for secure communications in CIoT networks. Sensors 16(3), 339 (2016)

    Article  Google Scholar 

Download references

Acknowledgments

We are very grateful to all reviewers who have helped improve the quality of this paper. This work was supported by the National Natural Science Foundation of China (Grant Nos. 61471028 and 61572070) and the Fundamental Research Funds for the Central Universities (Grant No. 2016JBZ003).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xin Fan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Fan, X., Huang, L., Huo, Y., Hu, C., Tian, Y., Qian, J. (2017). Space Power Synthesis-Based Cooperative Jamming for Unknown Channel State Information. In: Ma, L., Khreishah, A., Zhang, Y., Yan, M. (eds) Wireless Algorithms, Systems, and Applications. WASA 2017. Lecture Notes in Computer Science(), vol 10251. Springer, Cham. https://doi.org/10.1007/978-3-319-60033-8_42

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-60033-8_42

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-60032-1

  • Online ISBN: 978-3-319-60033-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics