The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this work, we consider a wireless powered communication network (WPCN) with an energy harvesting (EH) jammer where an eavesdropper tries to wiretap the communication between a user and a hybrid access-point (H-AP). In our system, the H-AP first transmits an energy signal to recharge the batteries of the EH user and the EH jammer in the energy transfer (ET) phase. Then, in the subsequent information...
In this paper, the security of multi-input single- output (MISO) amplify-and-forward relaying network with untrustworthy relay nodes is considered, where the untrustworthy nodes can help to forward the received signal and they may also try to decode such information, which can be regarded as potential eavesdroppers (Eves). To deal with such kind of smarter Eves, relay selection is adopted and both...
The trustworthiness of nodes in a network is practically a complicated concept and strongly depends on the social relationship among the nodes. For a certain model of trustworthiness, the scheme can be optimized to achieve the highest average secrecy rate based on pre-defined information about possibly malicious nodes. In such a scheme, the secrecy rate is considered as a function of the maximum achievable...
In this paper, we propose a new joint relay and jammer selection (JRJS) scheme to enhance the physical layer security for cooperative wireless networks with multiple intermediate nodes, where the decode-and-forward (DF) protocol is considered. In the proposed JRJS scheme, an ntermediate node is selected as the relay for data transmission, while the others are used to act as friendly jammers for disrupting...
In this paper, we consider the secure connection problem in multihop wireless networks with full-duplex (FD) jamming relaying, where the colluding eavesdroppers are randomly distributed following a homogeneous Poisson point process (PPP). By applying FD, each legitimate node (including relay and destination) jams the eavesdroppers when it receives the desired signal from transmitter. We adopt the...
In this paper, we investigate the physical layer security for heterogeneous networks (HetNets), where the confidential message transmitted to each legitimate user can be eavesdropped by multiple eavesdroppers. To enhance the secrecy performance, we introduce friendly jammers and full duplex users in our model. We propose a jammer selection scheme based on average user received jamming power. The jammers...
In this paper, we consider the multi-channel power optimization to enhance security for a full-duplex (FD) transmission pair. The FD-enabled concurrent transmissions between the users, on one hand, induce self-interference at their own receivers, and on the other hand, act as friendly jamming to degrade the eavesdropping for the other. To elaborate on such a tradeoff for secrecy maximization, we investigate...
Abstract-We define a new class of modulations for wireless communication that use indelible electromagnetic signals to convey information. We describe the modulations' theory and show that they admit a large trade-space between data rate and security against hostile interference. We combinatorically analyze jammer attacks against the two presently known instances of these waveforms, and we explore...
In this paper, we propose a novel anti- eavesdropping scheme by introducing friendly jammers to a wireless network of things (WNoT). In particular, we establish a theoretical framework to evaluate the eavesdropping risk of WNoT with friendly jammers and the eavesdropping risk of WNoT without jammers. Our theoretical model takes into account various channel conditions such as the path loss and Rayleigh...
Security has become an increasingly important issue in wireless communications for the IoT (Internet of Things) environments, to which physical layer approaches can contribute by differentiating desired transceiver and wiretap channels for security of confidential data. In this paper, we propose an optimal power allocation strategy for practical physical-layer security, based on friendly jamming with...
We consider a Gaussian network consisting of a source that aims to communicate to its legitimate destination via an untrusted relay node in the presence of an external eavesdropper. The source wishes to send two independent messages to the destination: one message must be kept secret from the external eavesdropper only, while the other message must be kept secret from the external eavesdropper and...
In this paper, we investigate the problem of jammer selection for securing Cooperative Cognitive Radio Networks (CCRNs) with the Multiple-Input Multiple- Output (MIMO) capability. In the CCRN under our consideration, there exist a pair of Primary Users (PUs), a relay node, a number of Secondary User (SU) pairs, and an eavesdropper. The PUs need to select a pair of SUs as jammers to interfere with...
In this paper, we investigate the physical-layer security for a wireless communications network comprised of multiple users and a common base station (BS) in the presence of an eavesdropper. We propose a joint user-jammer selection scheme for preventing the eavesdropper from intercepting the confidential user-BS transmission. Specifically, a user is first selected to transmit its message to the BS,...
In this paper, the critical effect of noisy feedback in improving the physical layer security is investigated. Unlike previous works, where the eavesdropper's channel state information (either the instantaneous channel state information or the channel distribution information) is assumed known, a feedback and jamming scheme without any eavesdropper's channel state information is studied, which allows...
This paper studies privacy-preserving for downlink transmission in multiuser relay systems, where a source communicates with multiple users via a relay employing the amplify-and-forward (AF) protocol. At any scheduling unit, only one user (desired user) is selected to receive the source information, and the other users (undesired users) are viewed as potential eavesdroppers due to the broadcast nature...
We study the secrecy capacity of the multiple- input single-output (MISO) Gaussian wiretap visible light communication (VLC) channel. We study a typical VLC scenario with one transmitter, one legitimate receiver, and one eavesdropper. Specifically, we compute the achievable secrecy rate for various input signaling distributions, including the truncated generalized normal (TGN) and uniform distributions...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.