Minimization of Secrecy Outage Probability with Single-Antenna Uncoordinated Cooperative Jamming

Author(s):  
Darui Hu ◽  
Pengcheng Mu ◽  
Weile Zhang ◽  
Qinye Yin ◽  
Zongze Li
2020 ◽  
Vol 16 (6) ◽  
pp. 155014772093346
Author(s):  
Xin Fan ◽  
Yan Huo

As Internet of Things (IoT) has boomed in recent years, many security issues have also been exposed. Focusing on physical layer security in wireless Internet of Things network communication, a series of security methods have been widely studied. Nevertheless, cooperative jamming methods in physical layer security to fight against collusive eavesdroppers have not been thoroughly studied yet. In this article, we study a cooperative-jamming-based physical layer secure transmission scheme for Internet of Things wireless networks in the presence of collusive eavesdroppers. We design a cooperative jamming strategy without knowing the channel state information of eavesdroppers. Considering the cooperation of multiple nodes with multiple antennas, this strategy can maximize the signal-to-interference-plus-noise ratio at an actuator (legitimate receiver). Meanwhile, the generated cooperative jamming signals can reduce the signal-to-interference-plus-noise ratio at eavesdroppers. To explore the theoretical security performance of our strategy, we perform a secrecy outage probability analysis and an asymptotic analysis. In the cases of cooperative jamming and without cooperative jamming, the closed-form expressions of the secrecy outage probability are deduced, and the influence of system parameters on the secrecy outage probability becomes more intuitive through a strict mathematical asymptotic behavior analysis. In addition, considering the energy limitation of Internet of Things devices, we propose a power allocation algorithm to minimize the total transmission power given the security requirements. The numerical results show the effectiveness of our schemes and are consistent with the theoretical analysis.


Frequenz ◽  
2015 ◽  
Vol 69 (7-8) ◽  
Author(s):  
Yajun Zhang ◽  
Tao Liang ◽  
Aiwei Sun

AbstractIn this paper, we propose a hybrid scheme called transmit antenna selection and receiver’s artificial noise (TAS–rAN) for security enhancement in multiple-input single-output (MISO) wiretap channels. In this scheme, by using TAS protocol, the transmitter selects a single antenna that maximizes the instantaneous signal-to-noise ratio (SNR) at the full-duplex receiver. While the transmitter uses this antenna to transmit secrecy data, the full-duplex receiver would send artificial noise (AN) to confuse the potential eavesdropper. For the proposed protocol, we consider Rayleigh fading channels with different parameters for the main channel and the eavesdropper’s channel, and derive new closed-form expressions for the exact secrecy outage probability and the asymptotic secrecy outage probability. We demonstrate that the proposed TAS–


2021 ◽  
Author(s):  
Shu Xu ◽  
Chen Liu ◽  
Hong Wang ◽  
Mujun Qian ◽  
Wenfeng Sun

Abstract Secure transmission is essential for future non-orthogonal multiple access (NOMA) system. This paper investigates relay-antenna selection (RAS) to enhance physical-layer security (PLS) of cooperative NOMA system in the presence of an eavesdropper, where multiple antennas are deployed at the relays, the users, and the eavesdropper. In order to reduce expense on radio frequency (RF) chains, selection combining (SC) is employed at both the relays and the users, whilst the eavesdropper employs either maximal-ratio combining (MRC) or selection combining (SC) to process the received signals. Under the condition that the channel state information (CSI) of the eavesdropping channel is available or unavailable, two e↵ective relay-antenna selection schemes are proposed. Additionally, the closed-form expressions of secrecy outage probability (SOP) are derived for the proposed relay-antenna selection schemes. In order to gain more deep insights on the derived results, the asymptotic performance of the derived SOP is analyzed. In simulations, it is demonstrated that the theoretical results match well with the simulation results and the SOP of the proposed schemes is less than that of the conventional orthogonal multiple access (OMA) scheme obviously.


IEEE Access ◽  
2020 ◽  
Vol 8 ◽  
pp. 79637-79649
Author(s):  
Tung Pham Huu ◽  
Tam Ninh Thi-Thanh ◽  
Chi Nguyen-Yen ◽  
Hung Tran ◽  
Viet Nguyen Dinh ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document