Research on cooperative jamming identification algorithms in fading channels

Author(s):  
Jingning Wang ◽  
Zhanlin He ◽  
Zhiping Xu
2019 ◽  
Author(s):  
Mounia Bouabdellah ◽  
Faissal El Bouanani ◽  
Mohamed-Slim Alouini

p.p1 {margin: 0.0px 0.0px 0.0px 0.0px; font: 9.0px Helvetica} span.s1 {font: 7.5px Helvetica} <p>xAbstract—In this paper, the physical layer security of a dualhop</p> <p>underlay uplink cognitive radio network is investigated over</p> <p>Nakagami-m fading channels. Specifically, multiple secondary</p> <p>sources are taking turns in accessing the licensed</p> <p>spectrum of the primary users and communicating with a multiantenna</p> <p>secondary base station (D) through the aid of a multiantenna</p> <p>relay R in the presence of M eavesdroppers </p> <p>that are also equipped with multiple antennas. Among the</p> <p>remaining nodes, one jammer is randomly selected to transmit</p> <p>an artificial noise to disrupt all the eavesdroppers that are</p> <p>attempting to intercept the communication of the legitimate links</p> <p>i.e., Si -R and R-D. The received signals at each node are combined</p> <p>using maximum-ratio combining. Secrecy analysis is provided by</p> <p>deriving closed-form and asymptotic expressions for the secrecy</p> <p>outage probability. The impact of several key parameters on the</p> <p>system’s secrecy e.g., transmit power of the sources, number of</p> <p>eavesdroppers, maximum tolerated interference power, and the</p> <p>number of diversity branches is investigated. Importantly, by</p> <p>considering two scenarios, namely (i) absence and (ii) presence</p> <p>of a friendly jammer, new insights are obtained for the considered</p> <p>communication system. Especially, we tend to answer to the</p> <p>following question: Can better secrecy be achieved without</p> <p>jamming by considering a single antenna at eavesdroppers</p> <p>and multiple-ones at the legitimate users (i.e., relay and enduser)</p> <p>rather than sending permanently an artificial noise and</p> <p>considering that both the relay and the destination are equipped</p> <p>with a single antenna, while multiple antennas are used by the</p> <p>eavesdroppers? The obtained results are corroborated through</p> <p>Monte Carlo simulation and show that the system’s security can</p> <p>be enhanced by adjusting the aforementioned parameters.</p>


2019 ◽  
Author(s):  
Mounia Bouabdellah ◽  
Faissal El Bouanani ◽  
Mohamed-Slim Alouini

p.p1 {margin: 0.0px 0.0px 0.0px 0.0px; font: 9.0px Helvetica} span.s1 {font: 7.5px Helvetica} <p>xAbstract—In this paper, the physical layer security of a dualhop</p> <p>underlay uplink cognitive radio network is investigated over</p> <p>Nakagami-m fading channels. Specifically, multiple secondary</p> <p>sources are taking turns in accessing the licensed</p> <p>spectrum of the primary users and communicating with a multiantenna</p> <p>secondary base station (D) through the aid of a multiantenna</p> <p>relay R in the presence of M eavesdroppers </p> <p>that are also equipped with multiple antennas. Among the</p> <p>remaining nodes, one jammer is randomly selected to transmit</p> <p>an artificial noise to disrupt all the eavesdroppers that are</p> <p>attempting to intercept the communication of the legitimate links</p> <p>i.e., Si -R and R-D. The received signals at each node are combined</p> <p>using maximum-ratio combining. Secrecy analysis is provided by</p> <p>deriving closed-form and asymptotic expressions for the secrecy</p> <p>outage probability. The impact of several key parameters on the</p> <p>system’s secrecy e.g., transmit power of the sources, number of</p> <p>eavesdroppers, maximum tolerated interference power, and the</p> <p>number of diversity branches is investigated. Importantly, by</p> <p>considering two scenarios, namely (i) absence and (ii) presence</p> <p>of a friendly jammer, new insights are obtained for the considered</p> <p>communication system. Especially, we tend to answer to the</p> <p>following question: Can better secrecy be achieved without</p> <p>jamming by considering a single antenna at eavesdroppers</p> <p>and multiple-ones at the legitimate users (i.e., relay and enduser)</p> <p>rather than sending permanently an artificial noise and</p> <p>considering that both the relay and the destination are equipped</p> <p>with a single antenna, while multiple antennas are used by the</p> <p>eavesdroppers? The obtained results are corroborated through</p> <p>Monte Carlo simulation and show that the system’s security can</p> <p>be enhanced by adjusting the aforementioned parameters.</p>


Sign in / Sign up

Export Citation Format

Share Document