Abstract

This work addresses the security of a two-user broadcast channel. The challenge of protecting a broadcast channel is associated with the necessity of securing the system, not only against eavesdropping attacks originating from external nodes, but also to ensure that the inside users do not eavesdrop on each other’s information. To address this issue, the present work proposes a cooperative jamming scheme that provides protection against eavesdropping attacks carried out simultaneously by inside users and external eavesdroppers. To achieve this goal, the developed scheme combines real interference alignment with a blind cooperative jamming technique defined in the literature. An information theoretical analysis shows that positive secure degrees of freedom are achievable using the proposed solution.

Highlights

  • In commercial wireless standards, protection against eavesdropping attacks has been provided by cryptographic protocols [1,2]

  • To the best of the authors’ knowledge, securing a broadcast channel against eavesdropping address this issue, the present work extends [20] by providing a cooperative jamming solution that attacks carried out simultaneously by internal users and external eavesdroppers is an open problem protects a two-user broadcast channel against passive eavesdropping attacks carried out by that remains untreated in the literature

  • Due to the large number of channel gains that must be known at each terminal, one of the main challenges associated with the practical implementation of the proposed scheme is related to the complexity and overhead associated with the channel training phase

Read more

Summary

Introduction

Protection against eavesdropping attacks has been provided by cryptographic protocols [1,2]. With the recent progress in the field of quantum processing, some of these difficult mathematical problems will be solvable [3], making the current cryptographic techniques less secure. A research line that has been followed to address these new threats focuses on exploiting the random properties of the wireless channel with the aim of developing advanced security functionalities at the physical layer [4,5,6]. Contrary to what happens with commercial cryptosystems, in physical layer security, the secrecy performance is quantified from an information theoretical perspective, not relying on any type of technological limitation at the eavesdropper

Motivation and Related Work
Contribution
System Model
Preliminaries
Security Scheme
Secrecy Analysis
DoF Characterization at “B0 ”
DoF Characterization at “B1 ”
Discussion
Conclusions

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.