Abstract

This article resolves an extreme case in physical layer security: an eavesdropper, located near to a source, can spy on the jamming-seed if it is just cryptographically shared. The direct link between the source and destination is even unavailable. The system is proposed to operate in triple transmi

Highlights

  • Cryptographic security is a popular methodology for avoiding the detection of desire messages by unauthorized users [1]

  • A single active jammer is selected from multiple nodes to improve the performance of physical-layer security (PLS). This method refers to the singlejammer cooperative jamming (SJJ) approach in this article [3, 37,38,39]

  • The distributions of hJaS and hJaE are necessary when computing the secrecy rates in the transmission for the binary jamming message. They are independent from the channel state information (CSI), which are essential for calculating the achievable rates, CRa,S and CD,Ra, at the relay and D

Read more

Summary

Introduction

Cryptographic security is a popular methodology for avoiding the detection of desire messages by unauthorized users [1]. Since many relays are able to securely receive the source transmission in the first phase, they can create a distributed beamformer in the second phase This allows them to null the desired transmitting signal at the eavesdropper, or more generally, to maximize the secrecy rate at the legitimate receivers [13, 22, 29]. A single active jammer is selected from multiple nodes to improve the performance of PLS This method refers to the singlejammer cooperative jamming (SJJ) approach in this article [3, 37,38,39]. We use PLS to protect a random binary jamming message generated by a jammer from being wiretapping by the eavesdropper.

System Model
Hybrid Physical-Layer Security Method
Transmission in the first phase
Transmission in the second and third phases
Jammer and Relay Selection
Outage Performance Analysis
The Outage Probability in Several Current Cooperative Jamming Methods
The outage performance in TDF
The outage performance in SJJ
Outage performance with the BFC method
Simulations and Discussions
Conclusions
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.