7-days of FREE Audio papers, translation & more with Prime
7-days of FREE Prime access
7-days of FREE Audio papers, translation & more with Prime
7-days of FREE Prime access
https://doi.org/10.1016/j.ins.2014.05.037
Copy DOIJournal: Information Sciences | Publication Date: Jun 1, 2014 |
Citations: 24 |
Wireless communications nowadays are increasingly becoming irreplaceable networking technologies for military, governmental and financial communications where the data is exploding in volume, variety and velocity, called big data. This poses great challenges to ensuring security through cryptography. Recently, cooperative jamming has been proved as a promising physical layer technique to provide the everlasting security for wireless networks. Based on this scheme, this paper proposes a two-hop transmission protocol with parameters l, k,r and τ (2HR-(l,k,r,τ)) to ensure secure and reliable big data transmissions in wireless networks with multiple eavesdroppers. We first determine the relay selection region (RSR) as the square of side-length l centered at the middle point between the source and the destination. Then one of the k best relays located in the RSR is randomly selected as the message relay. During the forwarding in both hops, the remaining relays at least distance r away from the intended receivers and with channel gain to the intended receivers less than τ are selected to generate jamming signals to confuse the eavesdroppers. The results in this paper indicate that our protocol can provide flexible control of security, reliability and the energy balance performance, which characterizes how energy consumption for forwarding message is balanced among all the relays.
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.