Cooperative jamming for wireless physical layer security

Lun Dong, Zhu Han, Athina P. Petropulu, H. Vincent Poor

Research output: Chapter in Book/Report/Conference proceedingConference contribution

117 Scopus citations

Abstract

Cooperative jamming is an approach that has been recently proposed for improving physical layer based security for wireless networks in the presence of an eavesdropper. While the source transmits its message to its destination, a relay node transmits a jamming signal to create interference at the eavesdropper. In this paper, a scenario in which the relay is equipped with multiple antennas is considered. A novel system design is proposed for determining the antenna weights and transmit power of source and relay, so that the system secrecy rate is maximized subject to a total transmit power constraint, or, the transmit power is minimized subject to a secrecy rate constraint. Since the optimal solutions to these problems are difficult to obtain, suboptimal closed-form solutions are proposed that introduce an additional constraint, i.e., the complete nulling of jamming signal at the destination.

Original languageEnglish (US)
Title of host publication2009 IEEE/SP 15th Workshop on Statistical Signal Processing, SSP '09
Pages417-420
Number of pages4
DOIs
StatePublished - 2009
Event2009 IEEE/SP 15th Workshop on Statistical Signal Processing, SSP '09 - Cardiff, United Kingdom
Duration: Aug 31 2009Sep 3 2009

Publication series

NameIEEE Workshop on Statistical Signal Processing Proceedings

Other

Other2009 IEEE/SP 15th Workshop on Statistical Signal Processing, SSP '09
Country/TerritoryUnited Kingdom
CityCardiff
Period8/31/099/3/09

All Science Journal Classification (ASJC) codes

  • Electrical and Electronic Engineering
  • Applied Mathematics
  • Signal Processing
  • Computer Science Applications

Keywords

  • Cooperation
  • Cooperative jamming
  • Physical layer security
  • Secrecy rate

Fingerprint

Dive into the research topics of 'Cooperative jamming for wireless physical layer security'. Together they form a unique fingerprint.

Cite this