Figure - available from: IET Communications
This content is subject to copyright. Terms and conditions apply.
Pout versus ϕ with Rs=0.1bit/s/Hz, N=7, γS=5dB, γR=10dB, γE=5dB, R0.3,0,D1,0.5,andE1,−1

Pout versus ϕ with Rs=0.1bit/s/Hz, N=7, γS=5dB, γR=10dB, γE=5dB, R0.3,0,D1,0.5,andE1,−1

Source publication
Article
Full-text available
In this study, the authors investigate the secure transmission of a cooperative network, in which a source communicates with a destination via multiple cooperative nodes in the presence of a full‐duplex active eavesdropper, which can intercept the confidential signals and transmit jamming signals simultaneously. To safeguard the security of legitim...

Similar publications

Article
Full-text available
Relay algorithms in power line and wireless dual-media cooperative communication exhibit distinct advantages and disadvantages under random channels, and the algorithm that achieves the best performance can be determined through an adaptive relay strategy. However, the theoretical performance analysis of multiple relay algorithms for mixed fading a...
Article
Full-text available
Cooperative device-to-device (D2D) wireless systems use relays such as amplify-and-forward (AaF) and decode-and-forward (DaF). The AaF relay is simple to implement but amplifies noise as well. Conventional DaF relay does decoding and acts as a regenerative relay, hence deliver better noise performance. In this study, the authors generalise the coop...
Article
Full-text available
Non-orthogonal multiple access (NOMA)-based diamond relaying (NDR) is an efficient approach for combining NOMA and relaying techniques in such a way as to enhance the achievable rate from the source to the destination in the network. This paper examines the problem of joint power allocation among all the transmission phases during the operation of...
Article
Full-text available
In this research, the combination of the relay selection and network coding is used to measure the performance in LOS and NLOS condition over cooperative communication. The research aims are to select the best relay as assisted relay as well as to improve performance system. The research method used four nodes, two nodes as source and destination a...
Preprint
Full-text available
Low power consumption and high spectrum efficiency as the great challenges for multi-device access to Internet-of-Things (IoT) have put forward stringent requirements on the future intelligent network. Ambient backscatter communication (ABcom) is regarded as a promising technology to cope with the two challenges, where backscatter device (BD) can r...

Citations

... Jammer and user selection schemes were presented in [28], and the secrecy outage probability expressions were obtained to evaluate the secrecy performance. In [29], Zhou et al. introduced joint jammer and relay selection schemes in wireless relay network to improve the wireless security. ...
... To the best of our knowledge, the secrecy communication achieved by the EH friendly jammer selection scheme over Nakagami-m fading channels has not been studied in existing literature. Motivated by above observations, in this paper, we explore the physical layer security for a wireless network with the aid of EH friendly jammers in the presence of an eavesdropper, which differs from [27]- [29], where the EH was not be considered. The main contributions of this paper can be summarized as follows. ...
... Substituting C OFJS E from (12) into (29), the SOP of OFJS scheme can be rewritten as ...
Preprint
Full-text available
In this paper, we investigate the physical layer security in an energy harvesting (EH) wireless network composed of a user (U) and a base station (BS) in the face of an eavesdropper. The total communication progress is divided into two phases. In the first phase, friendly jammers (Js) powered by a power beacon (PB). And in the remaining phase, the U sends messages to BS with the help of the Js. To improve the physical layer security, we propose an optimal friendly jammer selection (OFJS) scheme and a suboptimal friendly jammer selection (SFJS) scheme depending on the availability and unavailability of channel state information (CSI) for wiretap link. For the purpose of comparison, we present the random friendly jammer selection (RFJS) scheme. We derive the closedform expressions of connection outage probability (COP), secrecy outage probability (SOP) and effective secrecy throughput (EST) for OFJS, SFJS and RFJS schemes over Nakagami-m fading channels to evaluate the system secrecy performance. Numerical results show that the secrecy performance of proposed OFJS and SFJS schemes is better than that of RFJS scheme, demonstrating the advantage of proposed OFJS and SFJS schemes in improving the physical layer security, and moreover, the performance advantage becomes more significant with the increase of the number of Js. Additionally, due to the influence of COP, three schemes reach the same EST upper bound in the high signal-tonoise ratio (SNR) region.
... In [4], an optimal detector for Willie under AWGN and block fading channels is proposed in single-hop system, [4] also reveals that covert communication can be achieved by varying the transmit power at Alice. Moreover, the randomness of fading channel and nodes like Jammer and Relay can be also treated as interference for Willie's detection [5][6][7]. However, the scenario considered in [6-8] is that Willie can only detect the forward link (Phase 2), whereas ignoring the link between Alice and Relay (Phase 1). ...
Article
Full-text available
Abstract This letter proposes a joint weighted power detector based on maximum a posteriori probability criterion for Willie aiming at two‐hop covert communication scenario, which is a near optimal detector. Instead of only supervising one single phase, Willie combines the observations of two phases to make joint decision in the proposed scheme. The proposed scheme achieves lower probability of detection error than adding‐power‐directly‐detector scheme and the existing single‐phase‐detector scheme due to sufficient utilization of the two‐phase observations. Numerical results demonstrate the benefit of authors' proposed scheme.
... In Vo et al., 17 an energy harvesting wireless sensor network with one sensor source, one destination, and multiple relays in the presence of multiple eavesdroppers was considered, where one of the relays was proposed to act as a jammer, and the closed-form expression for the secrecy outage probability was obtained. In Zhou et al., 18 two joint relay and jammer selection schemes were proposed for a cooperative network with multiple intermediate nodes, and the closed-form expressions for the secrecy outage probability were derived and minimized by optimizing the power allocation. In Guo et al., 19 multiple energy harvesting intermediate nodes were considered to assist the secure communication of a source-destination pair, where a best intermediate node was selected as a relay and all the remaining intermediate nodes were selected as jammers and the sum secrecy rate was maximized by optimizing the energy harvesting parameters and the beamformers. ...
... In Guo et al., 19 multiple energy harvesting intermediate nodes were considered to assist the secure communication of a source-destination pair, where a best intermediate node was selected as a relay and all the remaining intermediate nodes were selected as jammers and the sum secrecy rate was maximized by optimizing the energy harvesting parameters and the beamformers. Note that the previous works [16][17][18][19] only considered to select a relay or a jammer to improve the physical layer security. The works considered to select multiple relays and multiple jammers to improve the physical layer security include. ...
Article
Full-text available
This paper considers an orthogonal frequency division multiplexing (OFDM) based cooperative network, where a source node communicates with a destination node with the help of multiple intermediate nodes, in the presence of an eavesdropper. Each intermediate node is assumed to be able to act as a relay or a jammer to improve the physical layer security. The problem of joint subcarrier allocation, power allocation, and mode selection to maximize the sum secrecy rate is investigated. We first reformulate the problem of subcarrier allocation and intermediate node mode selection as a three‐sided matching game and propose an algorithm that achieves a stable matching. Then, the sum secrecy rate is further improved by proposing a heuristic algorithm to switch the modes of the intermediate nodes. Finally, an iterative power allocation algorithm is proposed. It is verified by simulation results that the proposed algorithm outperforms various benchmark algorithms such as the equal subcarrier allocation algorithm, the pure relay selection algorithm, and the random relay selection algorithm, especially when the transmit power limit is high and the number of intermediate nodes is large. This paper proposes a joint subcarrier allocation, power allocation, and mode selection algorithm to maximize the sum secrecy rate of an OFDM‐based cooperative network with multiple intermediate nodes based on the matching theory. It is shown that the proposed algorithm achieves higher sum secrecy rate than various benchmark algorithms, especially when the transmit power limit is high and the number of intermediate nodes is large.
Article
Wireless Access in Vehicular Environments (WAVE) based vehicular networking has been considered as a promising technology to improve road safety and provide diverse value-added services. However, it is vulnerable to eavesdropping attacks due to the broadcasting nature of wireless communications. Eavesdropping in WAVE based vehicular network can reveal drivers' private and can be taken as preamble to other critical attacks resulting in severe threats to drivers' personal safety and property safety. In this paper, we deal with this threat by proposing an intermittent jamming (IJ) based eavesdropping defense mechanism. The optimal IJ scheme is found by solving the problem of minimizing the jamming energy cost while disabling the eavesdropping activities. The practicability of the design is ensured by considering the network specific communication properties. Numerical analysis is conducted to investigate the relationship between the optimal IJ scheme and the network scenario. Simulation study is carried out to compare the performance of our design with that of the existing continuous jamming (CJ) based scheme. The results indicate that comparing with the CJ scheme, our design uses less energy to disable eavesdropping. IJ saves more than 34% energy while achieving an average packet error rate (PER) of 87.42% at the eavesdropper, and saves more than 22% energy while achieving an average PER of 94.95% at the eavesdropper.
Article
Cooperative jamming (CJ) is one of the important methods to solve security problems of underwater acoustic sensor networks (UASNs). In this paper, we propose a Cooperative Jamming Scheme based on Node Authentication for UASNs to improve the effect of CJ by selecting suitable jamming source for found illegal nodes. In the node authentication, all nodes will be identified by their trust value (TV). TV is calculated according to three types of evidence: channel-based trust evidence, behavior-based trust evidence and energy-based trust evidence. Besides, to deal with cases where legal nodes may be suspected, the historical TV and trust redemption will be considered when calculating TV. In cooperative jamming, according to the link quality, several nodes are selected to jam illegal nodes. Both simulation and field experiment show that the proposed scheme can accurately find the illegal nodes in the time-vary channel and improve the security of the network.
Chapter
With the massive growth of mobile devices and data traffic, it is important to ensure wireless security. Physical layer security utilizing properties of wireless transmission is regarded as a common and promising technology. As a typical physical layer security technology, cooperative jamming is usually affected by social relationships between devices. Devices with excellent social relationships are willing to provide friendly cooperative jamming. Some researchers start to study cooperative jamming using social relationship. In the paper, we propose a social relationship enabled cooperative jamming scheme to achieve secure communications by combining both physical and social information. In particular, we utilize a novel approach to quantify the social relationship metric according to physical locations and effective contact duration between devices. Then, density of legitimate devices as cooperative jammers can be obtained through social relationships. In our scheme, we theoretically analyze the connection outage probability and the secrecy outage probability. Finally, comprehensive numerical results are presented to validate both connection and secrecy performance of cooperative jamming with social relationship.