Wireless secure enhancement with cooperative jamming
Secrecy capacity of intrinsically secure communication graph (iS-Graph) can be increased by reducing the signal quality of eavesdroppers with adding controlled interferences.The transmission of secret messages over wireless channels in which the legitimate nodes were aided by cooperative jamming was...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2017-02-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017047/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841539487913476096 |
---|---|
author | Li-juan ZHANG Zhi-hong LIU Hong-bo ZHANG Yong ZENG Jian-feng MA |
author_facet | Li-juan ZHANG Zhi-hong LIU Hong-bo ZHANG Yong ZENG Jian-feng MA |
author_sort | Li-juan ZHANG |
collection | DOAJ |
description | Secrecy capacity of intrinsically secure communication graph (iS-Graph) can be increased by reducing the signal quality of eavesdroppers with adding controlled interferences.The transmission of secret messages over wireless channels in which the legitimate nodes were aided by cooperative jamming was studied,and a secure communication graph with jamming,jS-Graph was proposed.First,the security properties of jS-Graph was characterized.Then,jamming strategies to confuse eavesdroppers were proposed.To tackle the nearby eavesdropper problem,a two-stage cooperative jamming strategy to jam the eavesdroppers near the source or the destination was applied.The results demonstrate that,with the aid of cooperative jamming the secure communication graph can lead to secrecy gains.These results help to clarify how the presence of eavesdroppers and the cooperative jamming can influence secure connectivity in wireless networks. |
format | Article |
id | doaj-art-2c2d03d146524985b43da4cd703fb90c |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2017-02-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-2c2d03d146524985b43da4cd703fb90c2025-01-14T07:11:45ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2017-02-013818319559707620Wireless secure enhancement with cooperative jammingLi-juan ZHANGZhi-hong LIUHong-bo ZHANGYong ZENGJian-feng MASecrecy capacity of intrinsically secure communication graph (iS-Graph) can be increased by reducing the signal quality of eavesdroppers with adding controlled interferences.The transmission of secret messages over wireless channels in which the legitimate nodes were aided by cooperative jamming was studied,and a secure communication graph with jamming,jS-Graph was proposed.First,the security properties of jS-Graph was characterized.Then,jamming strategies to confuse eavesdroppers were proposed.To tackle the nearby eavesdropper problem,a two-stage cooperative jamming strategy to jam the eavesdroppers near the source or the destination was applied.The results demonstrate that,with the aid of cooperative jamming the secure communication graph can lead to secrecy gains.These results help to clarify how the presence of eavesdroppers and the cooperative jamming can influence secure connectivity in wireless networks.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017047/cooperative jammingstochastic geometrywireless networksecrecy graph |
spellingShingle | Li-juan ZHANG Zhi-hong LIU Hong-bo ZHANG Yong ZENG Jian-feng MA Wireless secure enhancement with cooperative jamming Tongxin xuebao cooperative jamming stochastic geometry wireless network secrecy graph |
title | Wireless secure enhancement with cooperative jamming |
title_full | Wireless secure enhancement with cooperative jamming |
title_fullStr | Wireless secure enhancement with cooperative jamming |
title_full_unstemmed | Wireless secure enhancement with cooperative jamming |
title_short | Wireless secure enhancement with cooperative jamming |
title_sort | wireless secure enhancement with cooperative jamming |
topic | cooperative jamming stochastic geometry wireless network secrecy graph |
url | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017047/ |
work_keys_str_mv | AT lijuanzhang wirelesssecureenhancementwithcooperativejamming AT zhihongliu wirelesssecureenhancementwithcooperativejamming AT hongbozhang wirelesssecureenhancementwithcooperativejamming AT yongzeng wirelesssecureenhancementwithcooperativejamming AT jianfengma wirelesssecureenhancementwithcooperativejamming |