Wireless secure enhancement with cooperative jamming

Secrecy capacity of intrinsically secure communication graph (iS-Graph) can be increased by reducing the signal quality of eavesdroppers with adding controlled interferences.The transmission of secret messages over wireless channels in which the legitimate nodes were aided by cooperative jamming was...

Full description

Saved in:
Bibliographic Details
Main Authors: Li-juan ZHANG, Zhi-hong LIU, Hong-bo ZHANG, Yong ZENG, Jian-feng MA
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2017-02-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017047/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539487913476096
author Li-juan ZHANG
Zhi-hong LIU
Hong-bo ZHANG
Yong ZENG
Jian-feng MA
author_facet Li-juan ZHANG
Zhi-hong LIU
Hong-bo ZHANG
Yong ZENG
Jian-feng MA
author_sort Li-juan ZHANG
collection DOAJ
description Secrecy capacity of intrinsically secure communication graph (iS-Graph) can be increased by reducing the signal quality of eavesdroppers with adding controlled interferences.The transmission of secret messages over wireless channels in which the legitimate nodes were aided by cooperative jamming was studied,and a secure communication graph with jamming,jS-Graph was proposed.First,the security properties of jS-Graph was characterized.Then,jamming strategies to confuse eavesdroppers were proposed.To tackle the nearby eavesdropper problem,a two-stage cooperative jamming strategy to jam the eavesdroppers near the source or the destination was applied.The results demonstrate that,with the aid of cooperative jamming the secure communication graph can lead to secrecy gains.These results help to clarify how the presence of eavesdroppers and the cooperative jamming can influence secure connectivity in wireless networks.
format Article
id doaj-art-2c2d03d146524985b43da4cd703fb90c
institution Kabale University
issn 1000-436X
language zho
publishDate 2017-02-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-2c2d03d146524985b43da4cd703fb90c2025-01-14T07:11:45ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2017-02-013818319559707620Wireless secure enhancement with cooperative jammingLi-juan ZHANGZhi-hong LIUHong-bo ZHANGYong ZENGJian-feng MASecrecy capacity of intrinsically secure communication graph (iS-Graph) can be increased by reducing the signal quality of eavesdroppers with adding controlled interferences.The transmission of secret messages over wireless channels in which the legitimate nodes were aided by cooperative jamming was studied,and a secure communication graph with jamming,jS-Graph was proposed.First,the security properties of jS-Graph was characterized.Then,jamming strategies to confuse eavesdroppers were proposed.To tackle the nearby eavesdropper problem,a two-stage cooperative jamming strategy to jam the eavesdroppers near the source or the destination was applied.The results demonstrate that,with the aid of cooperative jamming the secure communication graph can lead to secrecy gains.These results help to clarify how the presence of eavesdroppers and the cooperative jamming can influence secure connectivity in wireless networks.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017047/cooperative jammingstochastic geometrywireless networksecrecy graph
spellingShingle Li-juan ZHANG
Zhi-hong LIU
Hong-bo ZHANG
Yong ZENG
Jian-feng MA
Wireless secure enhancement with cooperative jamming
Tongxin xuebao
cooperative jamming
stochastic geometry
wireless network
secrecy graph
title Wireless secure enhancement with cooperative jamming
title_full Wireless secure enhancement with cooperative jamming
title_fullStr Wireless secure enhancement with cooperative jamming
title_full_unstemmed Wireless secure enhancement with cooperative jamming
title_short Wireless secure enhancement with cooperative jamming
title_sort wireless secure enhancement with cooperative jamming
topic cooperative jamming
stochastic geometry
wireless network
secrecy graph
url http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017047/
work_keys_str_mv AT lijuanzhang wirelesssecureenhancementwithcooperativejamming
AT zhihongliu wirelesssecureenhancementwithcooperativejamming
AT hongbozhang wirelesssecureenhancementwithcooperativejamming
AT yongzeng wirelesssecureenhancementwithcooperativejamming
AT jianfengma wirelesssecureenhancementwithcooperativejamming