Abstract
This paper deals with the use of jamming transmission for physical layer security in wireless networks with power constraints. An approach that incorporates a dirty-paper coding (DPC) design with the jamming process under a total power constraint is investigated. The proposed scheme enables both the source and the jammer nodes to create intentional interference on the eavesdropper node and significantly improves the achievable secure rate of the system. A power allocation (PA) policy that defines how the available power is distributed between the source and the jammer node as well as between the superimposed terms of the DPC design is investigated. We show that the PA policy has an important impact on the secrecy performance of the jamming process and determines how the interference should be transmitted between the two independent jamming channels.
Original language | English |
---|---|
Title of host publication | 2010 IEEE Globecom Workshops |
Publisher | IEEE |
Pages | 1177-1181 |
Number of pages | 5 |
ISBN (Electronic) | 9781424488650 |
ISBN (Print) | 9781424488636 |
DOIs | |
Publication status | Published - 24 Jan 2011 |
Event | 2010 IEEE Globecom Workshops - Miami, United States Duration: 5 Dec 2010 → 10 Dec 2010 |
Conference
Conference | 2010 IEEE Globecom Workshops |
---|---|
Abbreviated title | GC'10 |
Country/Territory | United States |
City | Miami |
Period | 5/12/10 → 10/12/10 |
Keywords
- Achievable secrecy rate
- Dirty-paper-coding
- Eavesdropper channel
- Jamming
- Power allocation
ASJC Scopus subject areas
- Computer Networks and Communications
- Communication