Power allocation for cooperative-based jamming in wireless networks with secrecy constraints

Ioannis Krikidis*, John S. Thompson, Peter M. Grant, Steve McLaughlin

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

14 Citations (Scopus)


This paper deals with the use of jamming transmission for physical layer security in wireless networks with power constraints. An approach that incorporates a dirty-paper coding (DPC) design with the jamming process under a total power constraint is investigated. The proposed scheme enables both the source and the jammer nodes to create intentional interference on the eavesdropper node and significantly improves the achievable secure rate of the system. A power allocation (PA) policy that defines how the available power is distributed between the source and the jammer node as well as between the superimposed terms of the DPC design is investigated. We show that the PA policy has an important impact on the secrecy performance of the jamming process and determines how the interference should be transmitted between the two independent jamming channels.

Original languageEnglish
Title of host publication2010 IEEE Globecom Workshops
Number of pages5
ISBN (Electronic)9781424488650
ISBN (Print)9781424488636
Publication statusPublished - 24 Jan 2011
Event2010 IEEE Globecom Workshops - Miami, United States
Duration: 5 Dec 201010 Dec 2010


Conference2010 IEEE Globecom Workshops
Abbreviated titleGC'10
Country/TerritoryUnited States


  • Achievable secrecy rate
  • Dirty-paper-coding
  • Eavesdropper channel
  • Jamming
  • Power allocation

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Communication


Dive into the research topics of 'Power allocation for cooperative-based jamming in wireless networks with secrecy constraints'. Together they form a unique fingerprint.

Cite this