2015
DOI: 10.1109/tmc.2014.2354031
|View full text |Cite
|
Sign up to set email alerts
|

Minimum Energy Routing and Jamming to Thwart Wireless Network Eavesdroppers

Abstract: Abstract-There is a rich recent literature on informationtheoretically secure communication at the physical layer of wireless networks, where secret communication between a single transmitter and receiver has been studied extensively. In this paper, we consider how single-hop physical layer security techniques can be extended to multi-hop wireless networks. We show that guaranteed security can be achieved in multihop networks by augmenting physical layer security techniques, such as cooperative jamming, with t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
39
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 36 publications
(39 citation statements)
references
References 41 publications
0
39
0
Order By: Relevance
“…Under the channel uncertainty model, our objective is to maximize the achievable secrecy rate at D in (9) by jointly optimizing the beamforming vector w of the desirable signal and the transmit covariance of the jamming signal at R subject to the information rate constraint in (10) and its total transmit power constraint at R in (11). As a result, the optimization problem is formulated as…”
Section: Problem Formulationmentioning
confidence: 99%
See 1 more Smart Citation
“…Under the channel uncertainty model, our objective is to maximize the achievable secrecy rate at D in (9) by jointly optimizing the beamforming vector w of the desirable signal and the transmit covariance of the jamming signal at R subject to the information rate constraint in (10) and its total transmit power constraint at R in (11). As a result, the optimization problem is formulated as…”
Section: Problem Formulationmentioning
confidence: 99%
“…To further improve physical layer security, artificial noise (AN) or cooperative jamming (CJ) approach has been introduced in the secrecy system by embedding *Correspondence: feizesong@bit.edu.cn School of Information and Electronics, Beijing Institute of Technology, Beijing 100081, China noise or jamming signal in the transmitted signal to confuse eavesdroppers [8][9][10][11]. In addition to helping relay the desirable information signals from source nodes to destination nodes, trusted relays can also implement CJ [12,13] to confuse the potential eavesdroppers by simultaneously sending jamming signals together with the information signals.…”
Section: Introductionmentioning
confidence: 99%
“…As a result, there exists a tradeoff between the hops and secure performance, i.e., the problem of secure routing. The authors in [11,12] considered minimum energy routing in the presence of either multiple malicious jammers or eavesdroppers, to guarantee certain end-to-end performance. The authors in [13,14] considered the problem of how to communicate securely with the help of untrusted relays and full-duplex jamming relays, respectively.…”
Section: Introductionmentioning
confidence: 99%
“…[21]- [31]. However, only a few works have considered energy-aware routing with secrecy considerations [32], [33].…”
Section: Introductionmentioning
confidence: 99%
“…Further, in a disadvantaged wireless environment, many passive eavesdroppers might try to intercept the message at each hop, with large uncertainty in the locations of the eavesdroppers, and the eavesdroppers might get arbitrarily close to the transmitters. In such a situation, the energy consumption of any cooperative jamming approach including the scheme of [32], [33] can become very high. Further, if we plan for the wrong number of eavesdroppers or do not correctly anticipate the quality of the eavesdroppers' channels, the secrecy will be compromised.…”
Section: Introductionmentioning
confidence: 99%