2014
DOI: 10.1109/tsp.2013.2293979
|View full text |Cite
|
Sign up to set email alerts
|

Multiuser Diversity for Secrecy Communications Using Opportunistic Jammer Selection: Secure DoF and Jammer Scaling Law

Abstract: In this paper, we propose opportunistic jammer selection in a wireless security system for increasing the secure degrees of freedom (DoF) between a transmitter and a legitimate receiver (say, Alice and Bob). There is a jammer group consisting of S jammers among which Bob selects K jammers. The selected jammers transmit independent and identically distributed Gaussian signals to hinder the eavesdropper (Eve). Since the channels of Bob and Eve are independent, we can select the jammers whose jamming channels are… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
31
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 46 publications
(31 citation statements)
references
References 39 publications
0
31
0
Order By: Relevance
“…Compared with half-duplex systems, full-duplex systems can provide a better performance in terms of transmission rate. An opportunistic relay scheme has been applied to bufferaided systems in [20], [21] and [22]. In the opportunistic relay scheme, the inter-relay interference (IRI) is an important aspect that should be taken into account.…”
Section: A Prior and Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Compared with half-duplex systems, full-duplex systems can provide a better performance in terms of transmission rate. An opportunistic relay scheme has been applied to bufferaided systems in [20], [21] and [22]. In the opportunistic relay scheme, the inter-relay interference (IRI) is an important aspect that should be taken into account.…”
Section: A Prior and Related Workmentioning
confidence: 99%
“…By exploring the feasibility of IRI cancellation at the relay nodes, it gives the threshold to avoid increased relay-pair switching and CSI acquisition. With relay selection, in [22] and [23] jammer selection as well as a joint relay and jammer selection have been proposed. In such systems, relays may obtain a better transmission rate for the legitimate users, whereas jammers can interfere in the transmission to the eavesdropper, resulting in improvement of the secrecy rate.…”
Section: A Prior and Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In [15], the authors investigated the secrecy performance of multiuser downlink networks with the artificial noise by designing an optimal power allocation to maximize the total ergodic secrecy capacity of the system. In [16], to increase the secure degrees of freedom of the main channel, different opportunistic jammer selection schemes were proposed in multiuser wiretap networks. In [17], an optimal user selection scheme for multiuser relaying networks with cooperative jamming was analyzed in terms of the ergodic secrecy rate.…”
Section: Introductionmentioning
confidence: 99%
“…For the classical source-destination-eavesdropper Gaussian wiretap channel, the secrecy capacity is zero when the quality of the legitimate channel is worse than the eavesdropping channel [2]. One way to achieve non-zero secrecy rates in the latter case is to introduce one [3]- [8] or more [9]- [15] external helpers, who transmit artificial noise, thus acting as jammers to the eavesdropper. More complex K-user interference channels (IFC) are considered in [16]- [19], where each user secures its communication from the remaining K−1 users by transmitting jamming signals along with its message signal.…”
Section: Introductionmentioning
confidence: 99%