Loading…

On the Jamming Power Allocation for Secure Amplify-and-Forward Relaying via Cooperative Jamming

In this paper, we investigate secure communications in two-hop wireless relaying networks with one eavesdropper. To prevent the eavesdropper from intercepting the source message, the destination sends an intended jamming noise to the relay, which is referred to as cooperative jamming. This jamming n...

Full description

Saved in:
Bibliographic Details
Published in:IEEE journal on selected areas in communications 2013-09, Vol.31 (9), p.1741-1750
Main Authors: Ki-Hong Park, Tian Wang, Alouini, Mohamed-Slim
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c263t-5d403d9a32d002fff6a1a443df2026da4064341218fa8567d1ddbdabb53a373e3
cites cdi_FETCH-LOGICAL-c263t-5d403d9a32d002fff6a1a443df2026da4064341218fa8567d1ddbdabb53a373e3
container_end_page 1750
container_issue 9
container_start_page 1741
container_title IEEE journal on selected areas in communications
container_volume 31
creator Ki-Hong Park
Tian Wang
Alouini, Mohamed-Slim
description In this paper, we investigate secure communications in two-hop wireless relaying networks with one eavesdropper. To prevent the eavesdropper from intercepting the source message, the destination sends an intended jamming noise to the relay, which is referred to as cooperative jamming. This jamming noise helps protecting the source message from being captured reliably at the eavesdropper, while the destination cancels its self-intended noise. According to the channel information available at the destination, we derive three jamming power allocation strategies to minimize the outage probability of the secrecy rate. In addition, we derive analytic results quantifying the jamming power consumption of the proposed allocation methods.
doi_str_mv 10.1109/JSAC.2013.130908
format article
fullrecord <record><control><sourceid>crossref_ieee_</sourceid><recordid>TN_cdi_crossref_primary_10_1109_JSAC_2013_130908</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6584934</ieee_id><sourcerecordid>10_1109_JSAC_2013_130908</sourcerecordid><originalsourceid>FETCH-LOGICAL-c263t-5d403d9a32d002fff6a1a443df2026da4064341218fa8567d1ddbdabb53a373e3</originalsourceid><addsrcrecordid>eNo9kEFLwzAYhoMoOKd3wUv-QOeXfGmbHktx6hhMnJ7LtybRStuMtG7s37sy2em9vM9zeBi7FzATArLHxTovZhIEzgRCBvqCTUQc6wgA9CWbQIoY6VQk1-ym738AhFJaTli56vjwbfmC2rbuvvib39vA86bxFQ2177jzga9t9Rssz9ttU7tDRJ2J5j7sKRj-bhs6jOCuJl54v7XhyO3Owlt25ajp7d3_Ttnn_OmjeImWq-fXIl9GlUxwiGKjAE1GKA2AdM4lJEgpNE6CTAwpSBQqIYV2pOMkNcKYjaHNJkbCFC1OGZy8VfB9H6wrt6FuKRxKAeUYqBwDlWOg8hToiDyckNpae74nsVYZKvwDaeZiNg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>On the Jamming Power Allocation for Secure Amplify-and-Forward Relaying via Cooperative Jamming</title><source>IEEE Electronic Library (IEL) Journals</source><creator>Ki-Hong Park ; Tian Wang ; Alouini, Mohamed-Slim</creator><creatorcontrib>Ki-Hong Park ; Tian Wang ; Alouini, Mohamed-Slim</creatorcontrib><description>In this paper, we investigate secure communications in two-hop wireless relaying networks with one eavesdropper. To prevent the eavesdropper from intercepting the source message, the destination sends an intended jamming noise to the relay, which is referred to as cooperative jamming. This jamming noise helps protecting the source message from being captured reliably at the eavesdropper, while the destination cancels its self-intended noise. According to the channel information available at the destination, we derive three jamming power allocation strategies to minimize the outage probability of the secrecy rate. In addition, we derive analytic results quantifying the jamming power consumption of the proposed allocation methods.</description><identifier>ISSN: 0733-8716</identifier><identifier>EISSN: 1558-0008</identifier><identifier>DOI: 10.1109/JSAC.2013.130908</identifier><identifier>CODEN: ISACEM</identifier><language>eng</language><publisher>IEEE</publisher><subject>Amplify-and-forward relaying ; Approximation methods ; Cooperative jamming ; Jamming ; Physical layer security ; Power allocation ; Power demand ; Relays ; Resource management ; Signal to noise ratio</subject><ispartof>IEEE journal on selected areas in communications, 2013-09, Vol.31 (9), p.1741-1750</ispartof><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c263t-5d403d9a32d002fff6a1a443df2026da4064341218fa8567d1ddbdabb53a373e3</citedby><cites>FETCH-LOGICAL-c263t-5d403d9a32d002fff6a1a443df2026da4064341218fa8567d1ddbdabb53a373e3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6584934$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,27924,27925,54796</link.rule.ids></links><search><creatorcontrib>Ki-Hong Park</creatorcontrib><creatorcontrib>Tian Wang</creatorcontrib><creatorcontrib>Alouini, Mohamed-Slim</creatorcontrib><title>On the Jamming Power Allocation for Secure Amplify-and-Forward Relaying via Cooperative Jamming</title><title>IEEE journal on selected areas in communications</title><addtitle>J-SAC</addtitle><description>In this paper, we investigate secure communications in two-hop wireless relaying networks with one eavesdropper. To prevent the eavesdropper from intercepting the source message, the destination sends an intended jamming noise to the relay, which is referred to as cooperative jamming. This jamming noise helps protecting the source message from being captured reliably at the eavesdropper, while the destination cancels its self-intended noise. According to the channel information available at the destination, we derive three jamming power allocation strategies to minimize the outage probability of the secrecy rate. In addition, we derive analytic results quantifying the jamming power consumption of the proposed allocation methods.</description><subject>Amplify-and-forward relaying</subject><subject>Approximation methods</subject><subject>Cooperative jamming</subject><subject>Jamming</subject><subject>Physical layer security</subject><subject>Power allocation</subject><subject>Power demand</subject><subject>Relays</subject><subject>Resource management</subject><subject>Signal to noise ratio</subject><issn>0733-8716</issn><issn>1558-0008</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2013</creationdate><recordtype>article</recordtype><recordid>eNo9kEFLwzAYhoMoOKd3wUv-QOeXfGmbHktx6hhMnJ7LtybRStuMtG7s37sy2em9vM9zeBi7FzATArLHxTovZhIEzgRCBvqCTUQc6wgA9CWbQIoY6VQk1-ym738AhFJaTli56vjwbfmC2rbuvvib39vA86bxFQ2177jzga9t9Rssz9ttU7tDRJ2J5j7sKRj-bhs6jOCuJl54v7XhyO3Owlt25ajp7d3_Ttnn_OmjeImWq-fXIl9GlUxwiGKjAE1GKA2AdM4lJEgpNE6CTAwpSBQqIYV2pOMkNcKYjaHNJkbCFC1OGZy8VfB9H6wrt6FuKRxKAeUYqBwDlWOg8hToiDyckNpae74nsVYZKvwDaeZiNg</recordid><startdate>20130901</startdate><enddate>20130901</enddate><creator>Ki-Hong Park</creator><creator>Tian Wang</creator><creator>Alouini, Mohamed-Slim</creator><general>IEEE</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>20130901</creationdate><title>On the Jamming Power Allocation for Secure Amplify-and-Forward Relaying via Cooperative Jamming</title><author>Ki-Hong Park ; Tian Wang ; Alouini, Mohamed-Slim</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c263t-5d403d9a32d002fff6a1a443df2026da4064341218fa8567d1ddbdabb53a373e3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2013</creationdate><topic>Amplify-and-forward relaying</topic><topic>Approximation methods</topic><topic>Cooperative jamming</topic><topic>Jamming</topic><topic>Physical layer security</topic><topic>Power allocation</topic><topic>Power demand</topic><topic>Relays</topic><topic>Resource management</topic><topic>Signal to noise ratio</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Ki-Hong Park</creatorcontrib><creatorcontrib>Tian Wang</creatorcontrib><creatorcontrib>Alouini, Mohamed-Slim</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) Online</collection><collection>IEEE Explore</collection><collection>CrossRef</collection><jtitle>IEEE journal on selected areas in communications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Ki-Hong Park</au><au>Tian Wang</au><au>Alouini, Mohamed-Slim</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>On the Jamming Power Allocation for Secure Amplify-and-Forward Relaying via Cooperative Jamming</atitle><jtitle>IEEE journal on selected areas in communications</jtitle><stitle>J-SAC</stitle><date>2013-09-01</date><risdate>2013</risdate><volume>31</volume><issue>9</issue><spage>1741</spage><epage>1750</epage><pages>1741-1750</pages><issn>0733-8716</issn><eissn>1558-0008</eissn><coden>ISACEM</coden><abstract>In this paper, we investigate secure communications in two-hop wireless relaying networks with one eavesdropper. To prevent the eavesdropper from intercepting the source message, the destination sends an intended jamming noise to the relay, which is referred to as cooperative jamming. This jamming noise helps protecting the source message from being captured reliably at the eavesdropper, while the destination cancels its self-intended noise. According to the channel information available at the destination, we derive three jamming power allocation strategies to minimize the outage probability of the secrecy rate. In addition, we derive analytic results quantifying the jamming power consumption of the proposed allocation methods.</abstract><pub>IEEE</pub><doi>10.1109/JSAC.2013.130908</doi><tpages>10</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0733-8716
ispartof IEEE journal on selected areas in communications, 2013-09, Vol.31 (9), p.1741-1750
issn 0733-8716
1558-0008
language eng
recordid cdi_crossref_primary_10_1109_JSAC_2013_130908
source IEEE Electronic Library (IEL) Journals
subjects Amplify-and-forward relaying
Approximation methods
Cooperative jamming
Jamming
Physical layer security
Power allocation
Power demand
Relays
Resource management
Signal to noise ratio
title On the Jamming Power Allocation for Secure Amplify-and-Forward Relaying via Cooperative Jamming
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-07T19%3A25%3A12IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-crossref_ieee_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=On%20the%20Jamming%20Power%20Allocation%20for%20Secure%20Amplify-and-Forward%20Relaying%20via%20Cooperative%20Jamming&rft.jtitle=IEEE%20journal%20on%20selected%20areas%20in%20communications&rft.au=Ki-Hong%20Park&rft.date=2013-09-01&rft.volume=31&rft.issue=9&rft.spage=1741&rft.epage=1750&rft.pages=1741-1750&rft.issn=0733-8716&rft.eissn=1558-0008&rft.coden=ISACEM&rft_id=info:doi/10.1109/JSAC.2013.130908&rft_dat=%3Ccrossref_ieee_%3E10_1109_JSAC_2013_130908%3C/crossref_ieee_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c263t-5d403d9a32d002fff6a1a443df2026da4064341218fa8567d1ddbdabb53a373e3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6584934&rfr_iscdi=true