Loading…
On the Jamming Power Allocation for Secure Amplify-and-Forward Relaying via Cooperative Jamming
In this paper, we investigate secure communications in two-hop wireless relaying networks with one eavesdropper. To prevent the eavesdropper from intercepting the source message, the destination sends an intended jamming noise to the relay, which is referred to as cooperative jamming. This jamming n...
Saved in:
Published in: | IEEE journal on selected areas in communications 2013-09, Vol.31 (9), p.1741-1750 |
---|---|
Main Authors: | , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c263t-5d403d9a32d002fff6a1a443df2026da4064341218fa8567d1ddbdabb53a373e3 |
---|---|
cites | cdi_FETCH-LOGICAL-c263t-5d403d9a32d002fff6a1a443df2026da4064341218fa8567d1ddbdabb53a373e3 |
container_end_page | 1750 |
container_issue | 9 |
container_start_page | 1741 |
container_title | IEEE journal on selected areas in communications |
container_volume | 31 |
creator | Ki-Hong Park Tian Wang Alouini, Mohamed-Slim |
description | In this paper, we investigate secure communications in two-hop wireless relaying networks with one eavesdropper. To prevent the eavesdropper from intercepting the source message, the destination sends an intended jamming noise to the relay, which is referred to as cooperative jamming. This jamming noise helps protecting the source message from being captured reliably at the eavesdropper, while the destination cancels its self-intended noise. According to the channel information available at the destination, we derive three jamming power allocation strategies to minimize the outage probability of the secrecy rate. In addition, we derive analytic results quantifying the jamming power consumption of the proposed allocation methods. |
doi_str_mv | 10.1109/JSAC.2013.130908 |
format | article |
fullrecord | <record><control><sourceid>crossref_ieee_</sourceid><recordid>TN_cdi_crossref_primary_10_1109_JSAC_2013_130908</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6584934</ieee_id><sourcerecordid>10_1109_JSAC_2013_130908</sourcerecordid><originalsourceid>FETCH-LOGICAL-c263t-5d403d9a32d002fff6a1a443df2026da4064341218fa8567d1ddbdabb53a373e3</originalsourceid><addsrcrecordid>eNo9kEFLwzAYhoMoOKd3wUv-QOeXfGmbHktx6hhMnJ7LtybRStuMtG7s37sy2em9vM9zeBi7FzATArLHxTovZhIEzgRCBvqCTUQc6wgA9CWbQIoY6VQk1-ym738AhFJaTli56vjwbfmC2rbuvvib39vA86bxFQ2177jzga9t9Rssz9ttU7tDRJ2J5j7sKRj-bhs6jOCuJl54v7XhyO3Owlt25ajp7d3_Ttnn_OmjeImWq-fXIl9GlUxwiGKjAE1GKA2AdM4lJEgpNE6CTAwpSBQqIYV2pOMkNcKYjaHNJkbCFC1OGZy8VfB9H6wrt6FuKRxKAeUYqBwDlWOg8hToiDyckNpae74nsVYZKvwDaeZiNg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>On the Jamming Power Allocation for Secure Amplify-and-Forward Relaying via Cooperative Jamming</title><source>IEEE Electronic Library (IEL) Journals</source><creator>Ki-Hong Park ; Tian Wang ; Alouini, Mohamed-Slim</creator><creatorcontrib>Ki-Hong Park ; Tian Wang ; Alouini, Mohamed-Slim</creatorcontrib><description>In this paper, we investigate secure communications in two-hop wireless relaying networks with one eavesdropper. To prevent the eavesdropper from intercepting the source message, the destination sends an intended jamming noise to the relay, which is referred to as cooperative jamming. This jamming noise helps protecting the source message from being captured reliably at the eavesdropper, while the destination cancels its self-intended noise. According to the channel information available at the destination, we derive three jamming power allocation strategies to minimize the outage probability of the secrecy rate. In addition, we derive analytic results quantifying the jamming power consumption of the proposed allocation methods.</description><identifier>ISSN: 0733-8716</identifier><identifier>EISSN: 1558-0008</identifier><identifier>DOI: 10.1109/JSAC.2013.130908</identifier><identifier>CODEN: ISACEM</identifier><language>eng</language><publisher>IEEE</publisher><subject>Amplify-and-forward relaying ; Approximation methods ; Cooperative jamming ; Jamming ; Physical layer security ; Power allocation ; Power demand ; Relays ; Resource management ; Signal to noise ratio</subject><ispartof>IEEE journal on selected areas in communications, 2013-09, Vol.31 (9), p.1741-1750</ispartof><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c263t-5d403d9a32d002fff6a1a443df2026da4064341218fa8567d1ddbdabb53a373e3</citedby><cites>FETCH-LOGICAL-c263t-5d403d9a32d002fff6a1a443df2026da4064341218fa8567d1ddbdabb53a373e3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6584934$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,27924,27925,54796</link.rule.ids></links><search><creatorcontrib>Ki-Hong Park</creatorcontrib><creatorcontrib>Tian Wang</creatorcontrib><creatorcontrib>Alouini, Mohamed-Slim</creatorcontrib><title>On the Jamming Power Allocation for Secure Amplify-and-Forward Relaying via Cooperative Jamming</title><title>IEEE journal on selected areas in communications</title><addtitle>J-SAC</addtitle><description>In this paper, we investigate secure communications in two-hop wireless relaying networks with one eavesdropper. To prevent the eavesdropper from intercepting the source message, the destination sends an intended jamming noise to the relay, which is referred to as cooperative jamming. This jamming noise helps protecting the source message from being captured reliably at the eavesdropper, while the destination cancels its self-intended noise. According to the channel information available at the destination, we derive three jamming power allocation strategies to minimize the outage probability of the secrecy rate. In addition, we derive analytic results quantifying the jamming power consumption of the proposed allocation methods.</description><subject>Amplify-and-forward relaying</subject><subject>Approximation methods</subject><subject>Cooperative jamming</subject><subject>Jamming</subject><subject>Physical layer security</subject><subject>Power allocation</subject><subject>Power demand</subject><subject>Relays</subject><subject>Resource management</subject><subject>Signal to noise ratio</subject><issn>0733-8716</issn><issn>1558-0008</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2013</creationdate><recordtype>article</recordtype><recordid>eNo9kEFLwzAYhoMoOKd3wUv-QOeXfGmbHktx6hhMnJ7LtybRStuMtG7s37sy2em9vM9zeBi7FzATArLHxTovZhIEzgRCBvqCTUQc6wgA9CWbQIoY6VQk1-ym738AhFJaTli56vjwbfmC2rbuvvib39vA86bxFQ2177jzga9t9Rssz9ttU7tDRJ2J5j7sKRj-bhs6jOCuJl54v7XhyO3Owlt25ajp7d3_Ttnn_OmjeImWq-fXIl9GlUxwiGKjAE1GKA2AdM4lJEgpNE6CTAwpSBQqIYV2pOMkNcKYjaHNJkbCFC1OGZy8VfB9H6wrt6FuKRxKAeUYqBwDlWOg8hToiDyckNpae74nsVYZKvwDaeZiNg</recordid><startdate>20130901</startdate><enddate>20130901</enddate><creator>Ki-Hong Park</creator><creator>Tian Wang</creator><creator>Alouini, Mohamed-Slim</creator><general>IEEE</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>20130901</creationdate><title>On the Jamming Power Allocation for Secure Amplify-and-Forward Relaying via Cooperative Jamming</title><author>Ki-Hong Park ; Tian Wang ; Alouini, Mohamed-Slim</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c263t-5d403d9a32d002fff6a1a443df2026da4064341218fa8567d1ddbdabb53a373e3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2013</creationdate><topic>Amplify-and-forward relaying</topic><topic>Approximation methods</topic><topic>Cooperative jamming</topic><topic>Jamming</topic><topic>Physical layer security</topic><topic>Power allocation</topic><topic>Power demand</topic><topic>Relays</topic><topic>Resource management</topic><topic>Signal to noise ratio</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Ki-Hong Park</creatorcontrib><creatorcontrib>Tian Wang</creatorcontrib><creatorcontrib>Alouini, Mohamed-Slim</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) Online</collection><collection>IEEE Explore</collection><collection>CrossRef</collection><jtitle>IEEE journal on selected areas in communications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Ki-Hong Park</au><au>Tian Wang</au><au>Alouini, Mohamed-Slim</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>On the Jamming Power Allocation for Secure Amplify-and-Forward Relaying via Cooperative Jamming</atitle><jtitle>IEEE journal on selected areas in communications</jtitle><stitle>J-SAC</stitle><date>2013-09-01</date><risdate>2013</risdate><volume>31</volume><issue>9</issue><spage>1741</spage><epage>1750</epage><pages>1741-1750</pages><issn>0733-8716</issn><eissn>1558-0008</eissn><coden>ISACEM</coden><abstract>In this paper, we investigate secure communications in two-hop wireless relaying networks with one eavesdropper. To prevent the eavesdropper from intercepting the source message, the destination sends an intended jamming noise to the relay, which is referred to as cooperative jamming. This jamming noise helps protecting the source message from being captured reliably at the eavesdropper, while the destination cancels its self-intended noise. According to the channel information available at the destination, we derive three jamming power allocation strategies to minimize the outage probability of the secrecy rate. In addition, we derive analytic results quantifying the jamming power consumption of the proposed allocation methods.</abstract><pub>IEEE</pub><doi>10.1109/JSAC.2013.130908</doi><tpages>10</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0733-8716 |
ispartof | IEEE journal on selected areas in communications, 2013-09, Vol.31 (9), p.1741-1750 |
issn | 0733-8716 1558-0008 |
language | eng |
recordid | cdi_crossref_primary_10_1109_JSAC_2013_130908 |
source | IEEE Electronic Library (IEL) Journals |
subjects | Amplify-and-forward relaying Approximation methods Cooperative jamming Jamming Physical layer security Power allocation Power demand Relays Resource management Signal to noise ratio |
title | On the Jamming Power Allocation for Secure Amplify-and-Forward Relaying via Cooperative Jamming |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-07T19%3A25%3A12IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-crossref_ieee_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=On%20the%20Jamming%20Power%20Allocation%20for%20Secure%20Amplify-and-Forward%20Relaying%20via%20Cooperative%20Jamming&rft.jtitle=IEEE%20journal%20on%20selected%20areas%20in%20communications&rft.au=Ki-Hong%20Park&rft.date=2013-09-01&rft.volume=31&rft.issue=9&rft.spage=1741&rft.epage=1750&rft.pages=1741-1750&rft.issn=0733-8716&rft.eissn=1558-0008&rft.coden=ISACEM&rft_id=info:doi/10.1109/JSAC.2013.130908&rft_dat=%3Ccrossref_ieee_%3E10_1109_JSAC_2013_130908%3C/crossref_ieee_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c263t-5d403d9a32d002fff6a1a443df2026da4064341218fa8567d1ddbdabb53a373e3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6584934&rfr_iscdi=true |