Secure Communication through Wireless-Powered Friendly Jamming: Jointly Online Optimization over Geography, Energy and Time

Exploring the interference-emitting friendly jammers to protect the sensitive communications in the presence of eavesdroppers has increasingly being investigated in literature. In parallel, scavenging energy from abient radio signals for energy-constrained devices, namely wireless energy harvesting (WEH), has also drawn significant attention. Without relying on external energy supply, the wireless-powered friendly jammer by WEH from legitimate wireless devices is an effective approach to prolong their lifetime and gain the flexibility in deployments. This paper studies the online optimization of the placement and WEH of a set of friendly jammers in a geographic location with the energy-efficiency (EE) consideration. We adopt a simple “time switching” protocol where power transfer and jammerassisted secure communications occur in different time blocks when WEH requests are launched. Our scheme has the following important advantages: 1) The proposed online jammers placement and interfering power allocation to attack eavesdroppers is the first distributed and scalable solutions within any specified geographic region; 2) We model the WEH for jammers as a JAM-NET lifetime maximization problem, where online scheduling algorithms with heterogeneous energy demands of each jammer (from energy sources) are designed; 3) Under our model, the problem of placing a minimum number of jammers with distancebased power assignments is NP-hard, and near optimal PTAS approximation algorithms are provided; 4) When durations of the eavesdropping and legitimate communicating are available and the scenario is extended to the multi-channels setting, our results are strengthened to see further improved EE and reduced number of jammers. Simulations back up our theory.

[1]  Anant Sahai,et al.  Shannon meets Tesla: Wireless information and power transfer , 2010, 2010 IEEE International Symposium on Information Theory.

[2]  Kee Chaing Chua,et al.  Secrecy wireless information and power transfer with MISO beamforming , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).

[3]  A. Lee Swindlehurst,et al.  Solutions for the MIMO Gaussian Wiretap Channel With a Cooperative Jammer , 2011, IEEE Transactions on Signal Processing.

[4]  张旗,et al.  Robust Secure Transmission in MISO Simultaneous Wireless Information and Power Transfer System , 2015 .

[5]  Rui Zhang,et al.  Wireless powered communication: opportunities and challenges , 2014, IEEE Communications Magazine.

[6]  João Barros,et al.  Collision-free jamming for enhanced wireless secrecy , 2013, 2013 IEEE 14th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM).

[7]  Kee Chaing Chua,et al.  Secrecy Wireless Information and Power Transfer With MISO Beamforming , 2013, IEEE Transactions on Signal Processing.

[8]  Esther M. Arkin,et al.  Secure communication through jammers jointly optimized in geography and time , 2017, Pervasive Mob. Comput..

[9]  Salman Durrani,et al.  Secure Communication With a Wireless-Powered Friendly Jammer , 2014, IEEE Transactions on Wireless Communications.

[10]  Esther M. Arkin,et al.  Optimal placement of protective jammers for securing wireless transmissions in a geographic domain , 2015, IPSN '15.

[11]  Lav R. Varshney,et al.  Transporting information and energy simultaneously , 2008, 2008 IEEE International Symposium on Information Theory.

[12]  Michael Dinitz,et al.  Maximizing Capacity in Arbitrary Wireless Networks in the SINR Model: Complexity and Game Theory , 2009, IEEE INFOCOM 2009.

[13]  JeongGil Ko,et al.  Wireless Sensor Networks for Healthcare , 2010, Proceedings of the IEEE.

[14]  Rui Zhang,et al.  MIMO Broadcasting for Simultaneous Wireless Information and Power Transfer , 2013 .

[15]  Ali A. Nasir,et al.  Wireless-Powered Relays in Cooperative Communications: Time-Switching Relaying Protocols and Throughput Analysis , 2013, IEEE Transactions on Communications.

[16]  Esther M. Arkin,et al.  Secure Communication through Jammers Jointly Optimized in Geography and Time , 2015, MobiHoc.

[17]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[18]  Devdatt P. Dubhashi,et al.  Concentration of Measure for the Analysis of Randomized Algorithms: Contents , 2009 .

[19]  Hyungsik Ju,et al.  Throughput Maximization in Wireless Powered Communication Networks , 2013, IEEE Trans. Wirel. Commun..

[20]  Yang Xiao,et al.  Security and privacy in RFID and applications in telemedicine , 2006, IEEE Commun. Mag..

[21]  A. Lee Swindlehurst,et al.  Detecting passive eavesdroppers in the MIMO wiretap channel , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[22]  Martin Hoefer,et al.  Online capacity maximization in wireless networks , 2013, J. Sched..

[23]  Rui Zhang,et al.  Wireless Information and Power Transfer: Architecture Design and Rate-Energy Tradeoff , 2012, IEEE Transactions on Communications.

[24]  Peter Auer,et al.  Finite-time Analysis of the Multiarmed Bandit Problem , 2002, Machine Learning.

[25]  Alon Efrat,et al.  Optimization Schemes for Protective Jamming , 2012, MobiHoc '12.

[26]  Liang Liu,et al.  Secrecy wireless information and power transfer in fading wiretap channel , 2014, 2014 IEEE International Conference on Communications (ICC).

[27]  Derrick Wing Kwan Ng,et al.  Robust Beamforming for Secure Communication in Systems With Wireless Information and Power Transfer , 2013, IEEE Transactions on Wireless Communications.

[28]  Fei Hu,et al.  Security considerations in ad hoc sensor networks , 2005, Ad Hoc Networks.

[29]  Matthew R. McKay,et al.  On the Design of Artificial-Noise-Aided Secure Multi-Antenna Transmission in Slow Fading Channels , 2012, IEEE Transactions on Vehicular Technology.

[30]  H. Vincent Poor,et al.  On the Throughput of Secure Hybrid-ARQ Protocols for Gaussian Block-Fading Channels , 2007, IEEE Transactions on Information Theory.

[31]  A. Lee Swindlehurst,et al.  Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.

[32]  Amitav Mukherjee,et al.  Deploying multi-antenna energy-harvesting cooperative jammers in the MIMO wiretap channel , 2012, 2012 Conference Record of the Forty Sixth Asilomar Conference on Signals, Systems and Computers (ASILOMAR).

[33]  Sébastien Bubeck,et al.  Regret Analysis of Stochastic and Nonstochastic Multi-armed Bandit Problems , 2012, Found. Trends Mach. Learn..

[34]  Lingyang Song,et al.  Physical Layer Security in Wireless Communications , 2013 .

[35]  Rui Zhang,et al.  O ct 2 01 2 Wireless Information Transfer with Opportunistic Energy Harvesting , 2013 .

[36]  Rui Zhang,et al.  MIMO Broadcasting for Simultaneous Wireless Information and Power Transfer , 2011, IEEE Transactions on Wireless Communications.

[37]  Qi Zhang,et al.  Robust Secure Transmission in MISO Simultaneous Wireless Information and Power Transfer System , 2015, IEEE Transactions on Vehicular Technology.

[38]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[39]  Joao Barros,et al.  Jammer Selection Policies for Secure Wireless Networks , 2011, 2011 IEEE International Conference on Communications Workshops (ICC).