Jamming Strategies for Physical Layer Security

This article provides a comprehensive overview on jamming strategies in the physical layer for securing wireless communications. As a complement to traditional cryptography-based approaches, physical layer based security provisioning techniques offer a number of promising features that have not been previously available. Among the physical layer security techniques, jamming is an effective way to degrade the channel quality of the eavesdroppers for ensuring security. We start by giving a brief introduction to the fundamental principles of physical layer security and jamming. Then we classify jamming strategies from three different perspectives and explain the major related designs in various scenarios. Finally, we discuss the open issues of jamming that can be helpful to foster future research.

[1]  Tony Q. S. Quek,et al.  Jamming-Aided Secure Communication in Massive MIMO Rician Channels , 2015, IEEE Transactions on Wireless Communications.

[2]  Qiang Li,et al.  Spatially Selective Artificial-Noise Aided Transmit Optimization for MISO Multi-Eves Secrecy Rate Maximization , 2013, IEEE Transactions on Signal Processing.

[3]  Peng Ning,et al.  Jamming-Resistant Multiradio Multichannel Opportunistic Spectrum Access in Cognitive Radio Networks , 2016, IEEE Transactions on Vehicular Technology.

[4]  A. Lee Swindlehurst,et al.  Cooperation strategies for secrecy in MIMO relay networks with unknown eavesdropper CSI , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[5]  Guanghan Xu,et al.  Low complexity power allocation and joint relay-jammer selection in cooperative jamming DF relay wireless secure networks , 2013, 2013 International Conference on Anti-Counterfeiting, Security and Identification (ASID).

[6]  Xiaobing Chen,et al.  Walls Have Ears! Opportunistically Communicating Secret Messages Over the Wiretap Channel: from Theory to Practice , 2015, CCS.

[7]  A. Lee Swindlehurst,et al.  Fixed-rate power allocation strategies for enhanced secrecy in MIMO wiretap channels , 2009, 2009 IEEE 10th Workshop on Signal Processing Advances in Wireless Communications.

[8]  A. Lee Swindlehurst,et al.  Jamming Games in the MIMO Wiretap Channel With an Active Eavesdropper , 2010, IEEE Transactions on Signal Processing.

[9]  Chong-Yung Chi,et al.  Joint transmit beamforming and artificial noise design for QoS discrimination inwireless downlink , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.

[10]  R. Negi,et al.  Secret communication using artificial noise , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..

[11]  Huiming Wang,et al.  Uncoordinated Jammer Selection for Securing SIMOME Wiretap Channels: A Stochastic Geometry Approach , 2015, IEEE Transactions on Wireless Communications.

[12]  Hsuan-Jung Su,et al.  On Secrecy Rate of the Generalized Artificial-Noise Assisted Secure Beamforming for Wiretap Channels , 2012, IEEE Journal on Selected Areas in Communications.

[13]  Ming Li,et al.  Jamming Resilient Communication Using MIMO Interference Cancellation , 2016, IEEE Transactions on Information Forensics and Security.

[14]  Feng Liu,et al.  Power Allocation and Jammer Selection of a Cooperative Jamming Strategy for Physical-Layer Security , 2014, 2014 IEEE 79th Vehicular Technology Conference (VTC Spring).