Cooperative Jammer Placement for Physical Layer Security Enhancement

Wireless networks are increasingly being employed to transfer highly sensitive information. Due to the broadcast nature of wireless channels, security issues have been taken as a critical role in wireless communications. A promising direction toward achieving secure wireless communications is physical-layer security, which is an approach exploiting the randomness of wireless channels to ensure secrecy. Although theoretical study has shown its potential to enhance the secrecy of wireless communications, great challenges remain when transforming the theory into practice. This article investigates strategies for allowing and managing cooperative jammers for security in wireless communications. A cooperative jamming strategy is proposed to deal with eavesdroppers anywhere in the wireless network; then jammer placement algorithms targeted toward optimizing the total number of jammers are introduced.

[1]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[2]  Hesham El Gamal,et al.  The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.

[3]  Matthieu R. Bloch,et al.  Physical-Layer Security: From Information Theory to Security Engineering , 2011 .

[4]  Esther M. Arkin,et al.  Secure Communication through Jammers Jointly Optimized in Geography and Time , 2015, MobiHoc.

[5]  Kin K. Leung,et al.  Artificial Noise Generation from Cooperative Relays for Everlasting Secrecy in Two-Hop Wireless Networks , 2011, IEEE Journal on Selected Areas in Communications.

[6]  Xu Chen,et al.  Exploiting Social Tie Structure for Cooperative Wireless Networking: A Social Group Utility Maximization Framework , 2016, IEEE/ACM Transactions on Networking.

[7]  Esther M. Arkin,et al.  Optimal placement of protective jammers for securing wireless transmissions in a geographic domain , 2015, IPSN '15.

[8]  Jianfeng Ma,et al.  Divide-and-conquer based cooperative jamming: Addressing multiple eavesdroppers in close proximity , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.

[9]  Dipak Panigrahy Biographies , 2018, Cancer and Metastasis Reviews.

[10]  Kai Zeng,et al.  Physical layer key generation in wireless networks: challenges and opportunities , 2015, IEEE Communications Magazine.

[11]  Hsiao-Chun Wu,et al.  Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.

[12]  Sennur Ulukus,et al.  Wireless Physical-Layer Security: Lessons Learned From Information Theory , 2015, Proceedings of the IEEE.

[13]  Nei Kato,et al.  Relay-by-smartphone: realizing multihop device-to-device communications , 2014, IEEE Communications Magazine.

[14]  Kevin Fu,et al.  They can hear your heartbeats: non-invasive security for implantable medical devices , 2011, SIGCOMM.

[15]  Wade Trappe,et al.  The challenges facing physical layer security , 2015, IEEE Communications Magazine.

[16]  Hao Chen,et al.  Social Tie Based Cooperative Jamming for Physical Layer Security , 2015, IEEE Communications Letters.