Secure Communication with Wireless Powered Friendly Jammers under Multiple Eavesdroppers

In this work, we propose a secure communication scheme, where a source transmits information to the legitimate receiver in the presence of multiple eavesdroppers. To improve the security, single or multiple friendly jammers are deployed to confuse the eavesdroppers. Specifically, we assume that the jammers have to harvest energy from the source, thus we consider a two-phase transmission scheme where the source transmits energy to the jammers first and then transmits information to the legitimate receiver confidentially with the help of the jammers. We first give the expression of the secrecy outage probability, revealing how the secrecy performance depends on the transmission parameter tuple, and then we use the simulated annealing method to obtain the optimal transmission parameter tuple. The simulation results show the superiority of our proposed scheme.

[1]  Xing Zhang,et al.  An optimal jammer selection for improving physical-layer security in wireless networks with multiple jammers , 2016, 2016 International Wireless Communications and Mobile Computing Conference (IWCMC).

[2]  Peter Rossmanith,et al.  Simulated Annealing , 2008, Taschenbuch der Algorithmen.

[3]  Inkyu Lee,et al.  Secrecy Performance Optimization for Wireless Powered Communication Networks With an Energy Harvesting Jammer , 2017, IEEE Transactions on Communications.

[4]  Jianhua Ge,et al.  Joint Cooperative Beamforming and Artificial Noise Design for Secrecy Sum Rate Maximization in Two-Way AF Relay Networks , 2014, IEEE Communications Letters.

[5]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[6]  Caijun Zhong,et al.  Opportunistic Relay Selection for Secrecy Enhancement in Cooperative Networks , 2015, IEEE Transactions on Communications.

[7]  Esther M. Arkin,et al.  Secure Communication through Jammers Jointly Optimized in Geography and Time , 2015, MobiHoc.

[8]  John S. Thompson,et al.  Relay selection for secure cooperative networks with jamming , 2009, IEEE Transactions on Wireless Communications.

[9]  Ho Van Khuong,et al.  General expression for pdf of a sum of independent exponential random variables , 2006, IEEE Commun. Lett..

[10]  Salman Durrani,et al.  Secure Communication With a Wireless-Powered Friendly Jammer , 2014, IEEE Transactions on Wireless Communications.

[11]  Kathryn A. Dowsland,et al.  Simulated Annealing , 1989, Encyclopedia of GIS.

[12]  Stéphane Y. Le Goff,et al.  Secrecy Rate Optimizations for a MIMO Secrecy Channel With a Cooperative Jammer , 2015, IEEE Transactions on Vehicular Technology.

[13]  Jinhong Yuan,et al.  Location-Based Secure Transmission for Wiretap Channels , 2015, IEEE Journal on Selected Areas in Communications.

[14]  Qingqing Wu,et al.  Wireless Powered Cooperative Jamming for Secure OFDM System , 2017, IEEE Transactions on Vehicular Technology.

[15]  Shihao Yan,et al.  Artificial Noise: Transmission Optimization in Multi-Input Single-Output Wiretap Channels , 2015, IEEE Transactions on Communications.

[16]  Kwok Hung Li,et al.  Secrecy Throughput Maximization for MISO Multi-Eavesdropper Wiretap Channels , 2017, IEEE Transactions on Information Forensics and Security.