A Novel Cooperative Jamming Scheme for Wireless Social Networks Without Known CSI

Considering a wireless social network, we investigate a cooperative jamming scheme based on the space power synthesis with unknown channel state information (CSI) of eavesdroppers. In particular, we provide a multiple jammers-based anti-eavesdropping model and formulate it by a superposition principle of various jamming signals in a free space. Based on the model, we analyze the superimposed effects of jammers with different locations in a fixed area, and then present corresponding jamming schemes to minimize synthetic jamming power at a legitimate receiver but satisfying basic interference in other locations. Furthermore, we also provide power allocation schemes to maximize the worst-case secrecy rate of a legitimate receiver. Numerical simulation results demonstrate that the secrecy performance of our cooperative jamming schemes can satisfy the requirements of secure transmission in a fixed area. Besides, our proposed power allocation schemes can further improve secrecy rate without known exact CSI of eavesdroppers.

[1]  Mikael Skoglund,et al.  Multi-Phase Smart Relaying and Cooperative Jamming in Secure Cognitive Radio Networks , 2016, IEEE Transactions on Cognitive Communications and Networking.

[2]  Hsiao-Chun Wu,et al.  Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.

[3]  Lawrence H. Ozarow,et al.  Wire-tap channel II , 1984, AT&T Bell Laboratories Technical Journal.

[4]  Mirko Krivánek,et al.  Simulated Annealing: A Proof of Convergence , 1994, IEEE Trans. Pattern Anal. Mach. Intell..

[5]  Xiaoshuang Xing,et al.  Optimal Stopping Theory Based Jammer Selection for Securing Cooperative Cognitive Radio Networks , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).

[6]  Shlomo Shamai,et al.  The Capacity Region of the Gaussian Multiple-Input Multiple-Output Broadcast Channel , 2006, IEEE Transactions on Information Theory.

[7]  R. Negi,et al.  Secret communication using artificial noise , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..

[8]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[9]  Peng Ning,et al.  Ally Friendly Jamming: How to Jam Your Enemy and Maintain Your Own Wireless Connectivity at the Same Time , 2013, 2013 IEEE Symposium on Security and Privacy.

[10]  Zhen Li,et al.  Worst-Case Jamming for Secure Communications in Multi-antenna Cooperative Cognitive Radio Networks with Energy Harvesting , 2015, 2015 International Conference on Identification, Information, and Knowledge in the Internet of Things (IIKI).

[11]  Wade Trappe,et al.  The challenges facing physical layer security , 2015, IEEE Communications Magazine.

[12]  Zhen Li,et al.  Analysis of secrecy performance in fading multiple access wiretap channel with SIC receiver , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.

[13]  Xianbin Wang,et al.  Security enhancement in cooperative jamming using compromised secrecy region minimization , 2013, 2013 13th Canadian Workshop on Information Theory.

[14]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[15]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[16]  Jianzhong Li,et al.  Location-privacy-aware review publication mechanism for local business service systems , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.

[17]  Hamid Jafarkhani,et al.  Cooperative Jamming and Power Allocation for Wireless Relay Networks in Presence of Eavesdropper , 2011, 2011 IEEE International Conference on Communications (ICC).

[18]  R. York,et al.  Coupled-oscillator arrays for millimeter-wave power-combining and mode-locking , 1992, 1992 IEEE Microwave Symposium Digest MTT-S.

[19]  Pei Liu,et al.  Cooperative wireless communications: a cross-layer approach , 2006, IEEE Wireless Communications.

[20]  Akbar Rahman,et al.  Exploiting the physical layer for enhanced security [Security and Privacy in Emerging Wireless Networks] , 2010, IEEE Wireless Communications.

[21]  Matthieu R. Bloch,et al.  Wireless Secrecy Regions With Friendly Jamming , 2011, IEEE Transactions on Information Forensics and Security.

[22]  A. Lee Swindlehurst,et al.  Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.

[23]  Xiuzhen Cheng,et al.  Cooperative jamming for secure communications in MIMO Cooperative Cognitive Radio Networks , 2015, 2015 IEEE International Conference on Communications (ICC).

[24]  Bo Wang,et al.  On the Secrecy Rate Maximization With Uncoordinated Cooperative Jamming by Single-Antenna Helpers , 2017, IEEE Transactions on Vehicular Technology.

[25]  Peter Rossmanith,et al.  Simulated Annealing , 2008, Taschenbuch der Algorithmen.

[26]  Kathryn A. Dowsland,et al.  Simulated Annealing , 1989, Encyclopedia of GIS.

[27]  Zhen Li,et al.  Worst-Case Cooperative Jamming for Secure Communications in CIoT Networks , 2016, Sensors.

[28]  Ender Tekin,et al.  The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.

[29]  Miguel R. D. Rodrigues,et al.  Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.

[30]  Xiaoshuang Xing,et al.  Joint design of jammer selection and beamforming for securing MIMO cooperative cognitive radio networks , 2017, IET Commun..

[31]  Zhipeng Cai,et al.  FakeMask: A Novel Privacy Preserving Approach for Smartphones , 2016, IEEE Transactions on Network and Service Management.

[32]  Frédérique E. Oggier,et al.  The secrecy capacity of the MIMO wiretap channel , 2008, ISIT.