Skip navigation
Skip navigation

Cooperative jamming for secrecy in decentralized wireless networks

Tao, Meixia; Kennedy, Rodney; Zhou, Xiangyun

Description

Cooperative jamming as a physical layer security enhancement has recently drawn considerable attention. While most existing works focus on communication systems with a small number of nodes, we investigate the use of cooperative jamming for providing secrecy in large-scale decentralized networks consisting of randomly distributed legitimate users and eavesdroppers. A modified slotted ALOHA protocol, named CJ-ALOHA, is considered where each legitimate transmitter either sends its message signal...[Show more]

dc.contributor.authorTao, Meixia
dc.contributor.authorKennedy, Rodney
dc.contributor.authorZhou, Xiangyun
dc.coverage.spatialOttawa Canada
dc.date.accessioned2014-04-30T03:17:19Z
dc.date.available2014-04-30T03:17:19Z
dc.date.created2012-06
dc.identifier.citationZhou, X., Tao, M., & Kennedy, R. (2012). Cooperative jamming for secrecy in decentralized wireless networks. In 2012 IEEE International Conference on Communications (ICC). Ottawa, ON: IEEE.
dc.identifier.isbn9.78146E+12
dc.identifier.issn1550-3607
dc.identifier.urihttp://hdl.handle.net/1885/11593
dc.description.abstractCooperative jamming as a physical layer security enhancement has recently drawn considerable attention. While most existing works focus on communication systems with a small number of nodes, we investigate the use of cooperative jamming for providing secrecy in large-scale decentralized networks consisting of randomly distributed legitimate users and eavesdroppers. A modified slotted ALOHA protocol, named CJ-ALOHA, is considered where each legitimate transmitter either sends its message signal or acts as a helping jammer according to a message transmission probability p. We derive the secrecy transmission capacity to characterize the network throughput and show how the throughput is affected by the CJ-ALOHA protocol. Both analytical and numerical insights are provided on the design of the CJ-ALOHA protocol for optimal throughput performance.
dc.description.sponsorshipThis work was supported by the Australian Research Council's Discovery Projects funding scheme (project no. DP110102548).
dc.format.mimetypeapplication/pdf
dc.language.isoen_AU
dc.publisherInstitute of Electrical and Electronics Engineers (IEEE)
dc.rightsIEEE
dc.sourceProceedings of ICC 2012
dc.subjectfading
dc.subjectjamming
dc.subjectprotocols
dc.subjectreceivers
dc.subjectsecurity
dc.subjectthroughput
dc.subjecttransmitters
dc.titleCooperative jamming for secrecy in decentralized wireless networks
dc.typeConference paper
local.description.refereedYes
local.identifier.absfor100510 - Wireless Communications
local.identifier.absfor090609 - Signal Processing
local.identifier.ariespublicationu4334215xPUB1092
local.publisher.urlhttp://www.ieee.org/index.html
local.type.statusAccepted version
local.contributor.affiliationZhou, Xiangyun, Research School of Engineering, The Australian National University
local.contributor.affiliationKennedy, Rodney A, Research School of Engineering, The Australian National University
dc.relationhttp://purl.org/au-research/grants/arc/dp110102548
local.bibliographicCitation.startpage2339
local.bibliographicCitation.lastpage2344
local.identifier.doi10.1109/ICC.2012.6364148
local.identifier.absseo890103 - Mobile Data Networks and Services
local.identifier.absseo810103 - Command, Control and Communications
dc.date.updated2015-12-10T10:01:31Z
local.identifier.scopusID2-s2.0-84871984718
dcterms.accessRightsOpen Access
dc.provenancehttps://www.ieee.org/publications/rights/index.html#ieee-open-access..."The revised policy reaffirms the principle that authors are free to post the accepted version of their articles on their personal websites or those of their employers." from SHERPA/RoMEO site (as at 10/09/18).
CollectionsANU Research Publications

Download

File Description SizeFormat Image
Zhou et al Cooperative jamming for secrecy 2012.pdf132.86 kBAdobe PDFThumbnail


Items in Open Research are protected by copyright, with all rights reserved, unless otherwise indicated.

Updated:  17 November 2022/ Responsible Officer:  University Librarian/ Page Contact:  Library Systems & Web Coordinator