Journal
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
Volume 26, Issue 4, Pages 1117-1128Publisher
IEEE COMPUTER SOC
DOI: 10.1109/TPDS.2014.2316155
Keywords
Cooperative communication; physical layer security; secrecy capacity; relay assignment; cooperative jamming
Funding
- Japan Society for Promotion of Science (JSPS), Japan
- National Natural Science Foundation of China (NSFC) [61202488, 61373156, 91438121]
- Key Basic Research Project of the Science and Technology Commission of Shanghai Municipality [12JC1405400]
- Shanghai Pujiang Program [13PJ1404600]
- Shanghai Branch of Southwest Electron and Telecom Technology Research Institute Project [2013008]
- Grants-in-Aid for Scientific Research [26280027] Funding Source: KAKEN
Ask authors/readers for more resources
Cooperative wireless networking, which is promising in improving the system operation efficiency and reliability by acquiring more accurate and timely information, has attracted considerable attentions to support many services in practice. However, the problem of secure cooperative communication has not been well investigated yet. In this paper, we exploit physical layer security to provide secure cooperative communication for wireless ad hoc networks (WANETs) where involve multiple source-destination pairs and malicious eavesdroppers. By characterizing the security performance of the system by secrecy capacity, we study the secrecy capacity optimization problem in which security enhancement is achieved via cooperative relaying and cooperative jamming. Specifically, we propose a system model where a set of relay nodes can be exploited by multiple source-destination pairs to achieve physical layer security. We theoretically present a corresponding formulation for the relay assignment problem and develop an optimal algorithm to solve it in polynomial time. To further increase the system secrecy capacity, we exploit the cooperative jamming technique and propose a smart jamming algorithm to interfere the eavesdropping channels. Through extensive experiments, we validate that our proposed algorithms significantly increase the system secrecy capacity under various network settings.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available