In this paper we establish a secure communication model where eavesdropper and intended receiver have multiple antennas. We use cooperation and jamming to achieve physical layer security. First, we study how to allocate power between the information bearing signal and the jamming signal. Second, based on this model, we also jointly optimize both the information bearing signal weights and the jamming signal weights to improve physical layer security. The optimal power allocation and the weights are obtained via an iteration algorithm to maximize the secrecy rate. Comparing with equal power allocation and some other different methods, it shows that using cooperative relaying and jamming can significantly improve the physical layer security from the simulation results.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Haiyan XU, Qian TIAN, Jianhui WU, Fulong JIANG, "Secure Communication of the Multi-Antenna Channel Using Cooperative Relaying and Jamming" in IEICE TRANSACTIONS on Communications,
vol. E96-B, no. 4, pp. 948-955, April 2013, doi: 10.1587/transcom.E96.B.948.
Abstract: In this paper we establish a secure communication model where eavesdropper and intended receiver have multiple antennas. We use cooperation and jamming to achieve physical layer security. First, we study how to allocate power between the information bearing signal and the jamming signal. Second, based on this model, we also jointly optimize both the information bearing signal weights and the jamming signal weights to improve physical layer security. The optimal power allocation and the weights are obtained via an iteration algorithm to maximize the secrecy rate. Comparing with equal power allocation and some other different methods, it shows that using cooperative relaying and jamming can significantly improve the physical layer security from the simulation results.
URL: https://globals.ieice.org/en_transactions/communications/10.1587/transcom.E96.B.948/_p
Copy
@ARTICLE{e96-b_4_948,
author={Haiyan XU, Qian TIAN, Jianhui WU, Fulong JIANG, },
journal={IEICE TRANSACTIONS on Communications},
title={Secure Communication of the Multi-Antenna Channel Using Cooperative Relaying and Jamming},
year={2013},
volume={E96-B},
number={4},
pages={948-955},
abstract={In this paper we establish a secure communication model where eavesdropper and intended receiver have multiple antennas. We use cooperation and jamming to achieve physical layer security. First, we study how to allocate power between the information bearing signal and the jamming signal. Second, based on this model, we also jointly optimize both the information bearing signal weights and the jamming signal weights to improve physical layer security. The optimal power allocation and the weights are obtained via an iteration algorithm to maximize the secrecy rate. Comparing with equal power allocation and some other different methods, it shows that using cooperative relaying and jamming can significantly improve the physical layer security from the simulation results.},
keywords={},
doi={10.1587/transcom.E96.B.948},
ISSN={1745-1345},
month={April},}
Copy
TY - JOUR
TI - Secure Communication of the Multi-Antenna Channel Using Cooperative Relaying and Jamming
T2 - IEICE TRANSACTIONS on Communications
SP - 948
EP - 955
AU - Haiyan XU
AU - Qian TIAN
AU - Jianhui WU
AU - Fulong JIANG
PY - 2013
DO - 10.1587/transcom.E96.B.948
JO - IEICE TRANSACTIONS on Communications
SN - 1745-1345
VL - E96-B
IS - 4
JA - IEICE TRANSACTIONS on Communications
Y1 - April 2013
AB - In this paper we establish a secure communication model where eavesdropper and intended receiver have multiple antennas. We use cooperation and jamming to achieve physical layer security. First, we study how to allocate power between the information bearing signal and the jamming signal. Second, based on this model, we also jointly optimize both the information bearing signal weights and the jamming signal weights to improve physical layer security. The optimal power allocation and the weights are obtained via an iteration algorithm to maximize the secrecy rate. Comparing with equal power allocation and some other different methods, it shows that using cooperative relaying and jamming can significantly improve the physical layer security from the simulation results.
ER -