Skip to main content
Log in

Binary Jamming Message Solutions for Source-Wiretapping Under Physical-Layer Security: Analysis and Design

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

A distributed zero-beamforming-based cooperative jamming technique is useless when an eavesdropper detects the sharing seed. Further, currently alternatives are very limited when the eavesdropper is located near a source for wiretapping. This paper presents some solutions for this extreme case. The jammer node, which can be a relay or destination node, randomly generates and transmits a binary jamming message to both source and destination or to both source and relay node in the first phase. When these two receivers securely and correctly decode the message, the source creates and transmits another message based on the decoded message and the use of exclusive-or for its information message. Consequently, the next transmission can avoid the eavesdropping. We present a comparison between the proposed protocols and conventional protocols that do not send a binary jamming message. The system performance is analyzed and evaluated in terms of the exact closed-form outage probability over Reyleigh fading channels. The simulation results using a Monte-Carlo simulation are in complete agreement with the theoretical results.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Wyner, A. D. (1975). The wire-tap channel. Bell System Technical Journal, 54, 1355–1387.

    Article  MATH  MathSciNet  Google Scholar 

  2. Leung-Yan-Cheong, S., & Hellman, M. E. (1978). The Gaussian wire-tap channel. IEEE Transaction on Information Theory, 24, 451–456.

  3. Csiszar, I., & Korner, J. (1978). Broadcast channels with confidential messages. IEEE Transactions on Information Theory, 24, 339–348.

    Article  MATH  MathSciNet  Google Scholar 

  4. Liang, Y., Poor, H. V., & Shamai (Shitz), S. (2008). Secure communication over fading channels. IEEE Transactions on Information Theory, 54, 2470–2492.

    Article  MATH  Google Scholar 

  5. Khodakarami, H., & Lahouti, F. (2012). Link adaptation for physical layer security over wireless fading channel. IET Communications, 6, 353–362.

    Article  MATH  MathSciNet  Google Scholar 

  6. Sakran, H., Shokair, M., Nasr, O., et al. (2012). Proposed relay selection scheme for physical layer security in cognitive radio networks. IET Communications, 6, 2676–2687.

    Article  MathSciNet  Google Scholar 

  7. Romeru-Zurita, N., McLernon, D., & Ghogho, M. (2014). Physical layer security by robust masked beamforming and protected zone optimisation. IET Communications, 8, 1248–1257.

    Article  Google Scholar 

  8. Krikidis, I., Thompson, J. S., & Mclaughlin, S. (2009). Relay selection for secure cooperative networks with jamming. IEEE Transactions on Wireless Communications, 8, 5003–5011.

  9. Ibrahim, Doaa H., Hassan, Emad S., & El-Dolil, Sami A. (2014). A new relay and jammer selection schemes for secure one-way cooperative networks. Wireless Personal Communications, 75, 665–685.

    Article  Google Scholar 

  10. Chen, J., Song, L., Han, Z., & Jiao, B. (2011). Joint relay and jammer selection for secure decode-and-forward two-way relay communications. In IEEE global telecommunications conference (pp. 1–5).

  11. Wang, H.-M., Luo, M., & Yin, Q. (2012). Hybrid cooperative relaying and jamming for secure two-way relay networks. In IEEE global communications conference (pp. 4846–4850).

  12. Wang, H.-M., Luo, M., Xia, X.-G., & Yin, Q. (2013). Joint cooperative beamforming and jamming to secure AF relay systems with individual power constraint and no eavesdropper’s CSI. IEEE Signal Processing Letters, 20, 39–42.

    Article  Google Scholar 

  13. Yupeng, L., Jiangyuan, L., & Petropulu, A. P. (2013). Destination assisted cooperative jamming for wireless physical-layer security. IEEE Transactions on Information Forensics and Security, 8, 682–694.

    Article  Google Scholar 

  14. Krikidis, I., Thompson, J. S., & McLaughlin, S. (2009). Relay selection for secure cooperative networks with jamming. IEEE Transactions on Wireless Communications, 8, 5003–5011.

    Article  Google Scholar 

  15. Sun, X., Xu, W., Jiang, M., & Zhao, C. (2013). Opportunistic selection for decode-and-forward cooperative networks with secure probabilistic constraints. Wireless Personal Communications, 70, 1633–1652.

    Article  Google Scholar 

  16. Truc, T. T., & Kong, H. Y. (2014). An application of network-coding technique into cooperative jamming. In 27th Biennia Symposium on Communications (pp. 218–222).

  17. Son, P. N., & Kong, H. Y. (2014). Exact outage probability of two-way decode-and-forward scheme with opportunistic relay selection under physical layer security. Wireless Personal Communication, 77, 2889–2917.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hyung Yun Kong.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Nguyen, S.Q., Kong, H.Y. Binary Jamming Message Solutions for Source-Wiretapping Under Physical-Layer Security: Analysis and Design. Wireless Pers Commun 84, 2493–2512 (2015). https://doi.org/10.1007/s11277-015-2716-4

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-015-2716-4

Keywords

Navigation