skip to main content
10.1145/3452940.3453069acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiciteeConference Proceedingsconference-collections
short-paper

Effect of Non-Ideal Time Alignment on Cooperative Jamming Suppression in Physical Layer Security

Published: 17 May 2021 Publication History

Abstract

In physical layer, cooperation jamming (CJ) can effectively enhance the transmission security of wireless communication. However, existing researches always assume that the CJ can be completely suppressed at the legal receiver, without considering the alignment impairment in practical systems. Considering nonideal time alignment, the residual CJ power at the legal receiver is analyzed. Then, a closed-form expression of jamming suppression ratio (JSR) is derived in terms of the normalized time alignment error and the received jamming-to-noise ratio (JNR), which evaluates the performance of CJ suppression at the legal receiver. Theoretical and simulation results confirm that non-ideal time alignment can significantly influence the JSR, and the system with lower CJ power is less sensitive to time alignment error.

References

[1]
Y. Wu, A. Khisti, C. Xiao, G. Caire, K.-K. Wong, and X. Gao, "A survey of physical layer security techniques for 5G wireless networks and challenges ahead, " IEEE J. Sel. Areas Commun., vol. 36, no. 4, pp. 679--695.
[2]
L. J. Rodriguez, N. H. Tran, T. Q. Duong, T. Le-Ngoc, M. Elkashlan, and S. Shetty, "Physical layer security in wireless cooperative relay networks: State of the art and beyond, " IEEE Commun. Mag., vol. 53, no. 12, pp. 32--39.
[3]
Y. Liu, A. P. Petropulu, and H. V. Poor, "Joint decode-and-forward and jamming for wireless physical layer security with destination assistance, " in Proc. IEEE Asilomar Conf. Signals, Syst. Comput. (ASILOMAR), Pacific Grove, USA, Nov. 2011, pp. 109--113.
[4]
G. Zheng, I. Krikidis, J. Li, A. P. Petropulu, and B. Ottersten, "Improving physical layer secrecy using full-duplex jamming receivers, " IEEE Trans. Signal Process., vol. 61, no. 20, pp. 4962--4974.
[5]
S. Luo, J. Li, and A. Petropulu, "Outage constrained secrecy rate maximization using cooperative jamming, " in Proc. IEEE Workshop on Statist. Signal Process. (SSP), Ann Arbor, MI, USA, Aug. 2012, pp. 389--392.
[6]
S. Zhong, W. Xia, Z. He, J. Hu, and J. Li, "Time delay estimation in the presence of clock frequency error, " on Proc. IEEE Int. Conf. Acoustics, Speech and Signal Process. (ICASSP), Florence, Italy, pp. 2977--2981.
[7]
W. Guo, H. Zhao, and Y. Tang, "Testbed for Cooperative Jamming Suppression in Physical Layer Security", IEEE Wireless communications letters, vol. 9, NO. 2, pp. 240--243.
[8]
G. Zheng, L.-C. Choo, and K.-K. Wong, "Optimal cooperative jamming to enhance physical layer security using relays, " IEEE Trans. Signal process., vol. 59, no. 3, pp. 1317--1322.
[9]
W. Guo, H. Zhao, W. Ma, C. Li, Z. Lu, and Y. Tang, "Effect of Frequency Offset on Cooperative Jamming Suppression in Physical Layer Security, " in Proc. IEEE Workshop on Global Commun. Conf. (GLOBECOM), Abu Dhabi, United Arab Emirates, pp. 1--5.

Index Terms

  1. Effect of Non-Ideal Time Alignment on Cooperative Jamming Suppression in Physical Layer Security
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Other conferences
        ICITEE '20: Proceedings of the 3rd International Conference on Information Technologies and Electrical Engineering
        December 2020
        687 pages
        ISBN:9781450388665
        DOI:10.1145/3452940
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 17 May 2021

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. cooperative jamming (CJ)
        2. jamming suppression ratio (JSR)
        3. non-ideal time alignment
        4. physical layer security

        Qualifiers

        • Short-paper
        • Research
        • Refereed limited

        Conference

        ICITEE2020

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • 0
          Total Citations
        • 19
          Total Downloads
        • Downloads (Last 12 months)2
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 28 Feb 2025

        Other Metrics

        Citations

        View Options

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format.

        HTML Format

        Figures

        Tables

        Media

        Share

        Share

        Share this Publication link

        Share on social media