Secrecy capacity of intrinsically secure communication graph (iS-Graph) can be increased by reducing the signal quality of eavesdroppers with adding controlled interferences.The transmission of secret messages over wireless channels in which the legitimate nodes were aided by cooperative jamming was studied
and a secure communication graph with jamming
jS-Graph was proposed.First
the security properties of jS-Graph was characterized.Then
jamming strategies to confuse eavesdroppers were proposed.To tackle the nearby eavesdropper problem
a two-stage cooperative jamming strategy to jam the eavesdroppers near the source or the destination was applied.The results demonstrate that
with the aid of cooperative jamming the secure communication graph can lead to secrecy gains.These results help to clarify how the presence of eavesdroppers and the cooperative jamming can influence secure connectivity in wireless networks.
关键词
Keywords
references
PINTO P C , BARROS J O , WIN M Z . Secure communication in stochastic wireless networks-part I:connectivity [J ] . IEEE Trans Inf Forensics Security , 2011 , 7 ( 1 ): 125 - 138 .
HAENGGI M , . The secrecy graph and some of its properties [C ] // ISIT . 2008 : 539 - 543 .
PINTO P C , BARROS J O , WIN M Z . Secure communication in stochastic wireless networks - part ii:maximum rate and collusion [J ] . IEEE Trans Inf Forensics Security , 2011 , 7 ( 1 ): 139 - 147 .
GOEL S , AGGARWAL V , YENER A , et al . The effect of eavesdroppers on network connectivity:a secrecy graph approach [J ] . IEEE Trans Inf Forensics Security , 2011 , 6 ( 3 ): 712 - 724 .
PINTO P C , WIN M Z . Percolation and connectivity in the intrinsically secure communications graph [J ] . IEEE Trans Inf Theory , 2012 , 58 ( 3 ): 1716 - 1730 .
VILELA J P , BLOCH M , BARROS J , et al . Wireless secrecy regions with friendly jamming [J ] . IEEE Trans Inf Forensics and Security , 2011 , 6 ( 2 ): 256 - 266 .
GOEL S , NEGI R . Guaranteeing secrecy using artificial noise [J ] . IEEE Trans Wireless Communications , 2008 , 7 ( 6 ): 2180 - 2189 .
GOECKEL D , VASUDEVAN S , TOWSLEY D , et al . Artificial noise generation from cooperative relays for everlasting secrecy in two-hop wireless networks [J ] . IEEE J Select Areas Commun , 2011 , 29 ( 10 ): 2067 - 2076 .
LAI L , GAMAL H E . The relay-eavesdropper channel:cooperation for secrecy [J ] . IEEE Trans Inf Theory , 2008 , 54 ( 9 ): 4005 - 4019 .
TEKIN E , YENER A . The general Gaussian multiple-access and two-way wire-tap channels:achievable rates and cooperative jamming [J ] . IEEE Trans.Inf.Theory , 2008 , 54 ( 6 ): 2735 - 2751 .
HE X , YENER A . Securing wireless communications at the physical layer,chapter cooperative jamming:the tale of friendly interference for secrecy [M ] . New York : SpringerPress , 2009 : 65 - 88 .
GOLLAKOTA S , HASSANIEH H , RANSFORD B , et al . They can hear your heartbeats:non-invasive security for implantable medical devices [C ] // In ACM SIGCOMM , 2011 : 2 - 13 .
MARTINOVIC I , PICHOTA P , SCHMITT J B . Jamming for good:a fresh approach to authentic communication in WSNs [C ] // ACM WiSec . 2009 : 161 - 168 .
WILHELM M , MARTINOVIC I , SCHMITT J , et al . WiFire:a firewall for wireless networks [C ] // In ACM SIGCOMM . New York,NY,USA , 2011 : 456 - 457 .
BERGER D S , GRINGOLI F , FACCHI N , et al . Gaining insight on friendly jamming in a real-world IEEE 802.11 network [C ] // ACM WiSec'14 , 2014 : 23 - 25 .
AGATAY C , APAR C , GOECKEL D , et al . Secret communication in large wireless networks without eavesdropper location information [C ] // Proc INFOCOM . 2012 : 1152 - 1160 .
KOYLUOGLU O , KOKSAL C , GAMAL H E . On the secrecy capacity scaling in wireless networks [J ] . IEEE Trans Inf Theory , 2012 , 58 ( 11 ): 3000 - 3015 .
CHIU S N , STOYAN D , KENDALL W S , et al . Stochastic geometry and its applications,third edition [M ] . John Wiley & Sons,Ltd , 2013 .
HAN B , LI J . Secrecy capacity maximization for secure cooperative ad-hoc networks [C ] // In INFOCOM,2013 Proceedings IEEE , 2013 : 2796 - 2804 .
HAENGGI M . On distances in uniformly random networks [J ] . IEEE Trans Inf Theory , 2005 , 51 ( 10 ): 3584 - 3586 .
GOECKEL D , CAPAR C , TOWSLEY D . Physical layer security in wireless communications,chapter physical layer secrecy in large multihop wireless networks [M ] . CRC Press , 2014 : 271 - 285 .
LAI L , GAMAL H E , POOR H V . The wiretap channel with feedback:encryption over the channel [J ] . IEEE Trans Inf Theory , 2008 , 54 ( 11 ): 5059 - 5067 .