Security over OFDM Fading Channels with Friendly Jammer
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32799
Security over OFDM Fading Channels with Friendly Jammer

Authors: Munnujahan Ara

Abstract:

In this paper, we investigate the effect of friendly jamming power allocation strategies on the achievable average secrecy rate over a bank of parallel fading wiretap channels. We investigate the achievable average secrecy rate in parallel fading wiretap channels subject to Rayleigh and Rician fading. The achievable average secrecy rate, due to the presence of a line-of-sight component in the jammer channel is also evaluated. Moreover, we study the detrimental effect of correlation across the parallel sub-channels, and evaluate the corresponding decrease in the achievable average secrecy rate for the various fading configurations. We also investigate the tradeoff between the transmission power and the jamming power for a fixed total power budget. Our results, which are applicable to current orthogonal frequency division multiplexing (OFDM) communications systems, shed further light on the achievable average secrecy rates over a bank of parallel fading channels in the presence of friendly jammers.

Keywords: Fading parallel channels, Wire-tap channel, OFDM, Secrecy capacity, Power allocation.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1100328

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2207

References:


[1] M. Bloch, J. Barros, M. Rodrigues, and S. McLaughlin, “Wireless information-theoretic security,” IEEE Transactions on Information Theory, vol. 54, no. 6, pp. 2515–2534, Jun. 2008.
[2] Y. Liang, H. V. Poor and S. Shamai (Shitz), Information theoretic security. Dordrecht, The Netherlands: Now Publishers, 2009.
[3] C. E. Shannon, “Communication theory of secrecy systems,” Bell System Technical Journal, vol. 28, pp. 656–715, 1949.
[4] A. D. Wyner, “The wire-tap channel,” Bell System Technical Journal, vol. 54, pp. 1355–1387, 1975.
[5] I. Csiszr and J. Krner, “Broadcast channels with confidential messages,” IEEE Transactions on Information Theory, vol. 24, no. 3, pp. 339–349, May 1978.
[6] F. Oggier and B. Hassibi, “The secrecy capacity of the MIMO wiretap channel,” IEEE Transactions on Information Theory, vol. 57, no. 8, pp. 4961–4972, Aug. 2011.
[7] S. Leung-Yan-Cheong and M. Hellman, “The Gaussian wire-tap channel,” IEEE Transactions on Information Theory, vol. 24, no. 4, pp. 451–456, Jul. 1978.
[8] P. Gopala, L. Lai, and H. El Gamal, “On the Secrecy Capacity of Fading Channels,” IEEE Transactions on Information Theory, vol. 54, no. 10, pp. 4687–4698, Oct. 2008.
[9] M. Bloch and J. Barros, Physical-Layer Security: From Information Theory to Security Engineering. Cambridge University Press, 2011.
[10] J. Vilela, M. Bloch, J. Barros, and S. McLaughlin, “Wireless secrecy regions with friendly jamming,” IEEE Transactions on Information Forensics and Security, vol. 6, no. 2, pp. 256–266, Jun. 2011.
[11] G. Zheng, L.-C. Choo, and K.-K. Wong, “Optimal cooperative jamming to enhance physical layer security using relays,” IEEE Transactions on Signal Processing, vol. 59, no. 3, pp. 1317–1322, Mar. 2011.
[12] S. Luo, J. Li, and A. Petropulu, “Outage constrained secrecy rate maximization using cooperative jamming,” in Proc. of IEEE Statistical Signal Processing Workshop (SSP), 2012 IEEE, Aug. 2012, pp. 389–392.
[13] Z. Han, N. Marina, M. Debbah, and A. Hjorungnes, “Physical layer security game: Interaction between source, eavesdropper, and friendly jammer,” EURASIP Journal on Wireless Communications and Networking, vol. 2009, no. 1, 2009.
[14] Pinto, P.C. and Barros, J. and Win, M.Z., “Wireless physical-layer security: The case of colluding eavesdroppers,” in Proc. of IEEE International Symposium on Information Theory (ISIT), Seoul, Korea, 2009, pp. 2442–2446, Jun.28-Jul.3 2009.
[15] J. A. C. Bingham, “Multicarrier modulation for data transmission: an idea whose time has come,” IEEE Communications Magazine, vol. 28, no. 5, pp. 5–14, May 1990.
[16] W. Y. Zou and W. Yiyan, “COFDM: an overview,” IEEE Transactions on Broadcasting, vol. 41, no. 1, pp. 1–8, Mar. 1995.
[17] Ramjee Prasad, OFDM for wireless communication system. Bosto, London: Artech House, Inc., 2004.
[18] N. Romero-Zurita, M. Ghogho and D. McLernon1, “Physical Layer Security of MIMO Frequency Selective Channels by Beamforming and Noise Generation,” 19th European Signal Processing Conference, Barcelona, Spain, 2011.
[19] F. Renna, N. Laurenti and Poor, H.V., “Physical-Layer Secrecy for OFDM Transmissions Over Fading Channels,” IEEE Transactions on Information Forensics and Security, vol. 7, no. 4, pp. 1354–1367, Aug. 2012.
[20] Z. Li, R. Yates, and W. Trappe, “Secrecy capacity of independent parallel channels,” 44th Annual Allerton Conference on Communication, Control, and Computing. Monticello, Illinois, Sept.27-29 2006.
[21] S. Shafiee and S. Ulukus, “Correlated jamming in multiple access channel,” in Proc. Conference in Information Science and Systems (CISS), The Johns Hopkins University, Mar.16-18. 2005.
[22] L. Lai and H. E. Gamal, “The relay-eavesdropper channel: cooperation for secrecy,” IEEE Transaction on Information Theory, vol. 54, no.9, pp. 4005–4019, 2008.
[23] X. Tang, R. Liu, P. Spasojevic, and H. V. Poor, “The Gaussian wiretap channel with a helping interferer,” in Proc. of IEEE International Symposium on Information Theory (ISIT), Toronto, Canada, pp. 389–393, Jul. 2008.
[24] M. Ara, H. Reboredo, F. Renna, and M. R. D. Rodrigues, “Power allocation strategies for OFDM Gaussian wiretap channels with a friendly jammer,” in Proc. of IEEE International Conference on Communications (ICC), Budapest, Hungrary, Jun. 2-5 2013.
[25] G. L. Stber, Principles of Mobile Communications. 2nd. ed. Kluwer Academic Publisher, 2002.
[26] Andrea Goldsmith, Wireless Communications. Cambridge University Press, 2005.