Security and reliability trade-off analysis of joint user and jammer selection in the face of co-channel interference
Reads0
Chats0
TLDR
This study investigates the security and reliability trade-off (SRT) performance of a multiuser wireless network, where an eavesdropper attempts to overhear the confidential transmissions between a base station and multiple users under the impact of co-channel interference and proposes two joint user and jammer selection schemes.Abstract:
In this study, the authors investigate the security and reliability trade-off (SRT) performance of a multiuser wireless network, where an eavesdropper attempts to overhear the confidential transmissions between a base station and multiple users under the impact of co-channel interference. To enhance the SRT performance of the network, the authors propose two joint user and jammer selection schemes, namely the joint optimal user and random jammer selection (JOU-RJS) scheme and the joint optimal user and optimal jammer selection (JOU-OJS) scheme. For SRT performance comparison purposes, the traditional multiuser scheduling (TMUS) scheme is also considered. The authors derive closed-form outage and intercept probability expressions for the JOU-RJS and JOUOJS schemes. Simulation results show that the SRTs of both JOU-RJS and JOU-OJS schemes are better than that of the TMUS scheme, where JOU-OJS achieves the best SRT performance. Additionally, this study also shows that an expected outage or intercept probability of the TMUS, JOU-RJS, and JOU-OJS schemes can be achieved by giving an appropriate overall rate. Finally, the sum of the outage and intercept probability can be minimised through an optimal power allocation between the selected user and friendly jammer for the proposed JOU-RJS and JOU-OJS.read more
Citations
More filters
Journal ArticleDOI
On the Security Enhancement of Uplink NOMA Systems With Jammer Selection
TL;DR: Analytical closed-form expressions for the secrecy outage probability (SOP) are derived and results indicate that the schemes converge to SOP floors with the increasing SNR, while the floors achieved by the RJS-unT and OJS-UNT schemes are significantly lower than that achieve by the NJS-UNt scheme, showing the security advantage of the proposed schemes.
Journal ArticleDOI
Future generation communications with game strategies: A comprehensive survey
Rajni Gupta,Juhi Gupta +1 more
TL;DR: In this article , a comprehensive review of the potential benefits of applying game theory (GT) in wireless communication is presented, including cooperative and non-cooperative games, Q-learning, and reinforcement learning.
Journal ArticleDOI
Direct Tracking of Co-Channel Moving Sources With Different Cyclic Frequencies
TL;DR: A direct position determination method based on particle filtering is proposed in this letter for tracking multiple co-channel mobile transmitters and outperforms other mobile tracking algorithms in the presence of co- channel interference.
References
More filters
Journal ArticleDOI
The wire-tap channel
TL;DR: This paper finds the trade-off curve between R and d, assuming essentially perfect (“error-free”) transmission, and implies that there exists a Cs > 0, such that reliable transmission at rates up to Cs is possible in approximately perfect secrecy.
Journal ArticleDOI
Guaranteeing Secrecy using Artificial Noise
Satashu Goel,Rohit Negi +1 more
TL;DR: This paper considers the problem of secret communication between two nodes, over a fading wireless medium, in the presence of a passive eavesdropper, and assumes that the transmitter and its helpers (amplifying relays) have more antennas than the eavesdroppers.
Journal ArticleDOI
A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends
TL;DR: The security requirements of wireless networks, including their authenticity, confidentiality, integrity, and availability issues, and the state of the art in physical-layer security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer are discussed.
Journal ArticleDOI
A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends
TL;DR: In this article, a comprehensive overview of security attacks encountered in wireless networks is presented in view of the network protocol architecture, where the potential security threats are discussed at each protocol layer.
Related Papers (5)
Impact of Hardware Impairment and Co-Channel Interference on Security-Reliability Trade-Off for Wireless Sensor Networks
Exploiting Opportunistic Scheduling for Physical-Layer Security in Multitwo User NOMA Networks
Kyusung Shim,Beongku An +1 more