scispace - formally typeset
Open AccessJournal ArticleDOI

Security and reliability trade-off analysis of joint user and jammer selection in the face of co-channel interference

Reads0
Chats0
TLDR
This study investigates the security and reliability trade-off (SRT) performance of a multiuser wireless network, where an eavesdropper attempts to overhear the confidential transmissions between a base station and multiple users under the impact of co-channel interference and proposes two joint user and jammer selection schemes.
Abstract
In this study, the authors investigate the security and reliability trade-off (SRT) performance of a multiuser wireless network, where an eavesdropper attempts to overhear the confidential transmissions between a base station and multiple users under the impact of co-channel interference. To enhance the SRT performance of the network, the authors propose two joint user and jammer selection schemes, namely the joint optimal user and random jammer selection (JOU-RJS) scheme and the joint optimal user and optimal jammer selection (JOU-OJS) scheme. For SRT performance comparison purposes, the traditional multiuser scheduling (TMUS) scheme is also considered. The authors derive closed-form outage and intercept probability expressions for the JOU-RJS and JOUOJS schemes. Simulation results show that the SRTs of both JOU-RJS and JOU-OJS schemes are better than that of the TMUS scheme, where JOU-OJS achieves the best SRT performance. Additionally, this study also shows that an expected outage or intercept probability of the TMUS, JOU-RJS, and JOU-OJS schemes can be achieved by giving an appropriate overall rate. Finally, the sum of the outage and intercept probability can be minimised through an optimal power allocation between the selected user and friendly jammer for the proposed JOU-RJS and JOU-OJS.

read more

Citations
More filters
Journal ArticleDOI

On the Security Enhancement of Uplink NOMA Systems With Jammer Selection

TL;DR: Analytical closed-form expressions for the secrecy outage probability (SOP) are derived and results indicate that the schemes converge to SOP floors with the increasing SNR, while the floors achieved by the RJS-unT and OJS-UNT schemes are significantly lower than that achieve by the NJS-UNt scheme, showing the security advantage of the proposed schemes.
Journal ArticleDOI

Future generation communications with game strategies: A comprehensive survey

Rajni Gupta, +1 more
TL;DR: In this article , a comprehensive review of the potential benefits of applying game theory (GT) in wireless communication is presented, including cooperative and non-cooperative games, Q-learning, and reinforcement learning.
Journal ArticleDOI

Direct Tracking of Co-Channel Moving Sources With Different Cyclic Frequencies

TL;DR: A direct position determination method based on particle filtering is proposed in this letter for tracking multiple co-channel mobile transmitters and outperforms other mobile tracking algorithms in the presence of co- channel interference.
References
More filters
Journal ArticleDOI

The wire-tap channel

TL;DR: This paper finds the trade-off curve between R and d, assuming essentially perfect (“error-free”) transmission, and implies that there exists a Cs > 0, such that reliable transmission at rates up to Cs is possible in approximately perfect secrecy.
Journal ArticleDOI

Guaranteeing Secrecy using Artificial Noise

TL;DR: This paper considers the problem of secret communication between two nodes, over a fading wireless medium, in the presence of a passive eavesdropper, and assumes that the transmitter and its helpers (amplifying relays) have more antennas than the eavesdroppers.
Journal ArticleDOI

A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends

TL;DR: The security requirements of wireless networks, including their authenticity, confidentiality, integrity, and availability issues, and the state of the art in physical-layer security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer are discussed.
Journal ArticleDOI

A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends

TL;DR: In this article, a comprehensive overview of security attacks encountered in wireless networks is presented in view of the network protocol architecture, where the potential security threats are discussed at each protocol layer.
Related Papers (5)