Mobility

Cooperative Jamming and Power Allocation for Wireless Relay Networks in Presence of Eavesdropper

Download Now Free registration required

Executive Summary

Relying on physical layer security is an attractive alternative of utilizing cryptographic algorithms at upper layers of protocol stack for secure communications. In this paper, the authors consider a two-hop wireless relay network in the presence of an eavesdropper. Their scenario of interest spans over a four-node network model including a source, a destination, a trusted relay, and an untrusted eavesdropper in which the relay forwards the source message in a Decode-and-Forward (DF) fashion. The source and relay are allowed to use some of their available power to transmit jamming signals in order to create interference at the eavesdropper. The relay and destination are assumed to have the knowledge of the jamming signals.

  • Format: PDF
  • Size: 128.4 KB