Network-Coding-based Jamming With Triple Transmission Time Slots: A Method To Secure Transmission In An Extreme Case of Source-Wiretapping and Unshared Jamming Signal

Tran, Truc Thanh (2021) Network-Coding-based Jamming With Triple Transmission Time Slots: A Method To Secure Transmission In An Extreme Case of Source-Wiretapping and Unshared Jamming Signal. EAI Endorsed Transactions on Industrial Networks and Intelligent Systems, 8 (27). e5. ISSN 2410-0218

[img]
Preview
Text
eai.23-6-2021.170242.pdf
Available under License Creative Commons Attribution No Derivatives.

Download (1MB) | Preview

Abstract

This article resolves an extreme case in physical layer security: an eavesdropper, located near to a source, can spy on the jamming-seed if it is just cryptographically shared. The direct link between the source and destination is even unavailable. The system is proposed to operate in triple transmission phases (timeslots). In the first phase, jamming signal is proposed to carry a random binary network-coding-based jamming (NCJ )message, transmitted by an active jammer. As NCJ cannot be just cryptographically protected, we propose a solution of using physical layer security to secure this message. As a result, a network-coding method can be employed in which NCJ acts as a key to protect the source message from this extreme case of wiretapping. The spatial diversities in both jamming and legitimate transmission is fully exploited to overcome this challenge with high performance. Analysis and simulation of the outage performance and comparison with current methods are provided to validate the performance of the proposed method.

Item Type: Article
Uncontrolled Keywords: Jamming, physical-layer secrecy rate, relay
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
QA75 Electronic computers. Computer science
T Technology > T Technology (General)
Depositing User: EAI Editor IV
Date Deposited: 09 Jul 2021 08:29
Last Modified: 09 Jul 2021 08:29
URI: https://eprints.eudl.eu/id/eprint/4371

Actions (login required)

View Item View Item