DocumentCode :
2521486
Title :
Low complexity cooperative jamming strategies in secure cellular network
Author :
Jeong, Seongah ; Lee, Keonkook ; Kang, Joonhyuk ; Ha, Daehan
Author_Institution :
Korea Adv. Inst. of Sci. & Technol., Daejeon, South Korea
fYear :
2012
fDate :
2-5 Oct. 2012
Firstpage :
730
Lastpage :
734
Abstract :
We consider the K-user cellular network coexisting with a single helper node (HN) (or cooperative jammer) whose objective is to enhance the secrecy of the confidential data transmission. Due to the broadcast nature of the wireless medium, the information leakage to the undesired users is unavoidable when the base station (BS) transmits the private information to the intended mobile user (MU). In this paper, the unintended users are regarded as the potential eavesdroppers and called as the internal eavesdroppers. In [1], the proposed optimal transmission strategy for the helper maximizes the secrecy capacity of the intended user. However, its computational complexity geometrically increases as the number of the legitimate users or the network size grows. This property is inappropriate to the cellular network where dozens of users generally exist. To resolve such practical issue, we design the low complexity transmission strategies of the helper which are insensitive to the network size. In addition, as a part of an effort to develop the usability, we classify the helper´s cooperation according to whether the helper possesses the channel state information (CSI) about the downlink channel BS → MUk for k ∈ K = {1, 2, ..., K} or not. We analyze the computational complexity of the proposed schemes and verify that their complexity dramatically decreases compared to the optimal transmission strategy in [1]. Also, through the simulation results, it is observed that the proposed transmission strategies provide the comparable secrecy rates to that of the optimal transmission.
Keywords :
cellular radio; computational complexity; cooperative communication; jamming; telecommunication security; wireless channels; CSI; K-user cellular network; base station; channel state information; computational complexity; confidential data transmission secrecy; downlink channel BS; information leakage; internal eavesdroppers; low complexity cooperative jamming strategy; low complexity transmission strategy; mobile user; optimal transmission strategy; secure cellular network; single helper node; wireless medium; Array signal processing; Base stations; Computational complexity; Interference; Jamming; Vectors; Physical layer security; cellular network; interference channel; low complexity; transmit beamforming;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Communications and Information Technologies (ISCIT), 2012 International Symposium on
Conference_Location :
Gold Coast, QLD
Print_ISBN :
978-1-4673-1156-4
Electronic_ISBN :
978-1-4673-1155-7
Type :
conf
DOI :
10.1109/ISCIT.2012.6380998
Filename :
6380998
Link To Document :
بازگشت