• DocumentCode
    1785941
  • Title

    Resource allocation for maximizing secrecy rate in presence of active eavesdropper

  • Author

    Javan, Mohammad Reza ; Mokari, Nader

  • Author_Institution
    Shahrood Univ., Shahrood, Iran
  • fYear
    2014
  • fDate
    20-22 May 2014
  • Firstpage
    1565
  • Lastpage
    1568
  • Abstract
    In this paper, we consider the problem of power allocation of OFDM user in the presence of an active attacker. The malicious user has the ability of either eavesdropping of ongoing connection or jamming it. However, it can not function as both the eavesdropper and jammer at the same time. The attacker´s policy is to choose between eavesdropping and jamming such that the ultimate secrecy rate is minimized. Hence, the legitimate user considers the worst case at which the ultimate secrecy rate is assumed to be the minimum between the achievable rate of each case. Under the total transmit power constraint, the user distribute the transmit power over subcarrier such that the total secrecy rate is maximized. By simulation, we evaluate the efficiency of the proposed scheme.
  • Keywords
    OFDM modulation; jamming; resource allocation; telecommunication security; OFDM; active eavesdropper; jamming; legitimate user; malicious user; power allocation; resource allocation; secrecy rate maximization; transmit power constraint; Fading; Jamming; OFDM; Optimization; Receivers; Resource management; Transmitters; OFDM; Power allocation; eavesdropping; jamming; secrecy rate;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Electrical Engineering (ICEE), 2014 22nd Iranian Conference on
  • Conference_Location
    Tehran
  • Type

    conf

  • DOI
    10.1109/IranianCEE.2014.6999785
  • Filename
    6999785