Secure wireless communications via cooperative relaying and jamming

Ling Tang, Xiaowen Gong, Jianhui Wu, Junshan Zhang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

26 Scopus citations

Abstract

We consider secure wireless communications between a source and a destination aided by a multi-antenna relay, in the presence of an eavesdropper. In particular, two cooperation schemes of the relay are explored: cooperative relaying (CR) and cooperative jamming (CJ). We first investigate the transmit weight optimization of CR and CJ, for both cases with and without the eavesdropper's channel state information (ECSI). Then, for the case with ECSI, we derive the conditions under which CR achieves a higher secrecy rate than CJ; for the case without ECSI, we compare the secrecy rates of CR and CJ in high transmit power regimes. Building on this, we propose a novel hybrid scheme in which the relay utilizes both CR and CJ, and study the power allocation of the relay between CR and CJ for maximizing the secrecy rate.

Original languageEnglish (US)
Title of host publication2011 IEEE GLOBECOM Workshops, GC Wkshps 2011
Pages849-853
Number of pages5
DOIs
StatePublished - Dec 1 2011
Event2011 IEEE GLOBECOM Workshops, GC Wkshps 2011 - Houston, TX, United States
Duration: Dec 5 2011Dec 9 2011

Publication series

Name2011 IEEE GLOBECOM Workshops, GC Wkshps 2011

Other

Other2011 IEEE GLOBECOM Workshops, GC Wkshps 2011
Country/TerritoryUnited States
CityHouston, TX
Period12/5/1112/9/11

Keywords

  • beamforming
  • cooperative jamming
  • cooperative relaying
  • physical layer security

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Communication

Fingerprint

Dive into the research topics of 'Secure wireless communications via cooperative relaying and jamming'. Together they form a unique fingerprint.

Cite this