Paper
11 October 2023 Research on physical layer security based on cooperative interference
Haiyan Huang, Yuxin Ai, Linlin Liang
Author Affiliations +
Proceedings Volume 12918, Fourth International Conference on Computer Science and Communication Technology (ICCSCT 2023); 1291813 (2023) https://doi.org/10.1117/12.3009425
Event: International Conference on Computer Science and Communication Technology (ICCSCT 2023), 2023, Wuhan, China
Abstract
Because of the openness of the wireless relay channel, the confidential information transmitted in the channel is very easy to be eavesdropped on by malicious eavesdroppers and cause information leakage. In specifically, a friendly jammer will transmit a jamming signal to confound an eavesdropper attempting to listen in on a relay transmission. For wireless relay networks using the Rayleigh fading channel model, this research proposes a physical layer security technique based on cooperative interference. In the system, we design two-time stages to realize the transmission of the source to the user. During the initial phase, the signal source transmits a composite signal to both the user and the relay. In the second phase, the confidential information is relayed and artificial noise is generated by friendly jammers to confuse eavesdroppers. Through our proposed method, we derive precise analytical expressions for the intercept probability (IP) and outage probability (OP). The correctness of the theoretical derivation is verified by numerical results and theoretical simulation.
(2023) Published by SPIE. Downloading of the abstract is permitted for personal use only.
Haiyan Huang, Yuxin Ai, and Linlin Liang "Research on physical layer security based on cooperative interference", Proc. SPIE 12918, Fourth International Conference on Computer Science and Communication Technology (ICCSCT 2023), 1291813 (11 October 2023); https://doi.org/10.1117/12.3009425
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Relays

Network security

Signal to noise ratio

Computer security

Information security

Picosecond phenomena

Monte Carlo methods

Back to Top