Cooperative jammer design in cellular network with internal eavesdroppers

Seongah Jeong, Keonkook Lee, Joonhyuk Kang, Youngseok Baek, Bontae Koo

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

13 Scopus citations

Abstract

In this paper, we consider a cooperative jammer to improve secrecy of the wireless transmission in a cellular downlink network. The private message intended for a single user should be kept from the remainder of the users who are regarded as internal eavesdroppers. To improve the secrecy of the intended user, we propose an employment of a helper with multiple antennas and design its optimal transmit beamforming vector. Specifically, the helper node generates the artificial interference to the internal eavesdroppers and so enhances the security by increasing the ambiguity at the eavesdroppers. Based on a framework of power gain region in [1], we optimize the transmission strategy for the helper which maximizes the secrecy capacity of the intended user. The analytical and simulation results show that the proposed scheme enhances the secrecy capacity. In addition, all users whose secrecy rates are zero with no helper's cooperation can achieve the positive secrecy rate by the proposed scheme.

Original languageEnglish
Title of host publicationMILCOM 2012 - 2012 IEEE Military Communications Conference
DOIs
StatePublished - 2012
Event2012 IEEE Military Communications Conference, MILCOM 2012 - Orlando, FL, United States
Duration: 1 Nov 20121 Nov 2012

Publication series

NameProceedings - IEEE Military Communications Conference MILCOM

Conference

Conference2012 IEEE Military Communications Conference, MILCOM 2012
Country/TerritoryUnited States
CityOrlando, FL
Period1/11/121/11/12

Keywords

  • cellular network
  • interference channel
  • Physical layer security
  • transmit beamforming

Fingerprint

Dive into the research topics of 'Cooperative jammer design in cellular network with internal eavesdroppers'. Together they form a unique fingerprint.

Cite this