Projects per year
This paper deals with the use of jamming transmission for physical layer security in wireless networks with power constraints. An approach that incorporates a dirty-paper coding (DPC) design with the jamming process under a total power constraint is investigated. The proposed scheme enables both the source and the jammer nodes to create intentional interference on the eavesdropper node and significantly improves the achievable secure rate of the system. A power allocation (PA) policy that defines how the available power is distributed between the source and the jammer node as well as between the superimposed terms of the DPC design is investigated. We show that the PA policy has an important impact on the secrecy performance of the jamming process and determines how the interference should be transmitted between the two independent jamming channels.
|Title of host publication||GLOBECOM Workshops (GC Wkshps), 2010 IEEE|
|Publication status||Published - 1 Dec 2010|