About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
inis 21(27): e5

Research Article

Network-Coding-based Jamming With Triple Transmission Time Slots: A Method To Secure Transmission In An Extreme Case of Source-Wiretapping and Unshared Jamming Signal

Download792 downloads
Cite
BibTeX Plain Text
  • @ARTICLE{10.4108/eai.23-6-2021.170242,
        author={Truc Thanh Tran},
        title={Network-Coding-based Jamming With Triple Transmission Time Slots: A Method To Secure Transmission In An Extreme Case of Source-Wiretapping and Unshared Jamming Signal},
        journal={EAI Endorsed Transactions on Industrial Networks and Intelligent Systems},
        volume={8},
        number={27},
        publisher={EAI},
        journal_a={INIS},
        year={2021},
        month={6},
        keywords={Jamming, physical-layer secrecy rate, relay},
        doi={10.4108/eai.23-6-2021.170242}
    }
    
  • Truc Thanh Tran
    Year: 2021
    Network-Coding-based Jamming With Triple Transmission Time Slots: A Method To Secure Transmission In An Extreme Case of Source-Wiretapping and Unshared Jamming Signal
    INIS
    EAI
    DOI: 10.4108/eai.23-6-2021.170242
Truc Thanh Tran1,*
  • 1: Institute of Research and Development, Duy Tan University, Danang, Vietnam
*Contact email: tranthanhtruc1982@gmail.com

Abstract

This article resolves an extreme case in physical layer security: an eavesdropper, located near to a source, can spy on the jamming-seed if it is just cryptographically shared. The direct link between the source and destination is even unavailable. The system is proposed to operate in triple transmission phases (timeslots). In the first phase, jamming signal is proposed to carry a random binary network-coding-based jamming (NCJ )message, transmitted by an active jammer. As NCJ cannot be just cryptographically protected, we propose a solution of using physical layer security to secure this message. As a result, a network-coding method can be employed in which NCJ acts as a key to protect the source message from this extreme case of wiretapping. The spatial diversities in both jamming and legitimate transmission is fully exploited to overcome this challenge with high performance. Analysis and simulation of the outage performance and comparison with current methods are provided to validate the performance of the proposed method.

Keywords
Jamming, physical-layer secrecy rate, relay
Received
2021-06-04
Accepted
2021-06-21
Published
2021-06-23
Publisher
EAI
http://dx.doi.org/10.4108/eai.23-6-2021.170242

Copyright © 2021 Truc Thanh Tran, licensed to EAI. This is an open access article distributed under the terms of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/3.0/), which permits unlimited use, distribution and reproduction in any medium so long as the original work is properly cited.

EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL