scholarly journals A Cooperative Jamming Technique to Protect a Two-User Broadcast Channel with Confidential Messages and an External Eavesdropper

Electronics ◽  
2020 ◽  
Vol 9 (3) ◽  
pp. 496
Author(s):  
Gustavo Anjos ◽  
Daniel Castanheira ◽  
Adão Silva ◽  
Atílio Gameiro

This work addresses the security of a two-user broadcast channel. The challenge of protecting a broadcast channel is associated with the necessity of securing the system, not only against eavesdropping attacks originating from external nodes, but also to ensure that the inside users do not eavesdrop on each other’s information. To address this issue, the present work proposes a cooperative jamming scheme that provides protection against eavesdropping attacks carried out simultaneously by inside users and external eavesdroppers. To achieve this goal, the developed scheme combines real interference alignment with a blind cooperative jamming technique defined in the literature. An information theoretical analysis shows that positive secure degrees of freedom are achievable using the proposed solution.

Entropy ◽  
2019 ◽  
Vol 21 (10) ◽  
pp. 945
Author(s):  
Karim Banawan ◽  
Sennur Ulukus

We investigate the secure degrees of freedom (s.d.o.f.) of three new channel models: broadcast channel with combating helpers, interference channel with selfish users, and multiple access wiretap channel with deviating users. The goal of introducing these channel models is to investigate various malicious interactions that arise in networks, including active adversaries. That is in contrast with the common assumption in the literature that the users follow a certain protocol altruistically and transmit both message-carrying and cooperative jamming signals in an optimum manner. In the first model, over a classical broadcast channel with confidential messages (BCCM), there are two helpers, each associated with one of the receivers. In the second model, over a classical interference channel with confidential messages (ICCM), there is a helper and users are selfish. By casting each problem as an extensive-form game and applying recursive real interference alignment, we show that, for the first model, the combating intentions of the helpers are neutralized and the full s.d.o.f. is retained; for the second model, selfishness precludes secure communication and no s.d.o.f. is achieved. In the third model, we consider the multiple access wiretap channel (MAC-WTC), where multiple legitimate users wish to have secure communication with a legitimate receiver in the presence of an eavesdropper. We consider the case when a subset of users deviate from the optimum protocol that attains the exact s.d.o.f. of this channel. We consider two kinds of deviation: when some of the users stop transmitting cooperative jamming signals, and when a user starts sending intentional jamming signals. For the first scenario, we investigate possible responses of the remaining users to counteract such deviation. For the second scenario, we use an extensive-form game formulation for the interactions of the deviating and well-behaving users. We prove that a deviating user can drive the s.d.o.f. to zero; however, the remaining users can exploit its intentional jamming signals as cooperative jamming signals against the eavesdropper and achieve an optimum s.d.o.f.


2013 ◽  
Vol 59 (1) ◽  
pp. 315-328 ◽  
Author(s):  
Sheng Yang ◽  
Mari Kobayashi ◽  
David Gesbert ◽  
Xinping Yi

Fluids ◽  
2020 ◽  
Vol 5 (1) ◽  
pp. 34
Author(s):  
Pengtao Shi ◽  
Jihai Liu ◽  
Yingsong Gu ◽  
Zhichun Yang ◽  
Pier Marzocca

Aiming at the experimental test of the body freedom flutter for modern high aspect ratio flexible flying wing, this paper conducts a body freedom flutter wind tunnel test on a full-span flying wing flutter model. The research content is summarized as follows: (1) The full-span finite element model and aeroelastic model of an unmanned aerial vehicle for body freedom flutter wind tunnel test are established, and the structural dynamics and flutter characteristics of this vehicle are obtained through theoretical analysis. (2) Based on the preliminary theoretical analysis results, the design and manufacturing of this vehicle are completed, and the structural dynamic characteristics of the vehicle are identified through ground vibration test. Finally, the theoretical analysis model is updated and the corresponding flutter characteristics are obtained. (3) A novel quasi-free flying suspension system capable of releasing pitch, plunge and yaw degrees of freedom is designed and implemented in the wind tunnel flutter test. The influence of the nose mass balance on the flutter results is explored. The study shows that: (1) The test vehicle can exhibit body freedom flutter at low airspeeds, and the obtained flutter speed and damping characteristics are favorable for conducting the body freedom flutter wind tunnel test. (2) The designed suspension system can effectively release the degrees of freedom of pitch, plunge, and yaw. The flutter speed measured in the wind tunnel test is 9.72 m/s, and the flutter frequency is 2.18 Hz, which agree well with the theoretical results (with flutter speed of 9.49 m/s and flutter frequency of 2.03 Hz). (3) With the increasing of the mass balance at the nose, critical speed of body freedom flutter rises up and the flutter frequency gradually decreases, which also agree well with corresponding theoretical results.


2019 ◽  
Vol 8 (4) ◽  
pp. 50 ◽  
Author(s):  
Yusuf Abdulkadir ◽  
Oluyomi Simpson ◽  
Yichuang Sun

Interference alignment (IA) is an innovative wireless transmission strategy that has shown to be a promising technique for achieving optimal capacity scaling of a multiuser interference channel at asymptotically high-signal-to-noise ratio (SNR). Transmitters exploit the availability of multiple signaling dimensions in order to align their mutual interference at the receivers. Most of the research has focused on developing algorithms for determining alignment solutions as well as proving interference alignment’s theoretical ability to achieve the maximum degrees of freedom in a wireless network. Cognitive radio, on the other hand, is a technique used to improve the utilization of the radio spectrum by opportunistically sensing and accessing unused licensed frequency spectrum, without causing harmful interference to the licensed users. With the increased deployment of wireless services, the possibility of detecting unused frequency spectrum becomes diminished. Thus, the concept of introducing interference alignment in cognitive radio has become a very attractive proposition. This paper provides a survey of the implementation of IA in cognitive radio under the main research paradigms, along with a summary and analysis of results under each system model.


Sign in / Sign up

Export Citation Format

Share Document