Physical-Layer Security Against Smart Eavesdroppers: Exploiting Full-Duplex Receivers

Cited 20 time in webofscience Cited 25 time in scopus
  • Hit : 160
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorKim, Jongyeopko
dc.contributor.authorKim, Jinwoongko
dc.contributor.authorLee, Jeminko
dc.contributor.authorChoi, Jihwan P.ko
dc.date.accessioned2021-02-18T08:30:11Z-
dc.date.available2021-02-18T08:30:11Z-
dc.date.created2021-02-18-
dc.date.issued2018-
dc.identifier.citationIEEE ACCESS, v.6, pp.32945 - 32957-
dc.identifier.issn2169-3536-
dc.identifier.urihttp://hdl.handle.net/10203/280855-
dc.description.abstractAs many security solutions integrated with various technologies have been proposed against eavesdropping attacks, technical advances for adversaries can also pose a serious security threat. This paper considers a problem of smart eavesdropping attacks on multiple-input-multiple-output wiretap channels for a legitimate transceiver. We present a smart eavesdropper model and a cooperative jamming solution between transceivers that can control the jamming signal power to achieve the optimal secrecy performance. In particular, for practical applications, our proposed solution considers the residual self-interference from the full-duplex receiver and the limited cancellation capability of the smart eavesdropper. We derive the secrecy outage probability in general and smart eavesdropper cases, and show numerical results and secrecy regions for evaluation. As a result, our proposed solutions can improve the secrecy performance significantly by exploiting the full-duplex receiver and the cooperative jamming strategies with the sophisticated power control according to power expenditure.-
dc.languageEnglish-
dc.publisherIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC-
dc.titlePhysical-Layer Security Against Smart Eavesdroppers: Exploiting Full-Duplex Receivers-
dc.typeArticle-
dc.identifier.wosid000438592600001-
dc.identifier.scopusid2-s2.0-85048153161-
dc.type.rimsART-
dc.citation.volume6-
dc.citation.beginningpage32945-
dc.citation.endingpage32957-
dc.citation.publicationnameIEEE ACCESS-
dc.identifier.doi10.1109/ACCESS.2018.2844558-
dc.contributor.localauthorChoi, Jihwan P.-
dc.contributor.nonIdAuthorKim, Jongyeop-
dc.contributor.nonIdAuthorKim, Jinwoong-
dc.contributor.nonIdAuthorLee, Jemin-
dc.description.isOpenAccessN-
dc.type.journalArticleArticle-
dc.subject.keywordAuthorPhysical layer security-
dc.subject.keywordAuthorfull-duplex systems-
dc.subject.keywordAuthoroptimal power allocation-
dc.subject.keywordAuthorjamming-
dc.subject.keywordAuthoreavesdropping-
dc.subject.keywordAuthorresidual self-interference-
dc.subject.keywordAuthorsecrecy outage probability-
dc.subject.keywordPlusARTIFICIAL-NOISE-
dc.subject.keywordPlusWIRELESS NETWORKS-
dc.subject.keywordPlusOFDM SYSTEMS-
dc.subject.keywordPlusSECRECY RATE-
dc.subject.keywordPlusCOMMUNICATION-
dc.subject.keywordPlusCHANNELS-
Appears in Collection
AE-Journal Papers(저널논문)
Files in This Item
There are no files associated with this item.
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 20 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0