{"title":"Physical layer security: Friendly jamming in an untrusted relay scenario","authors":"B. Ali, Nida Zamir, M. F. U. Butt, S. Ng","doi":"10.1109/EUSIPCO.2016.7760390","DOIUrl":null,"url":null,"abstract":"This paper investigates the achievable secrecy regions when employing a friendly jammer in a cooperative scenario employing an untrusted relay. The untrusted relay which helps to forward the source signal towards the destination, could also be regarded as a potential eavesdropper. Our system employs a friendly jammer which sends a known noise signal towards the relay. In this paper, we investigate the effect of jammer and relay locations on the achievable secrecy rate. We consider two scenarios where in the first case we consider no direct transmission between the source and destination, while in the second case we include a source to destination direct link in our communication system.","PeriodicalId":127068,"journal":{"name":"2016 24th European Signal Processing Conference (EUSIPCO)","volume":"141 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 24th European Signal Processing Conference (EUSIPCO)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EUSIPCO.2016.7760390","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 12
Abstract
This paper investigates the achievable secrecy regions when employing a friendly jammer in a cooperative scenario employing an untrusted relay. The untrusted relay which helps to forward the source signal towards the destination, could also be regarded as a potential eavesdropper. Our system employs a friendly jammer which sends a known noise signal towards the relay. In this paper, we investigate the effect of jammer and relay locations on the achievable secrecy rate. We consider two scenarios where in the first case we consider no direct transmission between the source and destination, while in the second case we include a source to destination direct link in our communication system.