Font Size: a A A

Cooperative Jamming For Secure Wireless Communication

Posted on:2018-09-28Degree:MasterType:Thesis
Country:ChinaCandidate:L J ZhangFull Text:PDF
GTID:2348330518498942Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the rapid growth of wireless communications,the ever-increasing demand for private and sensitive data transmission over wireless networks has made security a crucial concern in large-scale wireless networks,partially due to the broadcast nature of wireless channels and the complexity of network structure.To make safety matters worse,more and more sensitive information sent using the wireless network.Furthermore,quantum computing has sounded the alarm for conventional cryptography.Currently,the emerging research direction is by raising the physical security to improve the environment of wireless network security.Different from the traditional network security methods based on cryptography,the physical layer security technology based on cooperation is a new method and solution in the field of information security.It is through the use of the inherent nature of wireless and randomness to ensure the security of the wireless network.Though the theory study shows that the physical security has great potential to strengthen the security performance of the wireless communication,there are still many practical challenges to be solved when transforming the theory into practice.In order to resist the security threat of quantum computing to traditional cryptography and wireless network,this project,from the physical layer security perspective,studies the theory and method of cooperative jamming in physical layer security technology,improving the security of wireless networks by introducing cooperative jamming.The secure communication link under cooperative jamming is analyzed based on the secure communication diagram i S-Graph.Then the method of how to obtaining j S-Graph graph is proposed,simultaneously the security connection probability of j S-Graph is analyzed.With the environment of the location information of eavesdropper is unknown and there is no limit to the number of eavesdroppers,to interference the eavesdropper which is at any location of environment in the network,the article proposed some jamming strategies.To tackle multiple eavesdroppers without location information,we employ a divide and conquer method,which requires the source to generate multiple blocks based on the algorithm for a message to be delivered,and send each block in a separate transmission.In each separate transmission,we pick a jammer to inject noise with proper power to degrade the signal quality at eavesdroppers near the jammer.The above strategy can not deal with the eavesdropper near the source node and the destination node.Therefore,this paper proposes a two-stage cooperative jamming strategy.The simulation results show that,the two-stage cooperative jamming strategy make the secrecy outage probability of the wireless network reduced,make the secrecy coverage enhancement.That is the two-stage cooperative jamming strategy can significantly improve the security performance of the wireless network.And the intelligent jamming protocol is combined with the two-stage jamming protocol so that the jamming area can cover all the communication areas in the network,so that the communication between the legitimate nodes is security.Based on this,we improve the usage model.Multiple indexes such as the secrecy outage probability,the secrecy coverage,the secrecy rate maximization,and the fading channel is analyzed.Aimed at the problem of minimum number of jammers,the article proposed three jammer placement methods.And for a specific application scenario,three jammer placement algorithms are compared,and points out their advantages and disadvantages and the usage scenario.This article in view of the scenario above,research the security of cooperative jamming in wireless network and the jammer placement algorithms,studies the safety performance indicators with the operative jamming,and minimum number of jammers.
Keywords/Search Tags:cooperative jamming, wireless networks, secure communication graph, physical security
PDF Full Text Request
Related items