Secure Full Duplex Communications in the Presence of Malicious Adversary | ||
| The Modares Journal of Electrical Engineering | ||
| Article 6, Volume 16, Issue 2, 2016, Pages 32-37 PDF (463.7 K) | ||
| Authors | ||
| Moslem Foruzesh; Paeiz Azmi* | ||
| M.Sc. student, Department of Electrical and Computer Engineering, Tarbiat Modares University, Tehran Iran | ||
| Abstract | ||
| In this paper, we study the physical layer security in the presence of an adversary which is able to switch its mode from jamming mode (when transmits jamming signals) to eavesdropping mode (when adversary eavesdrops legitimate link) and vice versa. To combat with this type of adversary and establish security in this communication, we propose two approaches: 1) probabilistic approach (PA), 2) worst case approach (WCA). The system model consists of a source, an adversary and full-duplex destination. A full-duplex destination can receive the private message and transmit jamming signal to deceive the adversary, simultaneously. The simulation results show that the average rate PA, is 50% more than the WCA. | ||
| Keywords | ||
| Cooperative communications; power allocation; mode switching of adversary; full-duplex destination | ||
|
Statistics Article View: 77 PDF Download: 61 |
||
| Number of Journals | 45 |
| Number of Issues | 2,171 |
| Number of Articles | 24,674 |
| Article View | 24,395,640 |
| PDF Download | 17,535,415 |