• Login
    View Item 
    •   Home
    • Office of Sponsored Research (OSR)
    • KAUST Funded Research
    • Publications Acknowledging KAUST Support
    • View Item
    •   Home
    • Office of Sponsored Research (OSR)
    • KAUST Funded Research
    • Publications Acknowledging KAUST Support
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Browse

    All of KAUSTCommunitiesIssue DateSubmit DateThis CollectionIssue DateSubmit Date

    My Account

    Login

    Quick Links

    Open Access PolicyORCID LibguidePlumX LibguideSubmit an Item

    Statistics

    Display statistics

    A new jamming technique for secrecy in multi-antenna wireless networks

    • CSV
    • RefMan
    • EndNote
    • BibTex
    • RefWorks
    Type
    Conference Paper
    Authors
    Bakr, Omar
    Mudumbai, Raghuraman
    Date
    2010-06
    Permanent link to this record
    http://hdl.handle.net/10754/597341
    
    Metadata
    Show full item record
    Abstract
    We consider the problem of secure wireless communication in the presence of an eavesdropper when the transmitter has multiple antennas, using a variation of the recently proposed artificial noise technique. Under this technique, the transmitter sends a pseudo-noise jamming signal to selectively degrade the link to the eavesdropper without affecting the desired receiver. The previous work in the literature focuses on ideal Gaussian signaling for both the desired signal and the noise signal. The main contribution of this paper is to show that the Gaussian signaling model has important limitations and propose an alternative "induced fading" jamming technique that takes some of these limitations into account. Specifically we show that under the Gaussian noise scheme, the eavesdropper is able to recover the desired signal with very low bit error rates when the transmitter is constrained to use constant envelope signaling. Furthermore, we show that an eavesdropper with multiple antennas is able to use simple, blind constant-envelope algorithms to completely remove the Gaussian artificial noise signal and thus defeat the secrecy scheme. We propose an alternative scheme that induces artificial fading in the channel to the eavesdropper, and show that it outperforms the Gaussian noise scheme in the sense of causing higher bit error rates at the eavesdropper and is also more resistant to constant modulus-type algorithms. © 2010 IEEE.
    Citation
    Bakr O, Mudumbai R (2010) A new jamming technique for secrecy in multi-antenna wireless networks. 2010 IEEE International Symposium on Information Theory. Available: http://dx.doi.org/10.1109/ISIT.2010.5513559.
    Sponsors
    Omar Bakr’s research is sponsored by a fellowship from King AbdullahUniversity of Science and Technology. The authors would also like toacknowledge the students, faculty and sponsors of the Berkeley WirelessResearch Center, and the National Science Foundation Infrastructure GrantNo. 0403427.
    Publisher
    Institute of Electrical and Electronics Engineers (IEEE)
    Journal
    2010 IEEE International Symposium on Information Theory
    DOI
    10.1109/ISIT.2010.5513559
    ae974a485f413a2113503eed53cd6c53
    10.1109/ISIT.2010.5513559
    Scopus Count
    Collections
    Publications Acknowledging KAUST Support

    entitlement

     
    DSpace software copyright © 2002-2021  DuraSpace
    Quick Guide | Contact Us | Send Feedback
    Open Repository is a service hosted by 
    Atmire NV
     

    Export search results

    The export option will allow you to export the current search results of the entered query to a file. Different formats are available for download. To export the items, click on the button corresponding with the preferred download format.

    By default, clicking on the export buttons will result in a download of the allowed maximum amount of items. For anonymous users the allowed maximum amount is 50 search results.

    To select a subset of the search results, click "Selective Export" button and make a selection of the items you want to export. The amount of items that can be exported at once is similarly restricted as the full export.

    After making a selection, click one of the export format buttons. The amount of items that will be exported is indicated in the bubble next to export format.