TR2011-080

Secrecy Rate Analysis of Jamming Superposition in Presence of Many Eavesdropping Users


    •  Koike-Akino, T., Duan, C., "Secrecy Rate Analysis of Jamming Superposition in Presence of Many Eavesdropping Users", IEEE Global Telecommunications Conference (GLOBECOM), DOI: 10.1109/​GLOCOM.2012.6133990, December 2011, pp. 1-6.
      BibTeX TR2011-080 PDF
      • @inproceedings{Koike-Akino2011dec,
      • author = {Koike-Akino, T. and Duan, C.},
      • title = {Secrecy Rate Analysis of Jamming Superposition in Presence of Many Eavesdropping Users},
      • booktitle = {IEEE Global Telecommunications Conference (GLOBECOM)},
      • year = 2011,
      • pages = {1--6},
      • month = dec,
      • doi = {10.1109/GLOCOM.2012.6133990},
      • url = {https://www.merl.com/publications/TR2011-080}
      • }
  • MERL Contact:
  • Research Area:

    Communications

TR Image
Abstract:

It has been shown that the secrecy capacity of a wireless network is pushed rapidly towards zero as the number of users in the network grows. To deal with this issue, a secure method which intentionally superposes precoded jamming signals has been proposed. In this paper, we analyze its advantage to realize a secure wireless network in the presence of a large number (e.g., hundreds) of eavesdropping users, for transmitting confidential messages. Our analysis and simulations demonstrate that the jamming superposition achieves high secrecy rate even for undesired cases where the channels for many eavesdroppers are noise-less and highly correlated with the intended receiver.

 

  • Related News & Events