Cooperative Jamming for Physical Layer Security in Wireless Sensor Networks

Vandana M. Rohokale, Neeli R. Prasad, Ramjee Prasad

Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

9 Citations (Scopus)

Abstract

Interference is generally considered as the redundant
and unwanted occurrence in wireless communication. This work
proposes a novel cooperative jamming mechanism for scalable
networks like Wireless Sensor Networks (WSNs) which makes
use of friendly interference to confuse the eavesdropper and
increase its uncertainty about the source message. The whole
communication link is built with the help of Information
theoretic source and channel coding mechanisms. The whole idea
is to make use of normally inactive relay nodes in the selective
Decode and Forward cooperative communication and make them
work as cooperative jamming sources to increase the
equivocation of the eavesdropper. In this work, eavesdropper’s
equivocation is compared with the main channel in terms of
mutual information and secrecy capacity.
Original languageEnglish
Title of host publicationProceedings of 15th International Symposium on Wireless Personal Multimedia Communications
Number of pages5
Place of PublicationTaipei
PublisherIEEE
Publication date2012
Pages458-462
ISBN (Print)978-1-4673-4533-0
Publication statusPublished - 2012
Event2012 15th International Symposium on Wireless Personal Multimedia Communications - Taipei, China
Duration: 24 Sept 201227 Sept 2012

Conference

Conference2012 15th International Symposium on Wireless Personal Multimedia Communications
Country/TerritoryChina
CityTaipei
Period24/09/201227/09/2012
SeriesProceedings of the Wireless Personal Multimedia Communications Symposia
ISSN1347-6890

Keywords

  • Cooperative Jamming
  • Eavesdropper's Equivocation
  • Mutual Information
  • Secrecy Capacity
  • Wireless Sensor Networks (WSNs)

Fingerprint

Dive into the research topics of 'Cooperative Jamming for Physical Layer Security in Wireless Sensor Networks'. Together they form a unique fingerprint.

Cite this