Turn off MathJax
Article Contents
Xiao MA, Dan LI, Liang WANG, et al., “A Secure Communicating While Jamming Approach for End-to-End Multi-Hop Wireless Communication Network,” Chinese Journal of Electronics, vol. 33, no. 3, pp. 1–14, 2024 doi: 10.23919/cje.2022.00.448
Citation: Xiao MA, Dan LI, Liang WANG, et al., “A Secure Communicating While Jamming Approach for End-to-End Multi-Hop Wireless Communication Network,” Chinese Journal of Electronics, vol. 33, no. 3, pp. 1–14, 2024 doi: 10.23919/cje.2022.00.448

A Secure Communicating While Jamming Approach for End-to-End Multi-Hop Wireless Communication Network

doi: 10.23919/cje.2022.00.448
More Information
  • Author Bio:

    Xiao MA received the B.S., M.S., and Ph.D. degrees from Xidian University, Xi’an, China, in 2006, 2009, and 2014, respectively. From 2009 to 2010, he was a Software Engineer with ZTE Corporation. Since 2014, he has been with the School of Physics and Information Technology, Shaanxi Normal University, Xi’an, where he is currently an Associate Professor. He was a Visiting Scholar with the University of British Columbia, Vancouver, BC Canada. His research interests include wireless communications, mobile ad hoc networks, and concurrent transmission. (Email: xma@snnu.edu.cn)

    Dan LI received the M.S. degree from the Department of Physics and Information Technology, Shaanxi Normal University, Xi’an, China, in 2022. Currently, she is a Software Engineer in the Beijing Aerospace Science and Industry Century Satellite Hi-tech Co., Ltd., Xi’an Branch. Her research interest is the research of wireless network electromagnetic control. (Email: ldan1201@163.com)

    Liang WANG received the B.S. degree in telecommunications engineering and the Ph.D. degree in communication and information systems from Xidian University, Xi’an, China, in 2009 and 2015, respectively. He is currently an Associate Professor with the School of Computer Science, Shaanxi Normal University, Xi’an, China. From 2018 to 2019, he was a Visiting Scholar with the School of Electrical and Computer Engineering, Georgia Institute of Technology, USA. His research interests focus on Internet of things, mobile edge computing, and applications of reinforcement learning and robust design in wireless communications networks. (Email: wangliang@snnu.edu.cn)

    Weijia HAN received the B.S. degree from Northwest University, China, the M.S. degree from Queen’s University Belfast, UK, and the Ph.D. degree from Xidian University, Xi’an, China. He is now working as a faculty member in Shaanxi Normal University, Xi’an, China. He had worked as a Visiting Scholar at Texas A&M University, USA. His research interests include sensing & machine learning in cognitive radio networks, resource management & network optimization, and cognitive media access protocol & algorithm design. (Email: wjhan@snnu.edu.cn)

    Nan ZHAO received the B.S., M.S., and Ph.D. degrees from Xidian University, Xi’an, China, in 2003, 2008, and 2012, respectively. Since 2012, he has been with the State Key Laboratory of Integrated Services Networks, Xidian University, where he is currently an Associate Professor. From 2014 to 2015, he was a Visiting Scholar with the Michigan State University, East Lansing, MI, USA. His research interests include physical layer security and physical layer network, green ICT, power division and allocation, social media data mining and information processing. (Email: zhaonan@xidian.edu.cn)

  • Corresponding author: Email: wangliang@snnu.edu.cn
  • Received Date: 2022-12-26
  • Accepted Date: 2023-02-14
  • Available Online: 2023-08-22
  • With the rapid development of wireless communications, cellular communication and distributed wireless network is fragile to eavesdropping due to distributed users and transparent communication. However, to adopt bigger transmit power at a given area to interfere potential eavesdroppers not only incurs huge energy waste but also may suppresses regular communication in this area. To this end, we focus on secure communication in multi-hop wireless communication network, and propose two communicating while jamming schemes for secure communication in presence of potential eavesdroppers for the narrow band and broad band point-to-point (P2P) systems respectively with the aid of artificial noise transmitted by a chosen cooperative interferer. Furthermore, to achieve the end-to-end (E2E) multi-hop secure communication, we devise the secure network topology discovering scheme via constructing a proper network topology with at least one proper node as the cooperative interferer in each hop, and then propose the secure transmission path planning scheme to find an E2E secure transmission route from source to destination, respectively. Experiments on the wireless open-access research platform demonstrate the feasibility of the proposed schemes. Besides, simulations results validate that the proposed schemes can achieve better performance compared with existing methods in both the P2P communication case and E2E multi-hop communication network scenario.
  • loading
  • [1]
    M. Vaezi, A. Azari, S. R. Khosravirad, et al., “Cellular, wide-area, and non-terrestrial IoT: a survey on 5G advances and the road toward 6G,” IEEE Communications Surveys & Tutorials, vol. 24, no. 2, pp. 1117–1174, 2022. doi: 10.1109/COMST.2022.3151028
    [2]
    G. Geraci, A. Garcia-Rodriguez, M. M. Azari, et al., “What will the future of UAV cellular communications be? A flight from 5G to 6G,” IEEE Communications Surveys & Tutorials, vol. 24, no. 3, pp. 1304–1335, 2022. doi: 10.1109/COMST.2022.3171135
    [3]
    Z. Q. Wang, Y. Du, K. J. Wei, et al., “Vision, application scenarios, and key technology trends for 6G mobile communications,” Science China Information Sciences, vol. 65, no. 5, article no. 151301, 2022. doi: 10.1007/s11432-021-3351-5
    [4]
    Y. L. Zou, J. Zhu, X. B. Wang, et al., “A survey on wireless security: technical challenges, recent advances, and future trends,” Proceedings of the IEEE, vol. 104, no. 9, pp. 1727–1765, 2016. doi: 10.1109/JPROC.2016.2558521
    [5]
    F. Zhou, G. Sun, X. Bai, et al., “A novel method for adaptive SAR barrage jamming suppression,” IEEE Geoscience and Remote Sensing Letters, vol. 9, no. 2, pp. 292–296, 2012. doi: 10.1109/LGRS.2011.2166753
    [6]
    Q. Z. Shi, J. J. Huang, T. Xie, et al., “An active jamming method against ISAR based on periodic binary phase modulation,” IEEE Sensors Journal, vol. 19, no. 18, pp. 7950–7960, 2019. doi: 10.1109/JSEN.2019.2905557
    [7]
    S. H. Cheng, X. L. Sun, Y. H. Cai, et al., “A joint azimuth multichannel cancellation (JAMC) antibarrage jamming scheme for spaceborne SAR,” IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing, vol. 15 pp. 9913–9926, 2022. doi: 10.1109/JSTARS.2022.3221402
    [8]
    T. Cogalan, D. Camps-Mur, J. Gutiérrez, et al., “5G-CLARITY: 5G-advanced private networks integrating 5GNR, WiFi, and LiFi,” IEEE Communications Magazine, vol. 60, no. 2, pp. 73–79, 2022. doi: 10.1109/MCOM.001.2100615
    [9]
    Z. M. Fadlullah, B. M. Mao, and N. Kato, “Balancing QoS and security in the edge: existing practices, challenges, and 6G opportunities with machine learning,” IEEE Communications Surveys & Tutorials, vol. 24, no. 4, pp. 2419–2448, 2022. doi: 10.1109/COMST.2022.3191697
    [10]
    R. Negi and S. Goel, “Secret communication using artificial noise,” in Proceedings of the VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, Dallas, TX, USA, pp. 1906–1910, 2005.
    [11]
    C. X. Liu, N. Yang, R. Malaney, et al., “Artificial-noise-aided transmission in multi-antenna relay wiretap channels with spatially random eavesdroppers,” IEEE Transactions on Wireless Communications, vol. 15, no. 11, pp. 7444–7456, 2016. doi: 10.1109/TWC.2016.2602337
    [12]
    H. L. He, X. Z. Luo, J. Weng, et al., “Secure transmission in multiple access wiretap channel: cooperative jamming without sharing CSI,” IEEE Transactions on Information Forensics and Security, vol. 16 pp. 3401–3411, 2021. doi: 10.1109/TIFS.2021.3080499
    [13]
    D. Xu and H. B. Zhu, “Proactive eavesdropping via jamming over short packet suspicious communications with finite blocklength,” IEEE Transactions on Communications, vol. 70, no. 11, pp. 7505–7519, 2022. doi: 10.1109/TCOMM.2022.3208621
    [14]
    J. B. Si, Z. H. Cheng, Z. Li, et al., “Cooperative jamming for secure transmission with both active and passive eavesdroppers,” IEEE Transactions on Communications, vol. 68, no. 9, pp. 5764–5777, 2020. doi: 10.1109/TCOMM.2020.3003946
    [15]
    X. Jiang, B. Y. Zheng, L. Wang, et al., “Clustering for topological interference management,” Chinese Journal of Electronics, vol. 31, no. 5, pp. 844–850, 2022. doi: 10.1049/cje.2021.00.277
    [16]
    A. Gouissem, K. Abualsaud, E. Yaacoub, et al., “Toward secure IoT networks in healthcare applications: a game-theoretic anti-jamming framework,” IEEE Internet of Things Journal, vol. 9, no. 20, pp. 19615–19633, 2022. doi: 10.1109/JIOT.2022.3170382
    [17]
    J. H. Anajemba, C. Iwendi, I. Razzak, et al., “A counter-eavesdropping technique for optimized privacy of wireless industrial IoT communications,” IEEE Transactions on Industrial Informatics, vol. 18, no. 9, pp. 6445–6454, 2022. doi: 10.1109/TII.2021.3140109
    [18]
    B. Okyere, L. Musavian, B. Özbek, et al., “The resilience of massive MIMO PNC to jamming attacks in vehicular networks,” IEEE Transactions on Intelligent Transportation Systems, vol. 22, no. 7, pp. 4110–4117, 2021. doi: 10.1109/TITS.2020.3016907
    [19]
    Y. Zhou, P. L. Yeoh, C. H. Pan, et al., “Caching and UAV friendly jamming for secure communications with active eavesdropping attacks,” IEEE Transactions on Vehicular Technology, vol. 71, no. 10, pp. 11251–11256, 2022. doi: 10.1109/TVT.2022.3186730
    [20]
    Y. Xu, J. Liu, Y. L. Shen, et al., “Incentive jamming-based secure routing in decentralized Internet of Things,” IEEE Internet of Things Journal, vol. 8, no. 4, pp. 3000–3013, 2021. doi: 10.1109/JIOT.2020.3025151
    [21]
    H. Dang-Ngoc, D. N. Nguyen, K. Ho-Van, et al., “Secure swarm UAV-assisted communications with cooperative friendly jamming,” IEEE Internet of Things Journal, vol. 9, no. 24, pp. 25596–25611, 2022. doi: 10.1109/JIOT.2022.3197975
    [22]
    D. Li, X. Ma, and W. J. Han, “A point-to-point security communication system: artificial noise jamming insertion,” in Proceedings of the 2021 IEEE 9th International Conference on Information, Communication and Networks (ICICN), Xi’an, China, pp. 139–143, 2021.
    [23]
    F. Tong, B. W. Ding, Y. J. Zhang, et al., “A single-anchor mobile localization scheme,” IEEE Transactions on Mobile Computing, Early Access, 2022. doi: 10.1109/TMC.2022.3221957
    [24]
    P. H. Wang, R. Zhou, X. P. Fan, et al., “A distance estimation model for DV-hop localization in WSNs,” IEEE Transactions on Vehicular Technology, vol. 72, no. 4, pp. 5290–5299, 2023. doi: 10.1109/TVT.2022.3227314
    [25]
    Y. Xu, J. Liu, Y. L. Shen, et al., “QoS-aware secure routing design for wireless networks with selfish jammers,” IEEE Transactions on Wireless Communications, vol. 20, no. 8, pp. 4902–4916, 2021. doi: 10.1109/TWC.2021.3062885
    [26]
    J. C. Wang, X. Ma, D. Li, et al., “Reinforcement learning for suppressing eavesdroppers in wireless communication system,” in Proceedings of the 2021 IEEE 9th International Conference on Information, Communication and Networks (ICICN), Xi’an, China, pp.159–165, 2021.
    [27]
    L. L. Dai, B. C. Wang, Z. G. Ding, et al., “A survey of non-orthogonal multiple access for 5G,” IEEE Communications Surveys & Tutorials, vol. 20, no. 3, pp. 2294–2323, 2018. doi: 10.1109/COMST.2018.2835558
    [28]
    W. J. Han, Y. Zhang, X. J. Wang, et al., “Orthogonal power division multiple access: a green communication perspective,” IEEE Journal on Selected Areas in Communications, vol. 34, no. 12, pp. 3828–3842, 2016. doi: 10.1109/JSAC.2016.2600139
    [29]
    W. J. Han, X. Ma, X. J. Wang, et al., “Efficient power division multiplexing in MIMO systems,” IEEE Transactions on Wireless Communications, vol. 21, no. 5, pp. 3438–3451, 2022. doi: 10.1109/TWC.2021.3121793
    [30]
    W. J. Han, X. Ma, D. Tang, et al., “Study of SER and BER in NOMA systems,” IEEE Transactions on Vehicular Technology, vol. 70, no. 4, pp. 3325–3340, 2021. doi: 10.1109/TVT.2021.3062890
    [31]
    X. W. Li, X. S. Gao, Y. T. Liu, et al., “Overlay CR-NOMA assisted intelligent transportation system networks with imperfect SIC and CEEs,” Chinese Journal of Electronics, vol. 32, no. 6, pp. 1258–1270, 2023. doi: 10.23919/cje.2022.00.071
    [32]
    N. I. Miridakis and D. D. Vergados, “A survey on the successive interference cancellation performance for single-antenna and multiple-antenna OFDM systems,” IEEE Communications Surveys & Tutorials, vol. 15, no. 1, pp. 312–335, 2013. doi: 10.1109/SURV.2012.030512.00103
    [33]
    E. Khorov, A. Kureev, and I. Levitsky, “NOMA testbed on Wi-Fi,” in Proceedings of the 2018 IEEE 29th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), Bologna, Italy, pp. 1153–1154, 2018.
    [34]
    K. Amiri, Y. Sun, P. Murphy, et al., “WARP, a unified wireless network testbed for education and research,” in Proceedings of the 2007 IEEE International Conference on Microelectronic Systems Education (MSE'07), San Diego, CA, USA, pp. 53–54, 2007.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(11)  / Tables(3)

    Article Metrics

    Article views (144) PDF downloads(23) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return