Cyclic Prefix (CP) Jamming Against Eavesdropping Relays in OFDM Systems

  title={Cyclic Prefix (CP) Jamming Against Eavesdropping Relays in OFDM Systems},
  author={Muhammad Sohaib J. Solaija and Haji Muhammad Furqan and Zekeriyya Esat Ankaralı and H{\"u}seyin Arslan},
  journal={2022 IEEE Wireless Communications and Networking Conference (WCNC)},
Cooperative communication has been widely used to provide spatial diversity benefits for low-end user equipments, especially in ad hoc and wireless sensor networks. However, the lack of strong authentication mechanisms in these networks leaves them prone to eavesdropping relays. In this paper, we propose a secure orthogonal frequency division multiplexing (OFDM) transmission scheme, where the destination node transmits a jamming signal over the cyclic prefix (CP) duration of the received signal… 

Figures and Tables from this paper


Cooperative Communication in Physical Layer Security: Technologies and Challenges
An overview of cooperative relaying, jamming and hybrid methods used in cooperative communication has been presented and different techniques are categorized based on system model comparison, distinctly elaborating their performance and applications.
A Comprehensive Survey on Cooperative Relaying and Jamming Strategies for Physical Layer Security
A comprehensive survey of the recent works on cooperative relaying and jamming techniques for securing wireless transmissions against eavesdropping nodes, which attempt to intercept the transmissions.
Secrecy Performance of Untrusted Relay Systems With a Full-Duplex Jamming Destination
A novel full-duplex destination jamming scheme with optimal antenna selection (FDJ-OAS) is proposed, and the analysis results indicate that the secrecy diversity order of FDJ- OAS is significantly superior to that of the comparable schemes.
Channel independent physical layer security
The importance of the channel independent PHY security techniques is highlighted, which target to protect the signal itself rather than encrypting the information bits.
Classifications and Applications of Physical Layer Security Techniques for Confidentiality: A Comprehensive Survey
A conceptual, generic, and expandable framework for classifying the existing PLS techniques against wireless passive eavesdropping is proposed, and the security techniques that are reviewed are divided into two primary approaches: signal-to-interference-plus-noise ratio- based approach and complexity-based approach.
Physical Layer Security for Two-Way Untrusted Relaying With Friendly Jammers
A two-way relay system where the two sources can only communicate through an untrusted intermediate relay is considered and a Stackelberg game between the sources and the friendly jammers is formulated as a power control scheme to achieve the optimized secrecy rate of the sources.
Wireless Communication, Sensing, and REM: A Security Perspective
This work analyzes the wireless sensing and radio environment awareness mechanisms, highlighting their vulnerabilities and provides solutions for mitigating them.
Maximum ratio combining for OFDM systems with cochannel interference
  • B. Seo, S. Choi, J. Cha
  • Business
    2006 Digest of Technical Papers International Conference on Consumer Electronics
  • 2006
A receive diversity combining scheme for OFDM wireless LAN systems with cochannel interference utilizes signal to interference plus noise power ratio (SINR) to obtain the weighting factors in maximal ratio combining.
Cooperative communication in wireless networks
An overview of the developments in cooperative communication, a new class of methods called cooperative communication has been proposed that enables single-antenna mobiles in a multi-user environment to share their antennas and generate a virtual multiple-antenn transmitter that allows them to achieve transmit diversity.
Multi-hop mesh cooperative structure based data dissemination for wireless sensor networks
This paper proposes a novel distance-based forwarding node selection scheme that yields smaller end-to-end delays during data disseminations and presents extensive simulation results that verify the effectiveness of the proposed data dissemination scheme.