Projects per year
Abstract
Due to the broadcast nature of wireless communications, users’ data transmitted wirelessly is susceptible to security/privacy threats. Meanwhile, as a result of the limitation of spectrum resources, massive wireless connections will incur serious interference, which may damage the efficiency of data transmission. Therefore, improving both efficiency and secrecy of data transmission is of research significance. In this paper, we propose a wireless transmission scheme by taking both Secure Communication (SC) and Interference Management (IM) into account, namely SCIM. With this scheme, an SCIM signal is generated by the legitimate transmitter (Tx) and sent along with the desired signal, so that the SCIM signal can interact with and suppress the environmental interference at the legitimate receiver (Rx). Meanwhile, the SCIM signal may interfere with the eavesdropper in the coverage of legitimate transmission so as to deteriorate the eavesdropping performance. Therefore, the secrecy of desired transmission is improved. In this way, both the transmission efficiency and privacy are enhanced. Then, by taking various transmission preferences into account, we develop different implementations of SCIM, including Interference Suppression First SCIM (ISF-SCIM), Data Transmission First SCIM (DTF-SCIM), Anti-Eavesdropping First SCIM (AEF-SCIM), and Secrecy Rate Maximization SCIM (SRM-SCIM). Our in-depth simulation results have shown the proposed methods to effectively improve the efficiency and secrecy of the legitimate transmission.
Original language | English |
---|---|
Pages (from-to) | 512-522 |
Number of pages | 11 |
Journal | Digital Communications and Networks |
Volume | 9 |
Issue number | 2 |
DOIs | |
Publication status | Published - Apr 2023 |
MoE publication type | A1 Journal article-refereed |
Keywords
- Anti-eavesdropping
- Interference management
- Physical-layer security
- Secrecy rate
- Secure communication
Fingerprint
Dive into the research topics of 'SCIM: Incorporating secure communication and interference management in one operation'. Together they form a unique fingerprint.Projects
- 1 Finished
-
TruSoNet2: TruSoNet: Digitalizing Trust for Securing Pervasive Social Networking
Yan, Z. (Principal investigator), Kaveh, M. (Project Member) & Liu, S. (Project Member)
01/09/2020 → 31/08/2022
Project: Academy of Finland: Other research funding