Analysis and Design of Secure Wireless Networks in the Presence of Users with Different Security needs based on Covert Communication and Secure Transmission of Information Theory in presence of Friendly Jammer
In this paper, we investigate joint information theoretic security and covert communication on a network in the presence of a single transmitter (Alice), a friendly jammer, a single untrusted user, two legitimate users, and a single warden of channel (Willie). In the considered network, one of the authorized users, Bob, needs a secure and covert communication, and therefore his message must be sent securely, and at the same time, the existence of his communication with the transmitter should not be detected by channel’s warden, Willie, Meanwhile, another authorized user, Carol, needs covert communication. The purpose of secure communication is to prevent the message being decoded by the untrusted user who is present on the network, which leads us to use one of the physical layer security methods, named the secure transmission of information theory. In some cases, in addition to protecting the content of the message, it is important for the user that, the existence of the transmission not being detected by an adversary, which leads us to covert communication. But as we know, the main problem in covert communication is the low transmission rate, because we have to reduce the transmission power so that the main message get hide in background noise. In this study, in addition to using joint security of information theory and covert communication, we want to examine the average transmission rate according to the limitations and requirements of covert communication and quality of service requested by users by using the one of power methods, i.e. creating artificial noise in the network by a friendly jammer.
- حق عضویت دریافتی صرف حمایت از نشریات عضو و نگهداری، تکمیل و توسعه مگیران میشود.
- پرداخت حق اشتراک و دانلود مقالات اجازه بازنشر آن در سایر رسانههای چاپی و دیجیتال را به کاربر نمیدهد.