Belmega, E Veronica and Chorti, Arsenia (2017) Protecting Secret Key Generation Systems Against Jamming: Energy Harvesting and Channel Hopping Approaches. IEEE Transactions on Information Forensics and Security, 12 (11). pp. 2611-2626. DOI https://doi.org/10.1109/TIFS.2017.2713342
Belmega, E Veronica and Chorti, Arsenia (2017) Protecting Secret Key Generation Systems Against Jamming: Energy Harvesting and Channel Hopping Approaches. IEEE Transactions on Information Forensics and Security, 12 (11). pp. 2611-2626. DOI https://doi.org/10.1109/TIFS.2017.2713342
Belmega, E Veronica and Chorti, Arsenia (2017) Protecting Secret Key Generation Systems Against Jamming: Energy Harvesting and Channel Hopping Approaches. IEEE Transactions on Information Forensics and Security, 12 (11). pp. 2611-2626. DOI https://doi.org/10.1109/TIFS.2017.2713342
Abstract
Jamming attacks represent a critical vulnerability for wireless secret key generation (SKG) systems. In this paper, two counter-jamming approaches are investigated for SKG systems: first, the employment of energy harvesting (EH) at the legitimate nodes to turn part of the jamming power into useful communication power, and, second, the use of channel hopping or power spreading in block fading channels to reduce the impact of jamming. In both cases, the adversarial interaction between the pair of legitimate nodes and the jammer is formulated as a two-player zero-sum game and the Nash and Stackelberg equilibria are characterized analytically and in closed form. In particular, in the case of EH receivers, the existence of a critical transmission power for the legitimate nodes allows the full characterization of the game's equilibria and also enables the complete neutralization of the jammer. In the case of channel hopping versus power spreading techniques, it is shown that the jammer's optimal strategy is always power spreading while the legitimate nodes should only use power spreading in the high signal-to-interference ratio (SIR) regime. In the low SIR regime, when avoiding the jammer's interference becomes critical, channel hopping is optimal for the legitimate nodes. Numerical results demonstrate the efficiency of both counter-jamming measures.
Item Type: | Article |
---|---|
Uncontrolled Keywords: | Secret key generation; jamming; energy harvesting; channel hopping; zero-sum game |
Subjects: | T Technology > TK Electrical engineering. Electronics Nuclear engineering |
Divisions: | Faculty of Science and Health Faculty of Science and Health > Computer Science and Electronic Engineering, School of |
SWORD Depositor: | Unnamed user with email elements@essex.ac.uk |
Depositing User: | Unnamed user with email elements@essex.ac.uk |
Date Deposited: | 04 May 2017 13:49 |
Last Modified: | 30 Oct 2024 16:43 |
URI: | http://repository.essex.ac.uk/id/eprint/19555 |
Available files
Filename: TIFS17.pdf