{"title":"Secure air-to-ground transmission with jamming links blocked by the eavesdropper","authors":"Jiawei Zhao, Mengwen Shi, Hongliang He","doi":"10.1016/j.phycom.2025.102618","DOIUrl":null,"url":null,"abstract":"<div><div>Secure air-to-ground communication when an eavesdropper is able to block the jamming link from a jammer is considered in this paper. A feedback-aided cooperative jamming scheme is proposed, where the transmitter, the destination, and the jammer alternately design and send artificial noise to protect the private information in three stages. It shows that even if the jamming links are blocked, the eavesdropper will inevitably be impacted by artificial noise. We limit the eavesdropping rate to a constant, and guarantee the minimum secrecy rate scales with the transmit power. We allocate power between the artificial noise and the private information, and obtain the optimal ratio to maximize the minimum secrecy rate. We analyze the symbol error probability of the destination and the eavesdropper when the transmitter exploits M-ary constellation modulation. It shows that a high symbol error floor is created at the eavesdropper but the symbol error probability at the legitimate destination decreases with the transmit power.</div></div>","PeriodicalId":48707,"journal":{"name":"Physical Communication","volume":"69 ","pages":"Article 102618"},"PeriodicalIF":2.0000,"publicationDate":"2025-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Physical Communication","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1874490725000217","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 0
Abstract
Secure air-to-ground communication when an eavesdropper is able to block the jamming link from a jammer is considered in this paper. A feedback-aided cooperative jamming scheme is proposed, where the transmitter, the destination, and the jammer alternately design and send artificial noise to protect the private information in three stages. It shows that even if the jamming links are blocked, the eavesdropper will inevitably be impacted by artificial noise. We limit the eavesdropping rate to a constant, and guarantee the minimum secrecy rate scales with the transmit power. We allocate power between the artificial noise and the private information, and obtain the optimal ratio to maximize the minimum secrecy rate. We analyze the symbol error probability of the destination and the eavesdropper when the transmitter exploits M-ary constellation modulation. It shows that a high symbol error floor is created at the eavesdropper but the symbol error probability at the legitimate destination decreases with the transmit power.
期刊介绍:
PHYCOM: Physical Communication is an international and archival journal providing complete coverage of all topics of interest to those involved in all aspects of physical layer communications. Theoretical research contributions presenting new techniques, concepts or analyses, applied contributions reporting on experiences and experiments, and tutorials are published.
Topics of interest include but are not limited to:
Physical layer issues of Wireless Local Area Networks, WiMAX, Wireless Mesh Networks, Sensor and Ad Hoc Networks, PCS Systems; Radio access protocols and algorithms for the physical layer; Spread Spectrum Communications; Channel Modeling; Detection and Estimation; Modulation and Coding; Multiplexing and Carrier Techniques; Broadband Wireless Communications; Wireless Personal Communications; Multi-user Detection; Signal Separation and Interference rejection: Multimedia Communications over Wireless; DSP Applications to Wireless Systems; Experimental and Prototype Results; Multiple Access Techniques; Space-time Processing; Synchronization Techniques; Error Control Techniques; Cryptography; Software Radios; Tracking; Resource Allocation and Inference Management; Multi-rate and Multi-carrier Communications; Cross layer Design and Optimization; Propagation and Channel Characterization; OFDM Systems; MIMO Systems; Ultra-Wideband Communications; Cognitive Radio System Architectures; Platforms and Hardware Implementations for the Support of Cognitive, Radio Systems; Cognitive Radio Resource Management and Dynamic Spectrum Sharing.