Volume 16, Issue 2 (2016)                   MJEE 2016, 16(2): 32-37 | Back to browse issues page

XML Persian Abstract Print


Download citation:
BibTeX | RIS | EndNote | Medlars | ProCite | Reference Manager | RefWorks
Send citation to:

Foruzesh M, Azmi P. Secure Full Duplex Communications in the Presence of Malicious Adversary. MJEE 2016; 16 (2) :32-37
URL: http://mjee.modares.ac.ir/article-17-11560-en.html
1- M.Sc. student, Department of Electrical and Computer Engineering, Tarbiat Modares University, Tehran Iran
Abstract:   (4439 Views)
In this paper, we study the physical layer security in the presence of an adversary which is able
to switch its mode from jamming mode (when transmits jamming signals) to eavesdropping mode (when adversary eavesdrops legitimate link) and vice versa. To combat with this type of adversary and establish security in this
communication, we propose two approaches: 1) probabilistic approach (PA), 2) worst case approach (WCA).
The system model consists of a source, an adversary and full-duplex destination. A full-duplex destination can
receive the private message and transmit jamming signal to deceive the adversary, simultaneously. The simulation
results show that the average rate PA, is 50% more than the WCA.
Full-Text [PDF 464 kb]   (3811 Downloads)    

Received: 2017/02/5 | Accepted: 2016/06/1 | Published: 2017/08/20

Add your comments about this article : Your username or Email:
CAPTCHA

Rights and permissions
Creative Commons License This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.