1- M.Sc. student, Department of Electrical and Computer Engineering, Tarbiat Modares University, Tehran Iran
Abstract: (4439 Views)
In this paper, we study the physical layer security in the presence of an adversary which is able
to switch its mode from jamming mode (when transmits jamming signals) to eavesdropping mode (when adversary eavesdrops legitimate link) and vice versa. To combat with this type of adversary and establish security in this
communication, we propose two approaches: 1) probabilistic approach (PA), 2) worst case approach (WCA).
The system model consists of a source, an adversary and full-duplex destination. A full-duplex destination can
receive the private message and transmit jamming signal to deceive the adversary, simultaneously. The simulation
results show that the average rate PA, is 50% more than the WCA.
Received: 2017/02/5 | Accepted: 2016/06/1 | Published: 2017/08/20