M.Sc. student, Department of Electrical and Computer Engineering, Tarbiat Modares University, Tehran Iran
Abstract
In this paper, we study the physical layer security in the presence of an adversary which is able to switch its mode from jamming mode (when transmits jamming signals) to eavesdropping mode (when adversary eavesdrops legitimate link) and vice versa. To combat with this type of adversary and establish security in this communication, we propose two approaches: 1) probabilistic approach (PA), 2) worst case approach (WCA). The system model consists of a source, an adversary and full-duplex destination. A full-duplex destination can receive the private message and transmit jamming signal to deceive the adversary, simultaneously. The simulation results show that the average rate PA, is 50% more than the WCA.
Foruzesh,M. and Azmi,P. (2016). Secure Full Duplex Communications in the Presence of Malicious Adversary. The Modares Journal of Electrical Engineering, 16(2), 32-37.
MLA
Foruzesh,M. , and Azmi,P. . "Secure Full Duplex Communications in the Presence of Malicious Adversary", The Modares Journal of Electrical Engineering, 16, 2, 2016, 32-37.
HARVARD
Foruzesh,M.,Azmi,P. (2016). 'Secure Full Duplex Communications in the Presence of Malicious Adversary', The Modares Journal of Electrical Engineering, 16(2), pp. 32-37.
CHICAGO
M. Foruzesh and P. Azmi, "Secure Full Duplex Communications in the Presence of Malicious Adversary," The Modares Journal of Electrical Engineering, 16 2 (2016): 32-37,
VANCOUVER
Foruzesh,M.,Azmi,P. Secure Full Duplex Communications in the Presence of Malicious Adversary. The Modares Journal of Electrical Engineering, 2016; 16(2): 32-37.