SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
Abstract— this paper, a novel transmission scheme is proposed
to improve the security of downlink cellular network.
The confidential message intended to one of K mobile users
(MUs) should be securely kept from the undesired recipients.
In this work, the K − 1 remaining users are regarded as
potential eavesdroppers and called as internal eavesdroppers.
For the security enhancement, we propose an adaptation of a
single cooperative jammer (CJ) to increase the ambiguity at all
malicious users by distracting them with artificial interference.
With the help of CJ, we derive the optimal joint transmission
scheme by beamforming solution to maximize the secrecy rate
of the intended user. Numerical results show the performance
improvement of the proposed scheme.
Index Terms— Physical layer security, downlink cellular
network,cooperative jammer, beamforming.
1. INTRODUCTION
Wireless communication is vulnerable to
eavesdropping due to the broadcast nature of wireless
medium. In broadcast channel where one transmitter
disperses the information to the multiple users, the
importance of security becomes more emphasized.
Wyner introduced the information theoretic view of the
physical-layer security in [1]. From this perspective, the
effective transmission with the multiple antennas and
the cooperative jammer (CJ) to improve the security
were studied in [2]–[5].
Recently, with the ever-increasing demand of
broadcast services (e.g. downlink communication in
cellular networks and wireless local networks
(WLAN)), the concern on broadcast channel with the
confidential messages has been growing. Specially in
multiuser system, since all users within the
communication range can overhear the wireless signal,
there occurs a possibility that the licensed users might
be the maliciouseavesdroppers1.Thus, we should
counteract two sorts of eavesdroppers such as internal
and external. If they are from
legitimate user set of the transmitter, we call them
internal eavesdroppers and otherwise external
eavesdroppers. Authors of [6] and [7] investigated the
secure transmission against a single external
eavesdropper. For coping with the internal
eavesdroppers, [8] proposed the transmission technique
for the base station (BS) via semi definite programming
(SDP).
In this paper2, we aim at designing the optimal
transmission
in downlink cellular network against the multiple internal
eavesdroppers. In our scenario, BS desires to send the private
message to one of K mobile users (MUs) while keeping the
privacy from the K-1 remaining MUs, i.e. internal
eavesdroppers. For the secrecy enhancement of the intended
user, we design a novel secure transmission which jointly
optimizes both BS and CJ for the multiple-antenna link. This
joint cooperation has the robustness for the case where BSs
are in the severe fading conditions or where the eavesdropper
is close to BSs or MUs. Additionally, the employment of CJ
can lessen the complexity burden compared to the beam
forming solution solely at BS with no help of CJ such as
[8]3.Unlike the studies enlisting the aid of optimization
software tools for the transmission design in multiuser setting
[8], [10]–[12], our strategy is also grounded on an explicit
parametrization for an arbitrary number of users and antennas
with the constructed programming problem.
2. SYSTEM MODEL
The system model under consideration is illustrated in Fig.1.
The cellular network consists of a base station (BS), K mobile
users (MUs) and a single cooperative jammer (CJ).
All users can have two types of data traffic such as private
and open, but in this paper we suppose that each user has only
Fig.1 System Model
private message transmitted from the BS. The BS wants to
securely transmit the private message to each user over the
same spectral band simultaneously. However, such public
dispersion unavoidably brings the information leakage to the
unintended users over the associated cross-channels. We
assume that the remaining users except the desired recipient
are considered the potential eavesdroppers and we refer to
them as the as internal eavesdroppers. In this work, a CJ
creating the artificial noise toward the multiple
eavesdroppers is applied to improve the secrecy of a desired
point-to-point link. In doing so, we can obtain the strength on
security level in the channel condition vulnerable to
Security And Privacy Enhancement Using Jammer In
Downlink Cellular Networks
S.Shafil Mohammad1
,T.Prasad2
1
P.G Student in VLSI, Department of E.C.E, SIETK, Tirupati.
2
Assistant Professor, Department of E.C.E, SIETK, Tirupati.
E-Mail to:shafil.mohammad71@gmail.com,prasadgmt@gmail.com
INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ENGINEERING RESEARCH, ICDER - 2014
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in
58
eavesdropping comparing to the system only controlling the
signal direction by beam forming at BS. Also,with the help of
CJ, BS can lighten the complexity cost for the secrecy
enhancement. To accomplish this mission, we propose the
joint transmission technique for both BS and CJ under
transmit power constraint. We assume that BS and CJ possess
Nb and Nc transmit antennas, respectively, while all MUs are
single-antenna nodes. The transmission is composed of scalar
coding followed by beam forming and all propagation
channels are supposed to be frequency-flat.
With these assumptions, the received signal at MUk can be
modeled as
the symbols transmitted by BS and CJ, hk and gk are the
(complex-valued) Nb×1 channel-vector between BS and
MUk and Nc × 1 channel-vector between CJ and MUk, and
wb and wc are the transmit beam forming vectors used by BS
and CJ, respectively. The variable nk models the complex
Gaussian noise with zero mean and variance σ2 k. We assume
that BS and CJ have full channel state information (CSI). The
objective of the transmit beamformers wb and wc is to convey
the symbol sb in a secure way.
3.MODELING ASSUMPTIONS:
3.1 Sensor Network Model
We consider a wireless sensor network deployed over a
large area and operating under a single-carrier slotted Aloha
type random access protocol. We assume symmetric
trans-mission and reception in the sense that a node i can
receive a signal from node j if and only if node j can receive a
signal from. Time is divided into time slots and the slot size is
equal to the size of a packet. All nodes are assumed to be
synchronized when transmitting with respect to time slot
boundaries. Each node transmits at a fixed power level P with
an omni directional antenna and its transmission range R and
sensing range Rs are circular with sharp boundary.
Transmission and sensing ranges are defined by two
thresh- olds of received signal strength. A node within
transmission range of node i can correctly decode transmitted
messages from i, while a node within sensing range can just
sense activity due to higher signal strength than noise, but
cannot decode the transmitted message. Typically, Rs is a
small multiple of R, ranging from 2 to 3.
Anode within distance R of anode i(excluding node i
itself)is called a neighbor of i. The neighborhood of i, N i is
the set of all neighbors of i with ni ¼ j Nij being the size of i’s
neighborhood. Transmissions from node i are received by all
its neighbors. The sensor network is represented by an
undirected graph. where S is the set of sensor nodes and E is
the set of edges where edge denotes that sensor i and j are
within transmission range of each other. Sensor nodes are
uniformly distributed in an area,with spatial density nodes
per unit area and the topology is static, i.e., we assume no
mobility. Each node has an initial amount of energy E. We do
not consider the energy consumed in reception. Each node is
equipped with a single transceiver, so that it cannot transmit
and receive simultaneously. All nodes are assumed to be
continuously backlogged, so that there are always packets in
each node’s buffer in each slot. Packets can be generated by
higher layers of a node, or they may come from other nodes
and need to be forwarded or they may be previously sent and
collided packets to be retransmitted.
A transmission on edge is successful if and only if no node
in N j [f] jgnf ig transmits during that transmission. In this
work, we consider the class of slotted Aloha type random
access protocols that are characterized by a common channel
access probability for all network nodes in each slot. This
provides us with a straightforward means to quantify the
network effort to withstand and confront the attack by
regulating the amount of transmitted traffic and essentially
exposing the attacker to the detection system, as will become
clear in the sequel.
Provided that it remains silent in a slot, a receiver node j
experiences collision if at least two nodes in its neighborhood
transmit simultaneously, regardless of whether the
transmitted packets are destined for node j or for other nodes.
Thus, the probability of collision at node j in a slot is:
If node j attempts to transmit at a slot while it
receives a message, a collision occurs as well. In that
case, the receiver is not in position to tell whether the
collision is due to its own transmission or whether it
would occur anyway. In the sequel, we will term
collision an event addressing the case of multiple
simultaneous transmissions received by (not necessarily
intended to) a node and no transmission attempt by that
node. Note that, if we include the possibility that the
receiver also attempts to access the channel, the
probability of collision is the same as the one above with
nj substituted by nj þ 1. Whenever a collision occurs at a
receiver, the packet is retransmitted in the next slot if the
transmitter accesses the channel again. If a node does not
have any neighbors (i.e., it is nj ¼ 0), then this node does
not receive any packets and does not experience
collisions.
3.2Attacker Model:
We consider one attacker, the jammer, in the sensor
network area. The jammer is neither authenticated nor
associated with the network. The objective of the
jammer is to corrupt legitimate transmissions of sensor
nodes by causing intentional packet collisions at
receivers. Intentional collision leads to retransmission,
which is translated into additional energy consumption
for a certain amount of attainable throughput or
equivalently reduced throughput for a given amount of
consumed energy. In this paper, we do not consider the
attacker that is capable of node capture.
The jammer may use its sensing ability in order to
sense ongoing activity in the network. Clearly, sensing
ongoing network activity prior to jamming is beneficial
for the attacker in the sense that its energy resources are
not aimlessly consumed and the jammer is not needlessly
exposed to the network. The jammer transmits a small
packet which collides with legitimate transmitted
packets at their intended receivers.
INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ENGINEERING RESEARCH, ICDER - 2014
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in
59
Fig .2.Illustration of Jamming attack
As argued in, a beacon packet of a few bits suffices to disrupt
a transmitted packet in the network. The jammer is assumed
to have energy resources denoted by Em, yet the
corresponding energy constraint in the optimization problems
of the next section may be redundant if the jammer adheres to
the policy above.
The jammer uses an omni directional antenna with
circular sensing range Rms and adaptable transmission range
Rm that is realized by controlling transmission power Pm as
illustrated inFig.1.Thejammeralsocontrolstheprobabilityq of
jamming the area within its transmission range in a slot, thus,
controlling the aggressiveness of the attack.
The attack space is, therefore, specified by set P-ð 0;1Þ,
where P is the discrete set of employed power levels. The
attacker attempts to strike a balance between short-and
long-term benefits, as a more aggressive attack increases
instantaneous benefit but exposes the attacker to the detection
system, while a milder attack may prolong detection time.
If the jammer senses the channel prior to deciding
whether to jam or not, collision occurs at node j if the jammer
jams and at least one neighbor transmits. Thus, conditioned
on existence of a jammer, the probability of collision at node j
is
On the other hand, if jamming occurs without prior channel
sensing, the probability of collision is
Thus, the probability of collision is the same regardless of
channel sensing prior to jamming. This implies that jamming
can be viewed as a multiple access situation between a
network of legitimate nodes, each with access probability and
the jammer with access probability q. Nevertheless, by using
sensing, the adversary does not was energy on empty slots
and conserves energy by a factor of 1where denotes the
number of legitimate nodes in the jammer’s sensing range.
For large 1.
Namely, for a den sensor network, It is very likely that
some transmission will always occur in the network and,
therefore, it does not really make a difference whether the
attacker will sense the channel or not. In the sequel, we will
not consider the energy saving facto We will subsequently
assume that the adversary pos- sesses different amounts of
knowledge about the network, ranging from full knowledge
about network parameters such as access probability and the
neighborhood of a monitor node to no knowledge at all.
Network’s differing levels of knowledge about an attacker
will be considered as well.
3.3 Attack Detection Model:
The network employs a mechanism for monitoring network
status and detecting potential malicious activity.
The monitoring mechanism consists of:
1)Determination of a subset of nodes M that act as monitors.
2) Employment of a detection algorithm at each monitor
node.
The assignment of the role of monitor to anode is affected by
potential existing energy consumption and node
computational complexity limitations, and by detection
performance specifications. In this work, we consider a fixed
set M, and formulate optimization problems for one or
several monitor nodes. We fix attention to a specific monitor
node and the detection scheme that it employs.
First, we need to define the quantity to be observed at each
monitor. In our case, the readily available metric is the
probability of collision that a monitor node experiences,
namely the percentage of packets that are erroneously
received.
During normal network operation and in the absence of a
jammer, we consider a large enough training period in which
the monitor node learns the percentage of collisions it
experiences as the long-term limit of the ratio of number of
slots where there was collision over total number of slots of
the training period. Now let the network operate in the open
after the training period has elapsed and fix attention to a time
window much smaller than the training period.
An increased percentage of collisions in the time window
compared to the learned long-term ratio may be an indication
of an ongoing jamming attack that causes additional
collisions. However, it may happen as well that the network
operates normally and there is just a temporary irregular
increase in the percentage of collisions compared to the
learned ratio for that specific interval.
A detection algorithm is part of the detection module at a
monitor node; it takes as input observation samples obtained
by the monitor node (i.e., collision/not collision) and decides
whether there is an attack or not.
On one hand, the observation window should be small
enough, such that the attack is detected in a timely manner
and appropriate countermeasures are initiated.
On the other hand, this window should be sufficiently
large, such that the chance of a false alarm notification is
reduced.
The sequential nature of observations at consecutive time
slots motivates the use of sequential detection techniques.
A sequential decision rule consists of:
1) A stopping time, indicating when to stop taking
observations.
2) Afinal decision rule that decides between the two
hypotheses.
A sequential decision rule is efficient if it can provide
reliable decision as fast as possible. The probability of false
alarm PFA and probability of missed detection PM constitute
inherent trade-offs in a detection scheme in the sense that a
faster decision unavoidably leads to higher values of these
INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ENGINEERING RESEARCH, ICDER - 2014
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in
60
probabilities while lower values are attained at the expense of
detection delay.Forgiven values of PFA and PM, the
detection test that minimizes the average number of required
observations (and thus average delay) to reach a decision
among all sequential and non sequential tests for which PFA
and PM do not exceed the predefined values above is Wald’s
Sequential Probability Ratio Test (SPRT).
When SPRT is used for sequential testing between two
hypotheses concerning two probability distributions, SPRT is
optimal in that sense as well.
3.4 Notification Delay
Following detection of an attack, the network needs to be
notified in order to launch appropriate counter measures. The
transfer of the notification message out of the jammed area is
performed with multiple routing from the monitor node to a
node out of the jammed region.
The same random access protocol with channel access
probability is employed by a node to forward the message to
the next node. Having assumed a single-channel sensor
network, we implicitly exclude the existence of a control
channel that is used for signaling attack notification
messages.
Hence, the transfer of the notification message out of the
jammed will take place in the same channel and will still
under go jamming. Clearly, the time that is needed for the
notification message to be passed out of the jammed area
depends on the jamming strategy as well as the network
channel access probability. For that reason, we use the sum of
detection and notification delay as a metric that captures the
objective of the attacker and the network. It is understood that
if there exists a control channel for signaling notification
messages that is not jammed, then only the detection delay is
needed as a performance objective. If this control channel is
jammed, then one needs to consider the notification time but
also assess the cost incurred by jamming an additional
channel. We discuss briefly this issue in the last section as
part of future work.
We now compute the average time needed for the
notification message to be carried out of the jammed area.
The probability of successful channel access for a node i
along the route of the notification message in the presence of
jamming is
.
Hence, the ex-pected number of transmission attempts
before successful transmission, which also denotes expected
delay for node i before successful transmission is slots. In a
single-channel network, the adversary can cause additional
disruption to the network by jamming the alert message even
after being detected. In order to find the average delay for
transmitting an alert out of the jammed region, let us first
denote the average number of hops to deliver the alarm out of
jammed area Am by H.
Clearly, the expected notification delay depends on the
expected number of hops it takes for the notification message
to leave the jammed area which in turn depends on the
position of the monitor node. We assume dense sensor
deployment and, thus, roughly approximate the route
followed by the notification message with an almost straight
line. This means that H Rm=2p, namely, H is equal to the
average distance of a monitor from the boundary of the
jammed area (Rm=2) divided by the node transmission range
R.
We adhere to this approximation since the exact
expression for the distribution of H depends on knowledge
about the network topology and the location of the monitor.
Such knowledge is rather unrealistic to assume for the
attacker and even for the network itself.
The average time needed for the alarm to propagate out of
the jamming area, also referred to as notification delay, is
4.BLOCK DIAGRAM:
Fig.3.Block diagram of Mobile jamming circuit.
with the help of this Speaker,Keypad and Mick are
blocked.
5. RANDOM MODEL WITH ONE TRANSMITTER
AND ONE JAMMER:
We first consider one transmitter node (node 1) and one
jammer node (node 2) at a single channel access point as
shown in Figure 2. Packets arrive randomly at node 1’s queue
with rate λ (packets per time slot) and they are transmitted
over a single channel. Node 2 does not have its own traffic
and jams node 1’s transmissions. We assume that each
(packet or jamming signal) transmission consumes one unit
of energy. We consider a synchronous slotted system, in
which each packet transmission (or jamming attempt) takes
one time slot. Hence, the jammer cannot wait to detect the
start of a transmission before jamming. Later in Section VI,
we will consider the effects of channel sensing and allow the
jammer to detect any transmission before starting a denial of
service attack.
Fig.4.Single Channel Access point With one Transmitter
and one Jammer
INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ENGINEERING RESEARCH, ICDER - 2014
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in
61
From the above Fig4.Single channel Access point with one
transmitter and one jammer is used for the prototype model.
6.CONCLUSIONS
We have considered the secure communication in the K
user downlink cellular system. For the secrecy improvement
of the intended user, we develop the joint transmission
strategy with the assistance of CJ based on the framework of
power gain region. The numerical results verify the
performance improvement of the proposed scheme.
REFERENCES
[1] A. D. Wyner, “The wire-tap channel,” The Bell Sys. Tech.
J., vol. 54,no. 8, pp. 1355–1387, Oct. 1975.
[2] X. Tang, R. Liu, P. Spasojevic, and H. V. Poor,
“Interference assisted secret communication,” to appear in
IEEE Trans. Inf. Theory. Preprint available on
arXiv:0908.2397, Aug. 2009.
[3] S. Goel and R. Negi, “Guaranteeing secrecy using
artificial noise,” IEEE
Trans. Wireless Commun., vol. 7, no. 6, pp. 2180–2189, June
2008.
[4] A. Khisti and G. Wornell, “Secure transmission with
multiple antennas—I: the MISOME wiretap channel,” IEEE
Trans. Inf. Theory,
vol. 56, no. 7, pp. 3088–3104, Jul. 2010.
[5] E. A. Jorswieck, “Secrecy capacity of single- and
multi-antenna channels
with simple helpers,” in Proc. 2010 Int. ITG Conf. on Source
and Channel Coding, pp. 1–6.
[6] A. Khisti, A. Tchamkerten, and G. Wornell, “Secure
broadcasting over fading channels,” IEEE Trans. Inf. Theory,
vol. 54, no. 6, pp. 1–7, Jun.
2008.
[7] A. Mukherjee and A. L. Swindlehurst, “Utility of
beamforming strategies for secrecy in multiuser MIMO
wiretap channels,” in Proc. 2009 Allerton Conf. on Comm.
Control and Comp., pp. 1134–1141.
[8] M. Vzquez, A. Prez-Neira, and M. Lagunas,
“Confidential communication
in downlink beamforming,” in Proc. 2012 IEEE Workshop
on Sign.
Proc. Adv. in Wireless Comm., pp. 349–353.
[9] S. Jeong, K. Lee, J. Kang, Y. Baek, and B. Koo,
“Cooperative jammer design in cellular network with internal
eavesdroppers,” in Proc. 2012
IEEE Mil. Comm. Conf., pp. 1–5.
[10] H. D. Ly, T. Liu, and Y. Liang, “Multiple-input
multiple-output Gaussian broadcast channels with common
and confidential messages,” IEEE
Trans. Inf. Theory, vol. 56, no. 11, pp. 5477–5487, Nov.
2010.
[11] Q. Li and W. K. Ma, “Optimal and robust transmit
designs for MISO
channel secrecy by semi definite programming,” IEEE Trans.
Signal Process., vol. 59, no. 8, pp. 3799–3812, Aug. 2011.
[12] Y. Yang, W.-K. Ma, J. Ge, and P. C. Ching,
“Cooperative secure
beamforming for AF relay networks with multiple
eavesdroppers,” IEEE
Signal Process. Lett., vol. 20, no. 1, pp. 35–38, Jan. 2013.
[13] E. G. Larsson and E. A. Jorswieck, “Competition versus
cooperation on the MISO interference channel,” IEEE J. Sel.
Areas Commun., vol. 26,
no. 7, pp. 1059–1069, Sept. 2008.
[14] Y. Liang, G. Kramer, H. V. Poor, and S. Shamai,
“Compound wire-tap channels,” in Eurasip J. Wireless
Commun. and Networking, vol. 2009,
no. 5, Mar. 2009.
[15] R. Mochaourab and E. A. Jorswieck, “Optimal
beamforming in interference
networks with perfect local channel information,” submitted
to IEEE Trans. Signal Process. Preprint available on
arXiv:1004.4492, Oct.
INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ENGINEERING RESEARCH, ICDER - 2014
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in
62

Weitere ähnliche Inhalte

Was ist angesagt?

Multihop Routing In Camera Sensor Networks
Multihop Routing In Camera Sensor NetworksMultihop Routing In Camera Sensor Networks
Multihop Routing In Camera Sensor NetworksChuka Okoye
 
Optimal Transmit Power and Packet Size in Wireless Sensor Networks in Shadowe...
Optimal Transmit Power and Packet Size in Wireless Sensor Networks in Shadowe...Optimal Transmit Power and Packet Size in Wireless Sensor Networks in Shadowe...
Optimal Transmit Power and Packet Size in Wireless Sensor Networks in Shadowe...IDES Editor
 
Wormhole globecom
Wormhole globecomWormhole globecom
Wormhole globecomZep Lao
 
Fault tolerant routing scheme based on
Fault tolerant routing scheme based onFault tolerant routing scheme based on
Fault tolerant routing scheme based onIJCNCJournal
 
Iaetsd game theory and auctions for cooperation in
Iaetsd game theory and auctions for cooperation inIaetsd game theory and auctions for cooperation in
Iaetsd game theory and auctions for cooperation inIaetsd Iaetsd
 
Z02417321735
Z02417321735Z02417321735
Z02417321735IJMER
 
Hexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc Networks
Hexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc NetworksHexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc Networks
Hexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc NetworksIJTET Journal
 
Analysis of GPSR and its Relevant Attacks in Wireless Sensor Networks
Analysis of GPSR and its Relevant Attacks in Wireless Sensor NetworksAnalysis of GPSR and its Relevant Attacks in Wireless Sensor Networks
Analysis of GPSR and its Relevant Attacks in Wireless Sensor NetworksIDES Editor
 
PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...
PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...
PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...ijasuc
 
Adaptive opportunistic routing for wireless ad hoc networks
Adaptive opportunistic routing for wireless ad hoc networksAdaptive opportunistic routing for wireless ad hoc networks
Adaptive opportunistic routing for wireless ad hoc networksJPINFOTECH JAYAPRAKASH
 
Wireless sensor network lifetime constraints
Wireless sensor network lifetime constraintsWireless sensor network lifetime constraints
Wireless sensor network lifetime constraintsmmjalbiaty
 
Routing in Opportunistic Networks
Routing in Opportunistic NetworksRouting in Opportunistic Networks
Routing in Opportunistic NetworksAuwal Amshi
 
Communication by Whispers Paradigm for Short Range Communication in Cognitive...
Communication by Whispers Paradigm for Short Range Communication in Cognitive...Communication by Whispers Paradigm for Short Range Communication in Cognitive...
Communication by Whispers Paradigm for Short Range Communication in Cognitive...IDES Editor
 
A NEW KEY ESTABLISHMENT SCHEME FOR WIRELESS SENSOR NETWORKS
A NEW KEY ESTABLISHMENT SCHEME FOR WIRELESS SENSOR NETWORKSA NEW KEY ESTABLISHMENT SCHEME FOR WIRELESS SENSOR NETWORKS
A NEW KEY ESTABLISHMENT SCHEME FOR WIRELESS SENSOR NETWORKSIJNSA Journal
 

Was ist angesagt? (19)

1004.0152v1
1004.0152v11004.0152v1
1004.0152v1
 
Multihop Routing In Camera Sensor Networks
Multihop Routing In Camera Sensor NetworksMultihop Routing In Camera Sensor Networks
Multihop Routing In Camera Sensor Networks
 
Optimal Transmit Power and Packet Size in Wireless Sensor Networks in Shadowe...
Optimal Transmit Power and Packet Size in Wireless Sensor Networks in Shadowe...Optimal Transmit Power and Packet Size in Wireless Sensor Networks in Shadowe...
Optimal Transmit Power and Packet Size in Wireless Sensor Networks in Shadowe...
 
Wormhole globecom
Wormhole globecomWormhole globecom
Wormhole globecom
 
Bn25384390
Bn25384390Bn25384390
Bn25384390
 
Fault tolerant routing scheme based on
Fault tolerant routing scheme based onFault tolerant routing scheme based on
Fault tolerant routing scheme based on
 
Iaetsd game theory and auctions for cooperation in
Iaetsd game theory and auctions for cooperation inIaetsd game theory and auctions for cooperation in
Iaetsd game theory and auctions for cooperation in
 
Jammers in wsn
Jammers in wsnJammers in wsn
Jammers in wsn
 
B43040610
B43040610B43040610
B43040610
 
Z02417321735
Z02417321735Z02417321735
Z02417321735
 
Hexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc Networks
Hexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc NetworksHexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc Networks
Hexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc Networks
 
Analysis of GPSR and its Relevant Attacks in Wireless Sensor Networks
Analysis of GPSR and its Relevant Attacks in Wireless Sensor NetworksAnalysis of GPSR and its Relevant Attacks in Wireless Sensor Networks
Analysis of GPSR and its Relevant Attacks in Wireless Sensor Networks
 
PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...
PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...
PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...
 
Important question bank
Important question bankImportant question bank
Important question bank
 
Adaptive opportunistic routing for wireless ad hoc networks
Adaptive opportunistic routing for wireless ad hoc networksAdaptive opportunistic routing for wireless ad hoc networks
Adaptive opportunistic routing for wireless ad hoc networks
 
Wireless sensor network lifetime constraints
Wireless sensor network lifetime constraintsWireless sensor network lifetime constraints
Wireless sensor network lifetime constraints
 
Routing in Opportunistic Networks
Routing in Opportunistic NetworksRouting in Opportunistic Networks
Routing in Opportunistic Networks
 
Communication by Whispers Paradigm for Short Range Communication in Cognitive...
Communication by Whispers Paradigm for Short Range Communication in Cognitive...Communication by Whispers Paradigm for Short Range Communication in Cognitive...
Communication by Whispers Paradigm for Short Range Communication in Cognitive...
 
A NEW KEY ESTABLISHMENT SCHEME FOR WIRELESS SENSOR NETWORKS
A NEW KEY ESTABLISHMENT SCHEME FOR WIRELESS SENSOR NETWORKSA NEW KEY ESTABLISHMENT SCHEME FOR WIRELESS SENSOR NETWORKS
A NEW KEY ESTABLISHMENT SCHEME FOR WIRELESS SENSOR NETWORKS
 

Andere mochten auch

Os blogues na educação
Os blogues na educaçãoOs blogues na educação
Os blogues na educaçãotiagosilva
 
The determinants of financial inclusion in western africa insights from ghana
The determinants of financial inclusion in western africa insights from ghanaThe determinants of financial inclusion in western africa insights from ghana
The determinants of financial inclusion in western africa insights from ghanaAlexander Decker
 
[人本设计沙龙][2010.04.18]web产品在移动终端的应用和未来(ucd)
[人本设计沙龙][2010.04.18]web产品在移动终端的应用和未来(ucd)[人本设计沙龙][2010.04.18]web产品在移动终端的应用和未来(ucd)
[人本设计沙龙][2010.04.18]web产品在移动终端的应用和未来(ucd)Shanda innovation institute
 
Investigating Waste Water Treatment in a Closed Environment
Investigating Waste Water Treatment in a Closed EnvironmentInvestigating Waste Water Treatment in a Closed Environment
Investigating Waste Water Treatment in a Closed EnvironmentIJMER
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
School in hospital
School in hospitalSchool in hospital
School in hospitalftynnajiha93
 
Iaetsd significance of stator winding insulation systems of low-voltage induc...
Iaetsd significance of stator winding insulation systems of low-voltage induc...Iaetsd significance of stator winding insulation systems of low-voltage induc...
Iaetsd significance of stator winding insulation systems of low-voltage induc...Iaetsd Iaetsd
 
Kidsedchatnz edchatnz 2014
Kidsedchatnz   edchatnz 2014Kidsedchatnz   edchatnz 2014
Kidsedchatnz edchatnz 2014reidhns1
 
Система оптимизации кадрового потенциала
Система оптимизации кадрового потенциалаСистема оптимизации кадрового потенциала
Система оптимизации кадрового потенциалаmamn_minsk
 
The Next Generation of Networks is all about Hotspot Distributions and Cut-Th...
The Next Generation of Networks is all about Hotspot Distributions and Cut-Th...The Next Generation of Networks is all about Hotspot Distributions and Cut-Th...
The Next Generation of Networks is all about Hotspot Distributions and Cut-Th...Tokyo University of Science
 
Unit 5 la historia. máquinas e inventos
Unit 5 la historia. máquinas e inventosUnit 5 la historia. máquinas e inventos
Unit 5 la historia. máquinas e inventosadrianoloras
 
Ava ova rodriguez_cardenas;leon_diaz_1104
Ava ova rodriguez_cardenas;leon_diaz_1104Ava ova rodriguez_cardenas;leon_diaz_1104
Ava ova rodriguez_cardenas;leon_diaz_1104ropaula98
 
What a writer needs to know
What a writer needs to knowWhat a writer needs to know
What a writer needs to knowftynnajiha93
 
القرآن الكريم وترجمة معانيه للغة الهوسا
القرآن الكريم وترجمة معانيه للغة الهوساالقرآن الكريم وترجمة معانيه للغة الهوسا
القرآن الكريم وترجمة معانيه للغة الهوساسمير بسيوني
 
831 dossier-pedagogique-2
831 dossier-pedagogique-2831 dossier-pedagogique-2
831 dossier-pedagogique-2Anas Tounsi
 
IPV6 - IPV4
IPV6 - IPV4 IPV6 - IPV4
IPV6 - IPV4 Ale OH
 
Iaetsd time constrained self-destructing
Iaetsd time constrained self-destructingIaetsd time constrained self-destructing
Iaetsd time constrained self-destructingIaetsd Iaetsd
 
Evaluar tranmsedia
Evaluar tranmsediaEvaluar tranmsedia
Evaluar tranmsediacountcero77
 

Andere mochten auch (20)

Os blogues na educação
Os blogues na educaçãoOs blogues na educação
Os blogues na educação
 
1.13
1.131.13
1.13
 
The determinants of financial inclusion in western africa insights from ghana
The determinants of financial inclusion in western africa insights from ghanaThe determinants of financial inclusion in western africa insights from ghana
The determinants of financial inclusion in western africa insights from ghana
 
[人本设计沙龙][2010.04.18]web产品在移动终端的应用和未来(ucd)
[人本设计沙龙][2010.04.18]web产品在移动终端的应用和未来(ucd)[人本设计沙龙][2010.04.18]web产品在移动终端的应用和未来(ucd)
[人本设计沙龙][2010.04.18]web产品在移动终端的应用和未来(ucd)
 
Investigating Waste Water Treatment in a Closed Environment
Investigating Waste Water Treatment in a Closed EnvironmentInvestigating Waste Water Treatment in a Closed Environment
Investigating Waste Water Treatment in a Closed Environment
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
School in hospital
School in hospitalSchool in hospital
School in hospital
 
Iaetsd significance of stator winding insulation systems of low-voltage induc...
Iaetsd significance of stator winding insulation systems of low-voltage induc...Iaetsd significance of stator winding insulation systems of low-voltage induc...
Iaetsd significance of stator winding insulation systems of low-voltage induc...
 
Kidsedchatnz edchatnz 2014
Kidsedchatnz   edchatnz 2014Kidsedchatnz   edchatnz 2014
Kidsedchatnz edchatnz 2014
 
Система оптимизации кадрового потенциала
Система оптимизации кадрового потенциалаСистема оптимизации кадрового потенциала
Система оптимизации кадрового потенциала
 
The Next Generation of Networks is all about Hotspot Distributions and Cut-Th...
The Next Generation of Networks is all about Hotspot Distributions and Cut-Th...The Next Generation of Networks is all about Hotspot Distributions and Cut-Th...
The Next Generation of Networks is all about Hotspot Distributions and Cut-Th...
 
Unit 5 la historia. máquinas e inventos
Unit 5 la historia. máquinas e inventosUnit 5 la historia. máquinas e inventos
Unit 5 la historia. máquinas e inventos
 
Ava ova rodriguez_cardenas;leon_diaz_1104
Ava ova rodriguez_cardenas;leon_diaz_1104Ava ova rodriguez_cardenas;leon_diaz_1104
Ava ova rodriguez_cardenas;leon_diaz_1104
 
What a writer needs to know
What a writer needs to knowWhat a writer needs to know
What a writer needs to know
 
القرآن الكريم وترجمة معانيه للغة الهوسا
القرآن الكريم وترجمة معانيه للغة الهوساالقرآن الكريم وترجمة معانيه للغة الهوسا
القرآن الكريم وترجمة معانيه للغة الهوسا
 
831 dossier-pedagogique-2
831 dossier-pedagogique-2831 dossier-pedagogique-2
831 dossier-pedagogique-2
 
IPV6 - IPV4
IPV6 - IPV4 IPV6 - IPV4
IPV6 - IPV4
 
Iaetsd time constrained self-destructing
Iaetsd time constrained self-destructingIaetsd time constrained self-destructing
Iaetsd time constrained self-destructing
 
Nieuwsbrief augustus 2014, De Wert accountants & belastingadviseurs
Nieuwsbrief augustus 2014, De Wert accountants & belastingadviseursNieuwsbrief augustus 2014, De Wert accountants & belastingadviseurs
Nieuwsbrief augustus 2014, De Wert accountants & belastingadviseurs
 
Evaluar tranmsedia
Evaluar tranmsediaEvaluar tranmsedia
Evaluar tranmsedia
 

Ähnlich wie Iaetsd security and privacy enhancement using jammer in

CIP Based BOND for Wireless Sensor Networks
CIP Based BOND for Wireless Sensor NetworksCIP Based BOND for Wireless Sensor Networks
CIP Based BOND for Wireless Sensor Networksijsrd.com
 
Mitigation and control of Defeating Jammers using P-1 Factorization
Mitigation and control of Defeating Jammers using P-1 FactorizationMitigation and control of Defeating Jammers using P-1 Factorization
Mitigation and control of Defeating Jammers using P-1 Factorizationijcnes
 
Delay efficient broadcast scheduling for critical event monitoring in wireles...
Delay efficient broadcast scheduling for critical event monitoring in wireles...Delay efficient broadcast scheduling for critical event monitoring in wireles...
Delay efficient broadcast scheduling for critical event monitoring in wireles...eSAT Publishing House
 
Delay efficient broadcast scheduling for critical event monitoring in wireles...
Delay efficient broadcast scheduling for critical event monitoring in wireles...Delay efficient broadcast scheduling for critical event monitoring in wireles...
Delay efficient broadcast scheduling for critical event monitoring in wireles...eSAT Journals
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI) International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI) inventionjournals
 
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...ijeei-iaes
 
Multi-Robot Sensor Relocation to Enhance Connectivity in a WSN
Multi-Robot Sensor Relocation to Enhance Connectivity in a WSNMulti-Robot Sensor Relocation to Enhance Connectivity in a WSN
Multi-Robot Sensor Relocation to Enhance Connectivity in a WSNjake henry
 
MULTI-ROBOT SENSOR RELOCATION TO ENHANCE CONNECTIVITY IN A WSN
MULTI-ROBOT SENSOR RELOCATION TO ENHANCE CONNECTIVITY IN A WSN MULTI-ROBOT SENSOR RELOCATION TO ENHANCE CONNECTIVITY IN A WSN
MULTI-ROBOT SENSOR RELOCATION TO ENHANCE CONNECTIVITY IN A WSN ijasuc
 
Multi-Robot Sensor Relocation to Enhance Connectivity in a WSN
Multi-Robot Sensor Relocation to Enhance Connectivity in a WSNMulti-Robot Sensor Relocation to Enhance Connectivity in a WSN
Multi-Robot Sensor Relocation to Enhance Connectivity in a WSNijasuc
 
Investigating the Effect of Mutual Coupling on SVD Based Beam-forming over MI...
Investigating the Effect of Mutual Coupling on SVD Based Beam-forming over MI...Investigating the Effect of Mutual Coupling on SVD Based Beam-forming over MI...
Investigating the Effect of Mutual Coupling on SVD Based Beam-forming over MI...CSCJournals
 
Wireless sensor network lifetime constraints
Wireless sensor network lifetime constraintsWireless sensor network lifetime constraints
Wireless sensor network lifetime constraintsmmjalbiaty
 
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...ijasuc
 
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...ijasuc
 
Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...
Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...
Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...IDES Editor
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Block diagonalization for Multi-user MIMO Beamforming Performance over Rician...
Block diagonalization for Multi-user MIMO Beamforming Performance over Rician...Block diagonalization for Multi-user MIMO Beamforming Performance over Rician...
Block diagonalization for Multi-user MIMO Beamforming Performance over Rician...IRJET Journal
 

Ähnlich wie Iaetsd security and privacy enhancement using jammer in (20)

CIP Based BOND for Wireless Sensor Networks
CIP Based BOND for Wireless Sensor NetworksCIP Based BOND for Wireless Sensor Networks
CIP Based BOND for Wireless Sensor Networks
 
Mitigation and control of Defeating Jammers using P-1 Factorization
Mitigation and control of Defeating Jammers using P-1 FactorizationMitigation and control of Defeating Jammers using P-1 Factorization
Mitigation and control of Defeating Jammers using P-1 Factorization
 
Ijetr012022
Ijetr012022Ijetr012022
Ijetr012022
 
Delay efficient broadcast scheduling for critical event monitoring in wireles...
Delay efficient broadcast scheduling for critical event monitoring in wireles...Delay efficient broadcast scheduling for critical event monitoring in wireles...
Delay efficient broadcast scheduling for critical event monitoring in wireles...
 
Delay efficient broadcast scheduling for critical event monitoring in wireles...
Delay efficient broadcast scheduling for critical event monitoring in wireles...Delay efficient broadcast scheduling for critical event monitoring in wireles...
Delay efficient broadcast scheduling for critical event monitoring in wireles...
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI) International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...
 
Multi-Robot Sensor Relocation to Enhance Connectivity in a WSN
Multi-Robot Sensor Relocation to Enhance Connectivity in a WSNMulti-Robot Sensor Relocation to Enhance Connectivity in a WSN
Multi-Robot Sensor Relocation to Enhance Connectivity in a WSN
 
MULTI-ROBOT SENSOR RELOCATION TO ENHANCE CONNECTIVITY IN A WSN
MULTI-ROBOT SENSOR RELOCATION TO ENHANCE CONNECTIVITY IN A WSN MULTI-ROBOT SENSOR RELOCATION TO ENHANCE CONNECTIVITY IN A WSN
MULTI-ROBOT SENSOR RELOCATION TO ENHANCE CONNECTIVITY IN A WSN
 
Multi-Robot Sensor Relocation to Enhance Connectivity in a WSN
Multi-Robot Sensor Relocation to Enhance Connectivity in a WSNMulti-Robot Sensor Relocation to Enhance Connectivity in a WSN
Multi-Robot Sensor Relocation to Enhance Connectivity in a WSN
 
Investigating the Effect of Mutual Coupling on SVD Based Beam-forming over MI...
Investigating the Effect of Mutual Coupling on SVD Based Beam-forming over MI...Investigating the Effect of Mutual Coupling on SVD Based Beam-forming over MI...
Investigating the Effect of Mutual Coupling on SVD Based Beam-forming over MI...
 
Indoor Localization in Wireless Sensor Networks
Indoor Localization in Wireless Sensor NetworksIndoor Localization in Wireless Sensor Networks
Indoor Localization in Wireless Sensor Networks
 
F04 3-3944
F04 3-3944F04 3-3944
F04 3-3944
 
Wireless sensor network lifetime constraints
Wireless sensor network lifetime constraintsWireless sensor network lifetime constraints
Wireless sensor network lifetime constraints
 
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...
 
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...
 
iPGCON14_134
iPGCON14_134iPGCON14_134
iPGCON14_134
 
Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...
Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...
Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Block diagonalization for Multi-user MIMO Beamforming Performance over Rician...
Block diagonalization for Multi-user MIMO Beamforming Performance over Rician...Block diagonalization for Multi-user MIMO Beamforming Performance over Rician...
Block diagonalization for Multi-user MIMO Beamforming Performance over Rician...
 

Mehr von Iaetsd Iaetsd

iaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissioniaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissionIaetsd Iaetsd
 
iaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdliaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdlIaetsd Iaetsd
 
iaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarmiaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarmIaetsd Iaetsd
 
iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...Iaetsd Iaetsd
 
iaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seatiaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seatIaetsd Iaetsd
 
iaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan applicationiaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan applicationIaetsd Iaetsd
 
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBSREVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBSIaetsd Iaetsd
 
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...Iaetsd Iaetsd
 
Fabrication of dual power bike
Fabrication of dual power bikeFabrication of dual power bike
Fabrication of dual power bikeIaetsd Iaetsd
 
Blue brain technology
Blue brain technologyBlue brain technology
Blue brain technologyIaetsd Iaetsd
 
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...Iaetsd Iaetsd
 
iirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic birdiirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic birdIaetsd Iaetsd
 
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growthiirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid GrowthIaetsd Iaetsd
 
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithmiirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT AlgorithmIaetsd Iaetsd
 
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...Iaetsd Iaetsd
 
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...Iaetsd Iaetsd
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocolIaetsd Iaetsd
 
iaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databasesiaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databasesIaetsd Iaetsd
 
iaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineriesiaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineriesIaetsd Iaetsd
 
iaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using paraboliciaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using parabolicIaetsd Iaetsd
 

Mehr von Iaetsd Iaetsd (20)

iaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissioniaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmission
 
iaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdliaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdl
 
iaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarmiaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarm
 
iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...
 
iaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seatiaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seat
 
iaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan applicationiaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan application
 
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBSREVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
 
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
 
Fabrication of dual power bike
Fabrication of dual power bikeFabrication of dual power bike
Fabrication of dual power bike
 
Blue brain technology
Blue brain technologyBlue brain technology
Blue brain technology
 
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
 
iirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic birdiirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic bird
 
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growthiirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
 
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithmiirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
 
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
 
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocol
 
iaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databasesiaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databases
 
iaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineriesiaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineries
 
iaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using paraboliciaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using parabolic
 

Kürzlich hochgeladen

UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 

Kürzlich hochgeladen (20)

UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 

Iaetsd security and privacy enhancement using jammer in

  • 1. Abstract— this paper, a novel transmission scheme is proposed to improve the security of downlink cellular network. The confidential message intended to one of K mobile users (MUs) should be securely kept from the undesired recipients. In this work, the K − 1 remaining users are regarded as potential eavesdroppers and called as internal eavesdroppers. For the security enhancement, we propose an adaptation of a single cooperative jammer (CJ) to increase the ambiguity at all malicious users by distracting them with artificial interference. With the help of CJ, we derive the optimal joint transmission scheme by beamforming solution to maximize the secrecy rate of the intended user. Numerical results show the performance improvement of the proposed scheme. Index Terms— Physical layer security, downlink cellular network,cooperative jammer, beamforming. 1. INTRODUCTION Wireless communication is vulnerable to eavesdropping due to the broadcast nature of wireless medium. In broadcast channel where one transmitter disperses the information to the multiple users, the importance of security becomes more emphasized. Wyner introduced the information theoretic view of the physical-layer security in [1]. From this perspective, the effective transmission with the multiple antennas and the cooperative jammer (CJ) to improve the security were studied in [2]–[5]. Recently, with the ever-increasing demand of broadcast services (e.g. downlink communication in cellular networks and wireless local networks (WLAN)), the concern on broadcast channel with the confidential messages has been growing. Specially in multiuser system, since all users within the communication range can overhear the wireless signal, there occurs a possibility that the licensed users might be the maliciouseavesdroppers1.Thus, we should counteract two sorts of eavesdroppers such as internal and external. If they are from legitimate user set of the transmitter, we call them internal eavesdroppers and otherwise external eavesdroppers. Authors of [6] and [7] investigated the secure transmission against a single external eavesdropper. For coping with the internal eavesdroppers, [8] proposed the transmission technique for the base station (BS) via semi definite programming (SDP). In this paper2, we aim at designing the optimal transmission in downlink cellular network against the multiple internal eavesdroppers. In our scenario, BS desires to send the private message to one of K mobile users (MUs) while keeping the privacy from the K-1 remaining MUs, i.e. internal eavesdroppers. For the secrecy enhancement of the intended user, we design a novel secure transmission which jointly optimizes both BS and CJ for the multiple-antenna link. This joint cooperation has the robustness for the case where BSs are in the severe fading conditions or where the eavesdropper is close to BSs or MUs. Additionally, the employment of CJ can lessen the complexity burden compared to the beam forming solution solely at BS with no help of CJ such as [8]3.Unlike the studies enlisting the aid of optimization software tools for the transmission design in multiuser setting [8], [10]–[12], our strategy is also grounded on an explicit parametrization for an arbitrary number of users and antennas with the constructed programming problem. 2. SYSTEM MODEL The system model under consideration is illustrated in Fig.1. The cellular network consists of a base station (BS), K mobile users (MUs) and a single cooperative jammer (CJ). All users can have two types of data traffic such as private and open, but in this paper we suppose that each user has only Fig.1 System Model private message transmitted from the BS. The BS wants to securely transmit the private message to each user over the same spectral band simultaneously. However, such public dispersion unavoidably brings the information leakage to the unintended users over the associated cross-channels. We assume that the remaining users except the desired recipient are considered the potential eavesdroppers and we refer to them as the as internal eavesdroppers. In this work, a CJ creating the artificial noise toward the multiple eavesdroppers is applied to improve the secrecy of a desired point-to-point link. In doing so, we can obtain the strength on security level in the channel condition vulnerable to Security And Privacy Enhancement Using Jammer In Downlink Cellular Networks S.Shafil Mohammad1 ,T.Prasad2 1 P.G Student in VLSI, Department of E.C.E, SIETK, Tirupati. 2 Assistant Professor, Department of E.C.E, SIETK, Tirupati. E-Mail to:shafil.mohammad71@gmail.com,prasadgmt@gmail.com INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ENGINEERING RESEARCH, ICDER - 2014 INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in 58
  • 2. eavesdropping comparing to the system only controlling the signal direction by beam forming at BS. Also,with the help of CJ, BS can lighten the complexity cost for the secrecy enhancement. To accomplish this mission, we propose the joint transmission technique for both BS and CJ under transmit power constraint. We assume that BS and CJ possess Nb and Nc transmit antennas, respectively, while all MUs are single-antenna nodes. The transmission is composed of scalar coding followed by beam forming and all propagation channels are supposed to be frequency-flat. With these assumptions, the received signal at MUk can be modeled as the symbols transmitted by BS and CJ, hk and gk are the (complex-valued) Nb×1 channel-vector between BS and MUk and Nc × 1 channel-vector between CJ and MUk, and wb and wc are the transmit beam forming vectors used by BS and CJ, respectively. The variable nk models the complex Gaussian noise with zero mean and variance σ2 k. We assume that BS and CJ have full channel state information (CSI). The objective of the transmit beamformers wb and wc is to convey the symbol sb in a secure way. 3.MODELING ASSUMPTIONS: 3.1 Sensor Network Model We consider a wireless sensor network deployed over a large area and operating under a single-carrier slotted Aloha type random access protocol. We assume symmetric trans-mission and reception in the sense that a node i can receive a signal from node j if and only if node j can receive a signal from. Time is divided into time slots and the slot size is equal to the size of a packet. All nodes are assumed to be synchronized when transmitting with respect to time slot boundaries. Each node transmits at a fixed power level P with an omni directional antenna and its transmission range R and sensing range Rs are circular with sharp boundary. Transmission and sensing ranges are defined by two thresh- olds of received signal strength. A node within transmission range of node i can correctly decode transmitted messages from i, while a node within sensing range can just sense activity due to higher signal strength than noise, but cannot decode the transmitted message. Typically, Rs is a small multiple of R, ranging from 2 to 3. Anode within distance R of anode i(excluding node i itself)is called a neighbor of i. The neighborhood of i, N i is the set of all neighbors of i with ni ¼ j Nij being the size of i’s neighborhood. Transmissions from node i are received by all its neighbors. The sensor network is represented by an undirected graph. where S is the set of sensor nodes and E is the set of edges where edge denotes that sensor i and j are within transmission range of each other. Sensor nodes are uniformly distributed in an area,with spatial density nodes per unit area and the topology is static, i.e., we assume no mobility. Each node has an initial amount of energy E. We do not consider the energy consumed in reception. Each node is equipped with a single transceiver, so that it cannot transmit and receive simultaneously. All nodes are assumed to be continuously backlogged, so that there are always packets in each node’s buffer in each slot. Packets can be generated by higher layers of a node, or they may come from other nodes and need to be forwarded or they may be previously sent and collided packets to be retransmitted. A transmission on edge is successful if and only if no node in N j [f] jgnf ig transmits during that transmission. In this work, we consider the class of slotted Aloha type random access protocols that are characterized by a common channel access probability for all network nodes in each slot. This provides us with a straightforward means to quantify the network effort to withstand and confront the attack by regulating the amount of transmitted traffic and essentially exposing the attacker to the detection system, as will become clear in the sequel. Provided that it remains silent in a slot, a receiver node j experiences collision if at least two nodes in its neighborhood transmit simultaneously, regardless of whether the transmitted packets are destined for node j or for other nodes. Thus, the probability of collision at node j in a slot is: If node j attempts to transmit at a slot while it receives a message, a collision occurs as well. In that case, the receiver is not in position to tell whether the collision is due to its own transmission or whether it would occur anyway. In the sequel, we will term collision an event addressing the case of multiple simultaneous transmissions received by (not necessarily intended to) a node and no transmission attempt by that node. Note that, if we include the possibility that the receiver also attempts to access the channel, the probability of collision is the same as the one above with nj substituted by nj þ 1. Whenever a collision occurs at a receiver, the packet is retransmitted in the next slot if the transmitter accesses the channel again. If a node does not have any neighbors (i.e., it is nj ¼ 0), then this node does not receive any packets and does not experience collisions. 3.2Attacker Model: We consider one attacker, the jammer, in the sensor network area. The jammer is neither authenticated nor associated with the network. The objective of the jammer is to corrupt legitimate transmissions of sensor nodes by causing intentional packet collisions at receivers. Intentional collision leads to retransmission, which is translated into additional energy consumption for a certain amount of attainable throughput or equivalently reduced throughput for a given amount of consumed energy. In this paper, we do not consider the attacker that is capable of node capture. The jammer may use its sensing ability in order to sense ongoing activity in the network. Clearly, sensing ongoing network activity prior to jamming is beneficial for the attacker in the sense that its energy resources are not aimlessly consumed and the jammer is not needlessly exposed to the network. The jammer transmits a small packet which collides with legitimate transmitted packets at their intended receivers. INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ENGINEERING RESEARCH, ICDER - 2014 INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in 59
  • 3. Fig .2.Illustration of Jamming attack As argued in, a beacon packet of a few bits suffices to disrupt a transmitted packet in the network. The jammer is assumed to have energy resources denoted by Em, yet the corresponding energy constraint in the optimization problems of the next section may be redundant if the jammer adheres to the policy above. The jammer uses an omni directional antenna with circular sensing range Rms and adaptable transmission range Rm that is realized by controlling transmission power Pm as illustrated inFig.1.Thejammeralsocontrolstheprobabilityq of jamming the area within its transmission range in a slot, thus, controlling the aggressiveness of the attack. The attack space is, therefore, specified by set P-ð 0;1Þ, where P is the discrete set of employed power levels. The attacker attempts to strike a balance between short-and long-term benefits, as a more aggressive attack increases instantaneous benefit but exposes the attacker to the detection system, while a milder attack may prolong detection time. If the jammer senses the channel prior to deciding whether to jam or not, collision occurs at node j if the jammer jams and at least one neighbor transmits. Thus, conditioned on existence of a jammer, the probability of collision at node j is On the other hand, if jamming occurs without prior channel sensing, the probability of collision is Thus, the probability of collision is the same regardless of channel sensing prior to jamming. This implies that jamming can be viewed as a multiple access situation between a network of legitimate nodes, each with access probability and the jammer with access probability q. Nevertheless, by using sensing, the adversary does not was energy on empty slots and conserves energy by a factor of 1where denotes the number of legitimate nodes in the jammer’s sensing range. For large 1. Namely, for a den sensor network, It is very likely that some transmission will always occur in the network and, therefore, it does not really make a difference whether the attacker will sense the channel or not. In the sequel, we will not consider the energy saving facto We will subsequently assume that the adversary pos- sesses different amounts of knowledge about the network, ranging from full knowledge about network parameters such as access probability and the neighborhood of a monitor node to no knowledge at all. Network’s differing levels of knowledge about an attacker will be considered as well. 3.3 Attack Detection Model: The network employs a mechanism for monitoring network status and detecting potential malicious activity. The monitoring mechanism consists of: 1)Determination of a subset of nodes M that act as monitors. 2) Employment of a detection algorithm at each monitor node. The assignment of the role of monitor to anode is affected by potential existing energy consumption and node computational complexity limitations, and by detection performance specifications. In this work, we consider a fixed set M, and formulate optimization problems for one or several monitor nodes. We fix attention to a specific monitor node and the detection scheme that it employs. First, we need to define the quantity to be observed at each monitor. In our case, the readily available metric is the probability of collision that a monitor node experiences, namely the percentage of packets that are erroneously received. During normal network operation and in the absence of a jammer, we consider a large enough training period in which the monitor node learns the percentage of collisions it experiences as the long-term limit of the ratio of number of slots where there was collision over total number of slots of the training period. Now let the network operate in the open after the training period has elapsed and fix attention to a time window much smaller than the training period. An increased percentage of collisions in the time window compared to the learned long-term ratio may be an indication of an ongoing jamming attack that causes additional collisions. However, it may happen as well that the network operates normally and there is just a temporary irregular increase in the percentage of collisions compared to the learned ratio for that specific interval. A detection algorithm is part of the detection module at a monitor node; it takes as input observation samples obtained by the monitor node (i.e., collision/not collision) and decides whether there is an attack or not. On one hand, the observation window should be small enough, such that the attack is detected in a timely manner and appropriate countermeasures are initiated. On the other hand, this window should be sufficiently large, such that the chance of a false alarm notification is reduced. The sequential nature of observations at consecutive time slots motivates the use of sequential detection techniques. A sequential decision rule consists of: 1) A stopping time, indicating when to stop taking observations. 2) Afinal decision rule that decides between the two hypotheses. A sequential decision rule is efficient if it can provide reliable decision as fast as possible. The probability of false alarm PFA and probability of missed detection PM constitute inherent trade-offs in a detection scheme in the sense that a faster decision unavoidably leads to higher values of these INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ENGINEERING RESEARCH, ICDER - 2014 INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in 60
  • 4. probabilities while lower values are attained at the expense of detection delay.Forgiven values of PFA and PM, the detection test that minimizes the average number of required observations (and thus average delay) to reach a decision among all sequential and non sequential tests for which PFA and PM do not exceed the predefined values above is Wald’s Sequential Probability Ratio Test (SPRT). When SPRT is used for sequential testing between two hypotheses concerning two probability distributions, SPRT is optimal in that sense as well. 3.4 Notification Delay Following detection of an attack, the network needs to be notified in order to launch appropriate counter measures. The transfer of the notification message out of the jammed area is performed with multiple routing from the monitor node to a node out of the jammed region. The same random access protocol with channel access probability is employed by a node to forward the message to the next node. Having assumed a single-channel sensor network, we implicitly exclude the existence of a control channel that is used for signaling attack notification messages. Hence, the transfer of the notification message out of the jammed will take place in the same channel and will still under go jamming. Clearly, the time that is needed for the notification message to be passed out of the jammed area depends on the jamming strategy as well as the network channel access probability. For that reason, we use the sum of detection and notification delay as a metric that captures the objective of the attacker and the network. It is understood that if there exists a control channel for signaling notification messages that is not jammed, then only the detection delay is needed as a performance objective. If this control channel is jammed, then one needs to consider the notification time but also assess the cost incurred by jamming an additional channel. We discuss briefly this issue in the last section as part of future work. We now compute the average time needed for the notification message to be carried out of the jammed area. The probability of successful channel access for a node i along the route of the notification message in the presence of jamming is . Hence, the ex-pected number of transmission attempts before successful transmission, which also denotes expected delay for node i before successful transmission is slots. In a single-channel network, the adversary can cause additional disruption to the network by jamming the alert message even after being detected. In order to find the average delay for transmitting an alert out of the jammed region, let us first denote the average number of hops to deliver the alarm out of jammed area Am by H. Clearly, the expected notification delay depends on the expected number of hops it takes for the notification message to leave the jammed area which in turn depends on the position of the monitor node. We assume dense sensor deployment and, thus, roughly approximate the route followed by the notification message with an almost straight line. This means that H Rm=2p, namely, H is equal to the average distance of a monitor from the boundary of the jammed area (Rm=2) divided by the node transmission range R. We adhere to this approximation since the exact expression for the distribution of H depends on knowledge about the network topology and the location of the monitor. Such knowledge is rather unrealistic to assume for the attacker and even for the network itself. The average time needed for the alarm to propagate out of the jamming area, also referred to as notification delay, is 4.BLOCK DIAGRAM: Fig.3.Block diagram of Mobile jamming circuit. with the help of this Speaker,Keypad and Mick are blocked. 5. RANDOM MODEL WITH ONE TRANSMITTER AND ONE JAMMER: We first consider one transmitter node (node 1) and one jammer node (node 2) at a single channel access point as shown in Figure 2. Packets arrive randomly at node 1’s queue with rate λ (packets per time slot) and they are transmitted over a single channel. Node 2 does not have its own traffic and jams node 1’s transmissions. We assume that each (packet or jamming signal) transmission consumes one unit of energy. We consider a synchronous slotted system, in which each packet transmission (or jamming attempt) takes one time slot. Hence, the jammer cannot wait to detect the start of a transmission before jamming. Later in Section VI, we will consider the effects of channel sensing and allow the jammer to detect any transmission before starting a denial of service attack. Fig.4.Single Channel Access point With one Transmitter and one Jammer INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ENGINEERING RESEARCH, ICDER - 2014 INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in 61
  • 5. From the above Fig4.Single channel Access point with one transmitter and one jammer is used for the prototype model. 6.CONCLUSIONS We have considered the secure communication in the K user downlink cellular system. For the secrecy improvement of the intended user, we develop the joint transmission strategy with the assistance of CJ based on the framework of power gain region. The numerical results verify the performance improvement of the proposed scheme. REFERENCES [1] A. D. Wyner, “The wire-tap channel,” The Bell Sys. Tech. J., vol. 54,no. 8, pp. 1355–1387, Oct. 1975. [2] X. Tang, R. Liu, P. Spasojevic, and H. V. Poor, “Interference assisted secret communication,” to appear in IEEE Trans. Inf. Theory. Preprint available on arXiv:0908.2397, Aug. 2009. [3] S. Goel and R. Negi, “Guaranteeing secrecy using artificial noise,” IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180–2189, June 2008. [4] A. Khisti and G. Wornell, “Secure transmission with multiple antennas—I: the MISOME wiretap channel,” IEEE Trans. Inf. Theory, vol. 56, no. 7, pp. 3088–3104, Jul. 2010. [5] E. A. Jorswieck, “Secrecy capacity of single- and multi-antenna channels with simple helpers,” in Proc. 2010 Int. ITG Conf. on Source and Channel Coding, pp. 1–6. [6] A. Khisti, A. Tchamkerten, and G. Wornell, “Secure broadcasting over fading channels,” IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 1–7, Jun. 2008. [7] A. Mukherjee and A. L. Swindlehurst, “Utility of beamforming strategies for secrecy in multiuser MIMO wiretap channels,” in Proc. 2009 Allerton Conf. on Comm. Control and Comp., pp. 1134–1141. [8] M. Vzquez, A. Prez-Neira, and M. Lagunas, “Confidential communication in downlink beamforming,” in Proc. 2012 IEEE Workshop on Sign. Proc. Adv. in Wireless Comm., pp. 349–353. [9] S. Jeong, K. Lee, J. Kang, Y. Baek, and B. Koo, “Cooperative jammer design in cellular network with internal eavesdroppers,” in Proc. 2012 IEEE Mil. Comm. Conf., pp. 1–5. [10] H. D. Ly, T. Liu, and Y. Liang, “Multiple-input multiple-output Gaussian broadcast channels with common and confidential messages,” IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5477–5487, Nov. 2010. [11] Q. Li and W. K. Ma, “Optimal and robust transmit designs for MISO channel secrecy by semi definite programming,” IEEE Trans. Signal Process., vol. 59, no. 8, pp. 3799–3812, Aug. 2011. [12] Y. Yang, W.-K. Ma, J. Ge, and P. C. Ching, “Cooperative secure beamforming for AF relay networks with multiple eavesdroppers,” IEEE Signal Process. Lett., vol. 20, no. 1, pp. 35–38, Jan. 2013. [13] E. G. Larsson and E. A. Jorswieck, “Competition versus cooperation on the MISO interference channel,” IEEE J. Sel. Areas Commun., vol. 26, no. 7, pp. 1059–1069, Sept. 2008. [14] Y. Liang, G. Kramer, H. V. Poor, and S. Shamai, “Compound wire-tap channels,” in Eurasip J. Wireless Commun. and Networking, vol. 2009, no. 5, Mar. 2009. [15] R. Mochaourab and E. A. Jorswieck, “Optimal beamforming in interference networks with perfect local channel information,” submitted to IEEE Trans. Signal Process. Preprint available on arXiv:1004.4492, Oct. INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ENGINEERING RESEARCH, ICDER - 2014 INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT www.iaetsd.in 62