Showing 1–2 of 2 results for author: Hartog, F d
-
Cooperative Jamming for Physical Layer Security Enhancement Using Deep Reinforcement Learning
Authors:
Sayed Amir Hoseini,
Faycal Bouhafs,
Neda Aboutorab,
Parastoo Sadeghi,
Frank den Hartog
Abstract:
Wireless data communications are always facing the risk of eavesdrop** and interception. Conventional protection solutions which are based on encryption may not always be practical as is the case for wireless IoT networks or may soon become ineffective against quantum computers. In this regard, Physical Layer Security (PLS) presents a promising approach to secure wireless communications through…
▽ More
Wireless data communications are always facing the risk of eavesdrop** and interception. Conventional protection solutions which are based on encryption may not always be practical as is the case for wireless IoT networks or may soon become ineffective against quantum computers. In this regard, Physical Layer Security (PLS) presents a promising approach to secure wireless communications through the exploitation of the physical properties of the wireless channel. Cooperative Friendly Jamming (CFJ) is among the PLS techniques that have received attention in recent years. However, finding an optimal transmit power allocation that results in the highest secrecy is a complex problem that becomes more difficult to address as the size of the wireless network increases. In this paper, we propose an optimization approach to achieve CFJ in large Wi-Fi networks by using a Reinforcement Learning Algorithm. Obtained results show that our optimization approach offers better secrecy results and becomes more effective as the network size and the density of Wi-Fi access points increase.
△ Less
Submitted 15 March, 2024;
originally announced March 2024.
-
Network-Controlled Physical-Layer Security: Enhancing Secrecy Through Friendly Jamming
Authors:
Sayed Amir Hoseini,
Parastoo Sadeghi,
Faycal Bouhafs,
Neda Aboutorab,
Frank den Hartog
Abstract:
The broadcasting nature of the wireless medium makes exposure to eavesdroppers a potential threat. Physical Layer Security (PLS) has been widely recognized as a promising security measure complementary to encryption. It has recently been demonstrated that PLS can be implemented using off-the-shelf equipment by spectrum-programming enhanced Software-Defined Networking (SDN), where a network control…
▽ More
The broadcasting nature of the wireless medium makes exposure to eavesdroppers a potential threat. Physical Layer Security (PLS) has been widely recognized as a promising security measure complementary to encryption. It has recently been demonstrated that PLS can be implemented using off-the-shelf equipment by spectrum-programming enhanced Software-Defined Networking (SDN), where a network controller is able to execute intelligent access point (AP) selection algorithms such that PLS can be achieved and secrecy capacity optimized. In this paper, we provide a basic system model for such implementations. We also introduce a novel secrecy capacity optimization algorithm, in which we combine intelligent AP selection with the addition of Friendly Jamming (FJ) by the not-selected AP.
△ Less
Submitted 14 June, 2022;
originally announced June 2022.