Research Article
BibTex RIS Cite
Year 2023, Volume: 12 Issue: 1, 13 - 20, 10.03.2023
https://doi.org/10.55859/ijiss.1194643

Abstract

References

  • X. Li, HN. Dai, MK. Shukla, D. Li, H. Xu, M. Imran, "Friendly-jamming schemes to secure ultra-reliable and low-latency communications in 5G and beyond communications," Computer Standards and Interfaces, vol.78, p.103540, Oct. 2021.
  • R. Shaaban, and S. Faruque, "An enhanced indoor visible light communication physical‐layer security scheme for 5G networks: Survey, security challenges, and channel analysis secrecy performance," International Journal of Communication Systems, vol.34, no.4, p.e4726, Mar 2021.
  • Y. Huo, X. Fan, L. Ma, X. Cheng, Z. Tian, D. Chen, "Secure communications in tiered 5G wireless networks with cooperative jamming," IEEE Transactions on Wireless Communications, vol.18, no.6, pp.3265-80, Apr. 2019.
  • B. Li B, Z. Fei, Y. Zhang, M. Guizani, "Secure UAV communication networks over 5G," IEEE Wireless Communications, vol.26, no.5, pp.114-20, Jul. 2019.
  • Q. Wang, HN. Dai, H. Wang, G. Xu, AK. Sangaiah, "UAV-enabled friendly jamming scheme to secure industrial Internet of Things," Journal of Communications and Networks, vol.21, no.5, pp.481-90, Aug. 2019.
  • X. Li, Q. Wang, HN. Dai, H. Wang, "A novel friendly jamming scheme in industrial crowdsensing networks against eavesdropping attack," Sensors, vol.18, no.6, p.1938, Jun. 2018.
  • X. Li, HN. Dai, Q. Wang, M. Imran, D. Li, MA. Imran, "Securing internet of medical things with friendly-jamming schemes," Computer Communications, vol.1, no.160, pp.431-42, Jul. 2020.
  • H. Dang-Ngoc et al., "Secure swarm UAV-assisted communications with cooperative friendly jamming," IEEE Internet of Things Journal, Aug. 2022.
  • J. Kim, PK. Biswas, S. Bohacek, SJ. Mackey, S. Samoohi, MP. Patel, "Advanced protocols for the mitigation of friendly jamming in mobile ad-hoc networks," Journal of Network and Computer Applications, vol.181, 103037, May 2021.
  • TV. Pham, and AT. Pham, "Energy-efficient friendly jamming for physical layer security in visible light communication," In2021 IEEE International Conference on Communications Workshops (ICC Workshops), 2021 Jun 14, pp. 1-6.
  • A. Mostafa, and L. Lampe, "Securing visible light communications via friendly jamming," In 2014 IEEE Globecom Workshops (GC Wkshps), 2014 Dec 8, pp. 524-529.
  • I. Martinovic, P. Pichota, JB. Schmitt, "Jamming for good: a fresh approach to authentic communication in WSNs," In Proceedings of the second ACM conference on Wireless network security, 2009 Mar 16, pp. 161-168.
  • DS. Berger, F. Gringoli, N. Facchi, I. Martinovic, JB. Schmitt, "Friendly jamming on access points: Analysis and real-world measurements," IEEE Transactions on Wireless Communications, vol.15, no.9, pp.6189-202, Jun 2016.
  • DS.Berger DS,F. Gringoli, N. Facchi, I. Martinovic, J. Schmitt, "Gaining insight on friendly jamming in a real-world IEEE 802.11 network," In Proceedings of the 2014 ACM conference on Security and privacy in wireless and mobile networks, 2014. pp. 105-116.
  • P. Kyösti et al., "WINNER II channel models," IST-4-027756 WINNER II D1.1.2 V1.2, 2008.
  • DS. Madara, E. Ataro, S. Sitati, "Design and testing of a mobile-phone-jammer," Innovative systems design and engineering, vol.7, no.7, pp.7-18, 2016.
  • J. Li, X. Lei, PD. Diamantoulakis, L. Fan, GK. Karagiannidis, "Security Optimization of Cooperative NOMA Networks With Friendly Jamming," IEEE Transactions on Vehicular Technology, Aug 2022.
  • R. Jin, K. Zeng, K. Zhang, "A reassessment on friendly jamming efficiency," IEEE Transactions on Mobile Computing, vol.20, no.1, pp.32-47, Sep. 2019.
  • J. Kim, and JP. Choi, "Cancellation-based friendly jamming for physical layer security," In 2016 IEEE Global Communications Conference (GLOBECOM), Dec. 2016, pp. 1-6.
  • JP. Vilela, M. Bloch, J. Barros, SW. McLaughlin, "Friendly jamming for wireless secrecy," In 2010 IEEE International Conference on Communications, May. 2010, pp. 1-6.
  • Z. Mobini, M. Mohammadi, C. Tellambura, "Wireless-powered full-duplex relay and friendly jamming for secure cooperative communications," IEEE Transactions on Information Forensics and Security, vol.14, no.3, pp.621-34, Jul. 2018.
  • W. Shen, P. Ning, X. He, H. Dai, "Ally friendly jamming: How to jam your enemy and maintain your own wireless connectivity at the same time," In 2013 IEEE Symposium on Security and Privacy, May 2013, pp. 174-188.
  • I. Stanojev, and A. Yener, "Improving secrecy rate via spectrum leasing for friendly jamming," IEEE Transactions on Wireless Communications, vol.12, no.1, pp.134-45, Dec. 2012.
  • NO. Tippenhauer, L. Malisa, A. Ranganathan, S. Capkun, "On limitations of friendly jamming for confidentiality," In 2013 IEEE symposium on security and privacy, 2013 May 19, pp. 160-173.
  • JP. Vilela, M. Bloch, J. Barros, SW. McLaughlin, "Wireless secrecy regions with friendly jamming," IEEE Transactions on Information Forensics and Security, vol.6, no.2, pp.256-66, Feb. 2011.
  • O. Yaman, A. Eroglu and E. Onur, "Density-aware cell zooming," 2018 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN), 2018, pp. 1-8, doi: 10.1109/ICIN.2018.8401612.
  • A. Eroğlu, O. Yaman, E. Onur, "Density-aware cellular coverage control: Interference-based density estimation," Computer Networks, vol.165, no.106922, Dec. 2019.

A Lightweight Self-Organized Friendly Jamming

Year 2023, Volume: 12 Issue: 1, 13 - 20, 10.03.2023
https://doi.org/10.55859/ijiss.1194643

Abstract

Wireless networks are inherently more susceptible to attacks than their wired counterparts. The easiness of transmitting and receiving messages for legitimate users is also valid for attackers, and traditionally cryptographic methods have been exploited to provide security and privacy. However, these are far from fulfilling the needs of current technologies, such as IoT devices with limited computation and energy sources. Therefore, friendly jamming (FJ) emerges as a promising solution to this problem due to being a computationally cheap and energy-efficient operation. However, one of the tradeoffs of FJ is its viability. Although some studies try to cope with this challenge, they are complicated and focus on old technologies. This study proposes a lightweight and flexible FJ scheme to address these challenges. We also demonstrate that our model has the same performance as one of the mentioned studies above in a more straightforward way.

References

  • X. Li, HN. Dai, MK. Shukla, D. Li, H. Xu, M. Imran, "Friendly-jamming schemes to secure ultra-reliable and low-latency communications in 5G and beyond communications," Computer Standards and Interfaces, vol.78, p.103540, Oct. 2021.
  • R. Shaaban, and S. Faruque, "An enhanced indoor visible light communication physical‐layer security scheme for 5G networks: Survey, security challenges, and channel analysis secrecy performance," International Journal of Communication Systems, vol.34, no.4, p.e4726, Mar 2021.
  • Y. Huo, X. Fan, L. Ma, X. Cheng, Z. Tian, D. Chen, "Secure communications in tiered 5G wireless networks with cooperative jamming," IEEE Transactions on Wireless Communications, vol.18, no.6, pp.3265-80, Apr. 2019.
  • B. Li B, Z. Fei, Y. Zhang, M. Guizani, "Secure UAV communication networks over 5G," IEEE Wireless Communications, vol.26, no.5, pp.114-20, Jul. 2019.
  • Q. Wang, HN. Dai, H. Wang, G. Xu, AK. Sangaiah, "UAV-enabled friendly jamming scheme to secure industrial Internet of Things," Journal of Communications and Networks, vol.21, no.5, pp.481-90, Aug. 2019.
  • X. Li, Q. Wang, HN. Dai, H. Wang, "A novel friendly jamming scheme in industrial crowdsensing networks against eavesdropping attack," Sensors, vol.18, no.6, p.1938, Jun. 2018.
  • X. Li, HN. Dai, Q. Wang, M. Imran, D. Li, MA. Imran, "Securing internet of medical things with friendly-jamming schemes," Computer Communications, vol.1, no.160, pp.431-42, Jul. 2020.
  • H. Dang-Ngoc et al., "Secure swarm UAV-assisted communications with cooperative friendly jamming," IEEE Internet of Things Journal, Aug. 2022.
  • J. Kim, PK. Biswas, S. Bohacek, SJ. Mackey, S. Samoohi, MP. Patel, "Advanced protocols for the mitigation of friendly jamming in mobile ad-hoc networks," Journal of Network and Computer Applications, vol.181, 103037, May 2021.
  • TV. Pham, and AT. Pham, "Energy-efficient friendly jamming for physical layer security in visible light communication," In2021 IEEE International Conference on Communications Workshops (ICC Workshops), 2021 Jun 14, pp. 1-6.
  • A. Mostafa, and L. Lampe, "Securing visible light communications via friendly jamming," In 2014 IEEE Globecom Workshops (GC Wkshps), 2014 Dec 8, pp. 524-529.
  • I. Martinovic, P. Pichota, JB. Schmitt, "Jamming for good: a fresh approach to authentic communication in WSNs," In Proceedings of the second ACM conference on Wireless network security, 2009 Mar 16, pp. 161-168.
  • DS. Berger, F. Gringoli, N. Facchi, I. Martinovic, JB. Schmitt, "Friendly jamming on access points: Analysis and real-world measurements," IEEE Transactions on Wireless Communications, vol.15, no.9, pp.6189-202, Jun 2016.
  • DS.Berger DS,F. Gringoli, N. Facchi, I. Martinovic, J. Schmitt, "Gaining insight on friendly jamming in a real-world IEEE 802.11 network," In Proceedings of the 2014 ACM conference on Security and privacy in wireless and mobile networks, 2014. pp. 105-116.
  • P. Kyösti et al., "WINNER II channel models," IST-4-027756 WINNER II D1.1.2 V1.2, 2008.
  • DS. Madara, E. Ataro, S. Sitati, "Design and testing of a mobile-phone-jammer," Innovative systems design and engineering, vol.7, no.7, pp.7-18, 2016.
  • J. Li, X. Lei, PD. Diamantoulakis, L. Fan, GK. Karagiannidis, "Security Optimization of Cooperative NOMA Networks With Friendly Jamming," IEEE Transactions on Vehicular Technology, Aug 2022.
  • R. Jin, K. Zeng, K. Zhang, "A reassessment on friendly jamming efficiency," IEEE Transactions on Mobile Computing, vol.20, no.1, pp.32-47, Sep. 2019.
  • J. Kim, and JP. Choi, "Cancellation-based friendly jamming for physical layer security," In 2016 IEEE Global Communications Conference (GLOBECOM), Dec. 2016, pp. 1-6.
  • JP. Vilela, M. Bloch, J. Barros, SW. McLaughlin, "Friendly jamming for wireless secrecy," In 2010 IEEE International Conference on Communications, May. 2010, pp. 1-6.
  • Z. Mobini, M. Mohammadi, C. Tellambura, "Wireless-powered full-duplex relay and friendly jamming for secure cooperative communications," IEEE Transactions on Information Forensics and Security, vol.14, no.3, pp.621-34, Jul. 2018.
  • W. Shen, P. Ning, X. He, H. Dai, "Ally friendly jamming: How to jam your enemy and maintain your own wireless connectivity at the same time," In 2013 IEEE Symposium on Security and Privacy, May 2013, pp. 174-188.
  • I. Stanojev, and A. Yener, "Improving secrecy rate via spectrum leasing for friendly jamming," IEEE Transactions on Wireless Communications, vol.12, no.1, pp.134-45, Dec. 2012.
  • NO. Tippenhauer, L. Malisa, A. Ranganathan, S. Capkun, "On limitations of friendly jamming for confidentiality," In 2013 IEEE symposium on security and privacy, 2013 May 19, pp. 160-173.
  • JP. Vilela, M. Bloch, J. Barros, SW. McLaughlin, "Wireless secrecy regions with friendly jamming," IEEE Transactions on Information Forensics and Security, vol.6, no.2, pp.256-66, Feb. 2011.
  • O. Yaman, A. Eroglu and E. Onur, "Density-aware cell zooming," 2018 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN), 2018, pp. 1-8, doi: 10.1109/ICIN.2018.8401612.
  • A. Eroğlu, O. Yaman, E. Onur, "Density-aware cellular coverage control: Interference-based density estimation," Computer Networks, vol.165, no.106922, Dec. 2019.
There are 27 citations in total.

Details

Primary Language English
Subjects Computer Software
Journal Section Research Article
Authors

Okan Yaman 0000-0001-7292-2344

Tolga Ayav 0000-0003-1426-5694

Yusuf Murat Erten 0000-0001-9537-7414

Publication Date March 10, 2023
Submission Date October 26, 2022
Published in Issue Year 2023 Volume: 12 Issue: 1

Cite

IEEE O. Yaman, T. Ayav, and Y. M. Erten, “A Lightweight Self-Organized Friendly Jamming”, IJISS, vol. 12, no. 1, pp. 13–20, 2023, doi: 10.55859/ijiss.1194643.

Cited By