wireless secrecy regions with friendly jammingjpvilela/publications/ieeetifs-secrecyregions.pdf ·...

11
1 Wireless Secrecy Regions with Friendly Jamming Jo˜ ao P. Vilela, Matthieu Bloch, Jo˜ ao Barros, Steven W. McLaughlin Abstract— Inspired by recent results on information-theoretic security, we consider the transmission of confidential messages over wireless networks, in which the legitimate communication partners are aided by friendly jammers. We characterize the security level of a confined region in a quasi-static fading environment by computing the probability of secrecy outage in connection with two new measures of physical-layer security: the jamming coverage and the jamming efficiency. Our analysis for various jamming strategies based on different levels of channel state information provides insight into the design of optimal jamming configurations and shows that a single jammer is not sufficient to maximize both figures of merit simultaneously. Moreover, a single jammer requires full channel state information to provide security gains in the vicinity of the legitimate receiver. I. I NTRODUCTION Today’s networks are secured essentially by means of encryption algorithms that are executed at the upper layers of the protocol architecture. These primitives are designed and implemented assuming data is error-free, an abstraction enabled by the use of error-correcting codes at the physical layer. In contrast, several information-theoretic results, based on Wyner’s wiretap channel model [2], support the idea that there is much to be gained from coding not just for error correction but also for security at the physical layer. “Physical- layer security” has thus known a growing interest in the past few years, motivated in large part by applications to wireless communications. A substantial body of work lays its foundation on the Gaussian wiretap channel [3], in which the channel between the legitimate partners and the eavesdropper’s channel are additive white Gaussian noise (AWGN) channels. For this model, the secrecy capacity, defined as the maximum transmis- sion rate at which the eavesdropper is unable to acquire any information, can be obtained from the signal-to-noise ratios (SNRs) of the receivers by subtracting the Shannon capacity of the eavesdropper’s channel to the Shannon capacity of the legitimate receiver’s channel. This work was partly supported by the Fundac ¸˜ ao para a Ciˆ encia e Tecnologia (Portuguese Foundation for Science and Technology) under grants SFRH/BD/28056/2006 and PTDC/EIA/71362/2006. Part of this work was presented at the IEEE International Conference on Communications[1]. Jo˜ ao P. Vilela ([email protected]) is with Instituto de Telecomunicac ¸˜ oes, Departamento de Ciˆ encia de Computadores, Faculdade de Ciˆ encias, Univer- sidade do Porto, rua do Campo Alegre 1021/1055, 4169-007, Porto, Portugal. Matthieu Bloch ([email protected]) is with the School of ECE, Georgia Institute of Technology, Atlanta, USA and GT-CNRS UMI 2958, 2-3 rue Marconi, 57070 Metz, France. Jo˜ ao Barros ([email protected]) is with Instituto de Telecomunicac ¸˜ oes, De- partamento de Engenharia Electrot´ ecnica e de Computadores, Faculdade de Engenharia, Universidade do Porto, rua Dr. Roberto Frias s/n, 4200-465, Porto, Portugal. Steven W. McLaughlin ([email protected]) is with the School of ECE, Georgia Institute of Technology, Atlanta, GA 30332–0250, USA. Several fading models have been considered to generalize the Gaussian wiretap channel model. For quasi-static fading models, [4], [5] provide a detailed characterization in terms of the probability of outage of secrecy capacity and show that fading alone guarantees that information-theoretic secu- rity is achievable, even when the eavesdropper has a better average SNR than the legitimate receiver. For ergodic fading models, [6], [7], [8], [9] provide the secrecy capacity under different levels of channel state information (CSI) and the corresponding optimal power and rate allocation. The wiretap channel with multiple antennas is analyzed in [10], [11], [12]. Secrecy rate can be increased in two ways: (a) by improving the SNR of the legitimate receiver (e.g. by shortening the distance to the transmitter) or (b) by reducing the SNR of the eavesdropper (e.g. by adding controlled interference). Interference then emerges as a valuable resource for wireless security. From the point of view of the attacker, correlated jam- ming techniques are known to cause severe disruption of the communications flow by exploiting the available information on the transmitted signals [13]. However, jamming can also be used by the legitimate communication partners to increase the noise level of the eavesdropper and ensure higher secure communication rates. This idea has already appeared in the literature under the name of artificial noise [14] or cooperative jamming [15], and has been used in other contexts, such as secure relaying [16]. To develop our understanding of the benefits of jamming for secure communications in wireless networks, we make the following contributions: Security measures for jamming: we introduce the jam- ming coverage and the jamming efficiency as security measures; Jamming strategies: we characterize the secrecy outage probability for three jamming strategies that rely on various levels of channel state information (CSI); Effect of CSI on secrecy: we analyze how the variation of jammer location and power affects the coverage and efficiency for jamming strategies with different CSI re- quirement; Multiple jammers: we evaluate the effect of additional jammers on the security of the wireless system. Our work differs from previous studies of jamming for secure communications [15], [16] because it puts forward two new aspects that were not previously accounted for: CSI : we study the effect of access to CSI and show that it has a profound impact on secrecy. In particular, CSI about the legitimate receiver’s channel helps the jammer mitigate harmful interference whereas CSI about the eavesdropper’s channel help the jammer identify when to impact the eavesdropper;

Upload: others

Post on 27-Sep-2020

5 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Wireless Secrecy Regions with Friendly Jammingjpvilela/publications/ieeetifs-secrecyregions.pdf · jamming coverage and the jamming efficiency. Our analysis for various jamming strategies

1

Wireless Secrecy Regions with Friendly JammingJoao P. Vilela, Matthieu Bloch, Joao Barros, Steven W. McLaughlin

Abstract— Inspired by recent results on information-theoreticsecurity, we consider the transmission of confidential messagesover wireless networks, in which the legitimate communicationpartners are aided by friendly jammers. We characterize thesecurity level of a confined region in a quasi-static fadingenvironment by computing the probability of secrecy outage inconnection with two new measures of physical-layer security: thejamming coverage and the jamming efficiency. Our analysis forvarious jamming strategies based on different levels of channelstate information provides insight into the design of optimaljamming configurations and shows that a single jammer isnot sufficient to maximize both figures of merit simultaneously.Moreover, a single jammer requires full channel state informationto provide security gains in the vicinity of the legitimate receiver.

I. INTRODUCTION

Today’s networks are secured essentially by means ofencryption algorithms that are executed at the upper layersof the protocol architecture. These primitives are designedand implemented assuming data is error-free, an abstractionenabled by the use of error-correcting codes at the physicallayer. In contrast, several information-theoretic results, basedon Wyner’s wiretap channel model [2], support the idea thatthere is much to be gained from coding not just for errorcorrection but also for security at the physical layer. “Physical-layer security” has thus known a growing interest in the pastfew years, motivated in large part by applications to wirelesscommunications.

A substantial body of work lays its foundation on theGaussian wiretap channel [3], in which the channel betweenthe legitimate partners and the eavesdropper’s channel areadditive white Gaussian noise (AWGN) channels. For thismodel, the secrecy capacity, defined as the maximum transmis-sion rate at which the eavesdropper is unable to acquire anyinformation, can be obtained from the signal-to-noise ratios(SNRs) of the receivers by subtracting the Shannon capacityof the eavesdropper’s channel to the Shannon capacity of thelegitimate receiver’s channel.

This work was partly supported by the Fundacao para a Ciencia eTecnologia (Portuguese Foundation for Science and Technology) under grantsSFRH/BD/28056/2006 and PTDC/EIA/71362/2006. Part of this work waspresented at the IEEE International Conference on Communications[1].Joao P. Vilela ([email protected]) is with Instituto de Telecomunicacoes,Departamento de Ciencia de Computadores, Faculdade de Ciencias, Univer-sidade do Porto, rua do Campo Alegre 1021/1055, 4169-007, Porto, Portugal.Matthieu Bloch ([email protected]) is with the School of ECE, GeorgiaInstitute of Technology, Atlanta, USA and GT-CNRS UMI 2958, 2-3 rueMarconi, 57070 Metz, France.Joao Barros ([email protected]) is with Instituto de Telecomunicacoes, De-partamento de Engenharia Electrotecnica e de Computadores, Faculdade deEngenharia, Universidade do Porto, rua Dr. Roberto Frias s/n, 4200-465, Porto,Portugal.Steven W. McLaughlin ([email protected]) is with the School of ECE,Georgia Institute of Technology, Atlanta, GA 30332–0250, USA.

Several fading models have been considered to generalizethe Gaussian wiretap channel model. For quasi-static fadingmodels, [4], [5] provide a detailed characterization in termsof the probability of outage of secrecy capacity and showthat fading alone guarantees that information-theoretic secu-rity is achievable, even when the eavesdropper has a betteraverage SNR than the legitimate receiver. For ergodic fadingmodels, [6], [7], [8], [9] provide the secrecy capacity underdifferent levels of channel state information (CSI) and thecorresponding optimal power and rate allocation. The wiretapchannel with multiple antennas is analyzed in [10], [11], [12].

Secrecy rate can be increased in two ways: (a) by improvingthe SNR of the legitimate receiver (e.g. by shortening thedistance to the transmitter) or (b) by reducing the SNRof the eavesdropper (e.g. by adding controlled interference).Interference then emerges as a valuable resource for wirelesssecurity. From the point of view of the attacker, correlated jam-ming techniques are known to cause severe disruption of thecommunications flow by exploiting the available informationon the transmitted signals [13]. However, jamming can alsobe used by the legitimate communication partners to increasethe noise level of the eavesdropper and ensure higher securecommunication rates. This idea has already appeared in theliterature under the name of artificial noise [14] or cooperativejamming [15], and has been used in other contexts, such assecure relaying [16].

To develop our understanding of the benefits of jammingfor secure communications in wireless networks, we make thefollowing contributions:

• Security measures for jamming: we introduce the jam-ming coverage and the jamming efficiency as securitymeasures;

• Jamming strategies: we characterize the secrecy outageprobability for three jamming strategies that rely onvarious levels of channel state information (CSI);

• Effect of CSI on secrecy: we analyze how the variationof jammer location and power affects the coverage andefficiency for jamming strategies with different CSI re-quirement;

• Multiple jammers: we evaluate the effect of additionaljammers on the security of the wireless system.

Our work differs from previous studies of jamming forsecure communications [15], [16] because it puts forward twonew aspects that were not previously accounted for:

• CSI: we study the effect of access to CSI and showthat it has a profound impact on secrecy. In particular,CSI about the legitimate receiver’s channel helps thejammer mitigate harmful interference whereas CSI aboutthe eavesdropper’s channel help the jammer identify whento impact the eavesdropper;

Page 2: Wireless Secrecy Regions with Friendly Jammingjpvilela/publications/ieeetifs-secrecyregions.pdf · jamming coverage and the jamming efficiency. Our analysis for various jamming strategies

2

• fading: our models incorporate the effect of multipathfading. In a fading environment, there is always a non-zero probability that the jammer-eavesdropper channel isstronger than the jammer-receiver channel, irrespectiveof the distance. This becomes particularly relevant ifCSI is available and favors the detection of jammingopportunities.

The remainder of the paper is organized as follows. InSection II, we present the system setup and we introduce thenotions of secrecy outage probability, jamming coverage andjamming efficiency. Section III extends the concept of secrecyoutage probability to scenarios in which a friendly jammer isavailable and characterizes the performance different jammingstrategies that rely on distinct CSI requirements. The effect ofvarying location and transmission power of the jammer on theperformance of such strategies is evaluated in Section IV. Thecase of multiple jammers is considered in Section V. Finally,Section VI concludes the paper.

II. PRELIMINARIES

We consider a setup in which a transmitter and the corre-sponding receiver are located in a confined region (say a build-ing or a conference room) and wish to communicate securelyin the presence of an illegitimate receiver, hereafter called theeavesdropper. In addition, a set of N nodes, hereafter calledjammers, emit white Gaussian noise that causes interferenceto both the legitimate receiver and the eavesdropper. Channelsbetween all pair of nodes are modeled as independent quasi-static Rayleigh fading channels; the transmitter is subjectto the short term average-power constraint Pt whereas eachjammer is subject to a short-term average power constraintPj . Specifically, for each channel, fading coefficients remainconstant during the transmission of an entire codeword butthey change randomly and independently from one codewordto another according to a complex Gaussian distribution withvariance c/dα, where d is the distance between the two nodes,α is the path-loss exponent, and c is a normalization constant.We let djr and dtr denote the distances from jammer j (1 ≤j ≤ N ) to the receiver and from the transmitter to the receiver,respectively, and we introduce the dimensionless constantscjr =

PjN0

cdαjr

and ctr = PtN0

cdαtr

. Then, the instantaneous signal-to-interference-plus-noise ratio (SINR) at the receiver is therandom variable

Γr =ctrGtr

1 + ΣNj=1cjrGjr, (1)

where Gtr and Gjr are independent exponential randomvariables with unit mean. Similarly, we let dje and dte denotethe distances from the jammer j to the eavesdropper andfrom the transmitter to the eavesdropper, respectively, and weintroduce the constants cje =

PjN0

cdαje

and cte = PtN0

cdαte

. Theinstantaneous SINR at the eavesdropper is the random variable

Γe =cteGte

1 + ΣNj=1cjeGje, (2)

where Gte and Gje are also exponential random variableswith unit mean. For a given realization (γr,γe) of (Γr,Γe),

the instantaneous secrecy capacity [3] of the channel betweenthe transmitter and the legitimate receiver is

Cs = max(Cr − Ce, 0),

where Cr = log(1 + γr) is the capacity of the legitimatereceiver channel and Ce = log(1 + γe) denotes the capacityof the eavesdropper’s channel. In presence of fading, thesecapacities can be treated as random variables that vary withthe instantaneous signal-to-noise ratio.

We assume that the transmitter knows the instantaneousreceived SINR of the legitimate receiver, so that both can agreeon a code with secrecy rate Rs. Communication is secure ifthe instantaneous secrecy capacity Cs is higher than the targetsecrecy rate Rs. If Cs < Rs, then security is compromised andwe can say that a secrecy outage occurs. The secrecy outageprobability was introduced in [14], [4] to evaluate the securityof wireless communication systems and is defined as

Pout(Rs) = P [Cs < Rs] = P [Cr − Ce < Rs]

= P [log(1 + Γr)− log(1 + Γe) < Rs].

The operational meaning of this measure is twofold [5]. First,it provides the fraction of fading realizations for which thewireless channel can support a secure rate of Rs bits/channeluse. Second, it provides a security metric for the situationin which the transmitter and receiver have no CSI about theeavesdropper. In this case, the transmitter has no choice but toset the secrecy rate to a constant Rs, thus implicitly assumingthat the instantaneous capacity of the eavesdropper channel isat least C ′e = Cr − Rs. Notice that, to obtain low values ofsecrecy outage probability, the eavesdropper must be locatedfar away from the communicating nodes, and there is a largearea where the eavesdropper could compromise the secrecyof the system. The interference created by the jammer canpotentially lead to smaller secrecy outage probability, evenfor situations in which the eavesdropper is not far from thetransmitter or receiver.

To distinguish the cases with jamming (Pj > 0) andwithout jamming (Pj = 0), we add the superscripts j andnj, respectively, unless it is obvious from the context. Forexample, the secrecy outage probability without jamming isdenoted as Pnjout whereas the capacity of the legitimate receiverchannel with a jammer is denoted by Cjr .

A. Performance Measures

To analyze the effect of jamming on security, we focus onthe ratio between the secrecy outage probability without and

with jamming ∆Pout =PnjoutPjout

. This measure of security cap-

tures the reduction in the secrecy outage probability introducedthe jammer, and should be as large as possible.

The helpful interference region is defined as the set ofeavesdropper’s positions (xe, ye) for which ∆Pout(xe, ye) >1.0. Similarly, the harmful interference region is the set ofeavesdropper’s positions (xe, ye) that satisfy ∆Pout(xe, ye) ≤1.0. Our measures of interest are (a) the jamming coverage, de-fined as the total area of the helpful interference region, and (b)the jamming efficiency, defined as the average ∆Pout(xe, ye)

Page 3: Wireless Secrecy Regions with Friendly Jammingjpvilela/publications/ieeetifs-secrecyregions.pdf · jamming coverage and the jamming efficiency. Our analysis for various jamming strategies

3

over all (xe, ye) belonging to a confined region R. For a givensystem setup (i.e. location and power of source and jammers,and location of receiver and eavesdroppers), ∆Pout is an exactvalue obtained analytically with the formulas of Section III.In general, jamming coverage and jamming efficiency cannotbe obtained in closed form; we evaluate them numericallyby spatial sampling. For each location of the eavesdropper∆Pout is calculated and the corresponding samples containing∆Pout for all eavesdropper locations are then used to derivethe jamming coverage and efficiency.

Ideally, we would like to maximize jamming coverage,while ensuring high jamming efficiency. We will see that, ingeneral, this goal cannot be achieved with a single jammer.

B. Jamming strategies

Several jamming strategies have already been investigated inthe literature, such as strategies based on Gaussian noise [14],[16], Gaussian codebooks [15], [17] or more structured code-books based on lattices [18]. The latter strategies have beenshown to outperform jamming with Gaussian noise for situ-ations in which the jammer has access to perfect CSI for allchannels, and a comprehensive survey of these techniques canbe found in [19].

To analyze how the availability of CSI affects the secrecybenefits of jamming, we restrict ourselves to the simplestjamming strategy, in which the jammer emits white Gaussiannoise. While we do not claim that this choice is necessarilyoptimal, we note that jamming noise is still relevant from apractical standpoint because it does not require interferingsignals to be perfectly synchronized when they reach theeavesdropper’s device.

III. WIRELESS SECRECY WITH ONE JAMMER

A. Secrecy Outage Probability for Blunt Jamming

In this section, we consider the situation in which the jam-mer emits white Gaussian noise with variance Pj at all times.We call this jammer a blunt jammer because it disregards anypossible CSI and transmits at a constant power Pblunt = PJ .

Proposition 1: The secrecy outage probability for the bluntjammer is given by

P [Cs < R] = 1− e−κ

cjrcje

cje(κ+ 1

cjr− β

cje

) +e−κ

cjrcje(3)

×(κ+ 1

cjr− β

cje

)−2[β(κ+ 1

cjr− β

cje+ 1)× Ω

(1+βcje

)+(κ+ 1

cjr− β

cje− β

)× Ω

(1+ββ

(κ+ 1

cjr

))]

with κ =eR − 1

ctr, β = eR

ctectr

and Ω(x) = exE1(x) 1.

Proof: See Appendix AThe effect of blunt jamming on the secrecy outage prob-

ability is illustrated in Figure 1, in which each point repre-sents a potential location of the eavesdropper and shows the

1E1(x) represents the exponential integral – a non-elementary function

given by the integral∫ ∞x

e−t

tdt. This integral is easily computable numer-

ically.

−5 0 5

−5

0

5

Tx

Rx

J

0.0

0.4

0.7

1.1

1.4

1.8

2.1

2.5

2.8

3.2

∆Pout

Fig. 1. Example of the impact of blunt jamming on the secrecy outageprobability. For each position of the eavesdropper on the map, we computethe factor of change of the secrecy outage probability with blunt jamming,∆Pout. The locations of the transmitter (Tx), receiver (Rx), and jammer (J) are(0,0), (0,-5), and (7,0), respectively. Secrecy outage probabilities are obtainedfor a target secrecy rate Rs = 0.1 and path-loss α = 4. The target secrecyrate is normalized with respect to the capacity of the AWGN channel withthe same average SNR.

corresponding value of ∆Pout. The helpful interference region,delimited by the thick white line around the jammer, is the areawhere the jammer’s interference reduces the secrecy outageprobability. The harmful interference region corresponds tothe area where the jammer’s interference is more harmful tothe legitimate receiver than the jammer. The lighter the regionaround the jammer, the smaller the secrecy outage probability.For example, if the eavesdropper is located close to the jammerat the position (6, 0), jamming reduces the secrecy outageprobability from 0.39 to 0.12 (i.e. ∆Pout = 3.25).

Understanding the trade-off between these two types ofinterference and the impact of CSI is crucial. Factors suchas received power and distance, as well as channel qualityfrom the jammer to other nodes play an important rolein securing the wireless system. This observation calls forjamming strategies that dynamically adjust to the environmentand whose goal is to maximize the helpful interference regionwhile keeping the harmful interference region constrained.

B. Jamming Strategies

In this section we characterize alternative jamming strate-gies that rely on different levels of CSI.

1) Cautious Jamming: A cautious jammer takes advantageof the knowledge of the CSI between itself and both thelegitimate receiver and the eavesdropper and decides oppor-tunistically when to jam. It jams whenever it has a highergain to the eavesdropper than to the legitimate receiver, andswitches off otherwise. The power transmitted by a cautiousjammer Pcautious is then given by

Pcautious =

PJ ifGjrdαjr

<Gjedαje

0 otherwise.

Proposition 2: The secrecy outage probability for the cau-

Page 4: Wireless Secrecy Regions with Friendly Jammingjpvilela/publications/ieeetifs-secrecyregions.pdf · jamming coverage and the jamming efficiency. Our analysis for various jamming strategies

4

tious jammer is given by

P [Cs < R] = 1− e−κ

λ(1 + β)+e−κβ

cjrcje

(Ω(ν)− Ω(µρ)

ξ

)+ e−κβcjrcje

(ηξ−Ω(µρ(1−η)+ην)(µ−ηξ)

ξ2(µ−ηξ) − Ω(µρ)(µ−ηξ)(ηµρ−ην−1)

ξ2(µ−ηξ)

)− e−κ

cjrcjeη(η(β + 1)− 1)

(Ω(µρ(1−η)+ην)−Ω(µρ)

ηξ

)− e−κβcjrcje

(ξ−Ω(ν)(µ−ξ)−Ω(µρ)(µ−ξ)(µρ−ν−1)

ξ2(µ−ξ)

)

where δ =

(djrdje

)α, λ =

2 if δ ≤ 11 + δ δ > 1

and

η =

cje

cje+βcjrif δ ≤ 1

cjecje+βcjrδ

δ > 1.

The variables κ and β are defined as in Proposition 1, and

ξ =

(κ+

1

cjr− β

cje

), ν =

(1 + β

cje

), µ =

(κ+

1

cjr

)and ρ =

(1 + β

β

).

Proof: See Appendix B.2) Adaptive Jamming: An adaptive jammer has CSI about

the channel to the legitimate receiver only. This strategy corre-sponds to a situation in which the eavesdropper intercepts thecommunications without providing any sign of its presence.In this case, the jammer defines a threshold for the channelquality τ , above which it will stop jamming since it is likelythat his induced noise will hurt the legitimate receiver morethan a potential eavesdropper. The transmission power of thejammer, Padaptive, is then given by

Padaptive =

PJ if Gjr < τ0 otherwise

Proposition 3: The secrecy outage probability for the adap-tive jammer is given by

P [Cs < R] = 1− e−τe−κ

1 + β+e−κβ

cjrcje

(Ω(ν)− Ω(µρ)

ξ

)− e−κβcjrcje

(ξ−Ω(ν)(µ−ξ)−Ω(µρ)(µ−ξ)(µρ−ν−1)

ξ2(µ−ξ)

)− e−κβ e

−µcjrτ (1+cjrτ)

cjrcje

(Ω(ν+β

cjrcje

τ)−Ω(µρ+µcjrτ)

ξ

)

− e−κβ e

−µcjrτ

cjrcje

[Ω(µρ+µcjrτ)(µ−ξ)(µρ−ν+τcjr(µ− β

cje)−1)

ξ2(µ−ξ)

−ξ−Ω(ν+β

cjrcje

τ)(µ−ξ)

ξ2(µ−ξ)

]where κ and β are defined as in Proposition 1, and ξ, ν, µ

and ρ are defined as in Proposition 2.Proof: See Appendix B.

IV. IMPACT OF CHANNEL STATE INFORMATION ONSECRECY

Although the jammer can have an adverse effect on thelegitimate receiver, a careful selection of the location andtransmission power can enhance security by causing controlledinterference to the eavesdropper. Figure 2 shows an example ofthe potential benefits of increased transmit power for a specificlocation of the jammer. Notice that up to a certain jammingpower, the efficiency increases without a significant loss of

−15 −10 −5 0 5 10 15 20 25J amming Power (dB)

0.85

0.90

0.95

1.00

1.05

1.10

1.15

JammingEfficiency

BluntCautiousAdaptive (τ =0.3)Adaptive (τ =0.5)Adaptive (τ =0.8)

(a) Efficiency

−15 −10 −5 0 5 10 15 20 25J amming Power (dB)

0

50

100

150

200

250

300

Jam

min

gC

over

age

(m2 )

BluntCautiousAdaptive (τ = 0.3)Adaptive (τ = 0.5)Adaptive (τ = 0.8)

(b) Coverage

Fig. 2. This figure shows an example of the effect of varying the transmitpower of the jammer on the jamming coverage and efficiency for a specificlocation of the jammer (xj = 0, yj = 2).

coverage. However, the exact tradeoff between coverage andefficiency depends on the jamming strategy used. In theremainder of this section, we analyze how the variation ofjammer location and transmission power affects coverage andefficiency for the various jamming strategies, in connectionwith their requirements in terms of CSI.

A. System Setup and Measure Computation

We consider a scenario in which the transmitter and thereceiver are located in a confined area (say a building ora conference room) and wish to communicate securely withthe aid of a friendly jammer. In particular, any eavesdropperlocated within the confined region should not be able to extractmuch information from the intercepted signals. To model thewireless nature of the medium, we set the path loss exponentto 4 and the normalization constant c to the free-space pathgain for 2.4 GHz transmission at the reference distance of1 m, which is common for micro-cellular systems [20]. Thetransmitter and receiver are fixed at locations of (0, 0) and(0,−5), respectively. The target secure transmission rate is

Page 5: Wireless Secrecy Regions with Friendly Jammingjpvilela/publications/ieeetifs-secrecyregions.pdf · jamming coverage and the jamming efficiency. Our analysis for various jamming strategies

5

−5 0 5

−5

0

5

Tx

Rx

J

0

180

300

Coverage(m

2 )

(a) Coverage

−5 0 5

−5

0

5

Tx

Rx

J

0.0

1.1

2.0

Efficiency

(b) Efficiency

Fig. 3. Figures (a) and (b) illustrate the value of coverage and efficiencyobtained for various jammer locations. J indicates the optimal placement of thejammer. The maximum coverage results from Pj = 10dBm and the maximumefficiency from Pj = 10dB. Regions where placing a jammer leads to acoverage above 180 m2 and efficiency above 1.1 are also shown in lightgray.

set to 10% of the capacity of the AWGN channel with thesame average SNR. All nodes can transmit with power up to10 dB, and the transmitter employs a fixed power Pt = 3 dB.

We consider the confined region R = [−8.5, 8.5] m ×[−8.5, 8.5] m, and a sampling interval for the locations ofthe eavesdropper of 0.18m. This results in 9025 samplesof eavesdropper locations being considered for each systemsetup. The jamming coverage and efficiency thus provide ameasure to assess the security benefits of a particular jammerconfiguration (location and transmit power), irrespectively ofthe location of the eavesdropper. To analyze the effect ofdifferent jamming configurations, for each strategy we selecta sample of locations on a grid and, for each location, weconsider 30 different levels of transmit power, from 10 dBm to10 dB. From this set, we consider the optimal configurationsof each strategy, i.e. the location and power of the jammerthat, for a given strategy, leads to the largest coverage andefficiency. Using the optimal configurations, we compare thedifferent jamming strategies under identical system conditions.

B. Jamming Coverage

First, we analyze the effect of different jamming configura-tions on coverage. The configurations maximizing coveragedepend on the jamming strategy, but for all strategies, thelargest coverage is achieved with low transmit power by thejammer. Moreover, since proximity to the legitimate receiveris harmful, all strategies lead to regions where placing thejammer provides maximum coverage in the upper part ofthe confined region. Figure 3(a) shows such region and thecorresponding maximum coverage location for blunt jamming.Cautious jamming leads to a larger coverage than bluntjamming by using CSI to encompass locations in which theeavesdropper is further away. In the case of adaptive jamming,which is based solely on CSI for the channel to the legitimatereceiver, the location and transmit power of the jammer can beadjusted to provide large coverage, albeit with a cost in termsof efficiency.

Figure 4 compares the different strategies with optimalcoverage configurations. Namely, it depicts the area (y axis)over which a given strategy is able to achieve a ∆Pout above

1.0 1.2 1.4 1.6 1.8 2.0 2.2∆ Pout larger than

10−1

100

101

102

103

Area(m

2 )

BluntCautiousAdaptive (τ =0.3)Adaptive (τ =0.5)Adaptive (τ =0.8)

Fig. 4. Comparison between the three strategies for the jammer location ofFigure 3(a). The plot shows the area of eavesdropper locations leading to a∆Pout above a certain value (x axis). The zoomed area at ∆Pout = 1 showsthe coverage attained by each strategy, namely 197 m2 - blunt, 278 m2 -cautious, 283 m2 - adaptive (τ = 0.3), 267 m2 - adaptive (τ = 0.5) and249 m2 - adaptive (τ = 0.8).

a certain value (x axis). The figure shows that althoughall strategies provide large coverage (the lowest being bluntjamming with a coverage of 197 m2), only low values of∆Pout are achieved and over small regions. For example, noneof the strategies is able to reduce the secrecy outage by half(∆Pout = 2). This happens because the jammer employs lowtransmit power on these optimal configurations, thus resultingin little interference to eavesdroppers. As we will see with theoptimal efficiency configurations, a controlled increase of thetransmit power of the jammer can lead to higher ∆Pout values.

C. Jamming Efficiency

Locations where placing a jammer provides the largestefficiencies appear close to the source, yet tending towardsthe opposite direction of the main receiver, as illustrated inFigure 3(b) for the case of blunt jamming. This is natural, sinceit is close to the source that the secrecy outage probability ishigher and, therefore, the jammer is able to provide highestsecurity benefits. The harmful effect of the jammer when closeto the receiver makes the region asymmetric with respect tothe source. For the three strategies, the optimal configurationsalso result from the jammer employing higher transmit powers(Pj = 10 dB), whenever active, thus leading to increasedinterference to possible eavesdroppers.

Figure 5 compares the optimal efficiency configurations forthe three strategies. As expected, blunt jamming provides thelowest coverage, but the highest efficiency. Cautious jam-ming leads to a smaller efficiency over large regions, andthe operation of adaptive jamming can be adjusted with thetypical coverage-efficiency trade-off. Notice that, apart fromthe advantage in efficiency, blunt jamming also leads to amuch higher maximum ∆Pout value. In particular, this strategyis able to reduce the secrecy outage probability by at least one

Page 6: Wireless Secrecy Regions with Friendly Jammingjpvilela/publications/ieeetifs-secrecyregions.pdf · jamming coverage and the jamming efficiency. Our analysis for various jamming strategies

6

1 2 3 4 5 6 7 8∆ Pout larger than

10−1

100

101

102

103

Area(m

2 )

BluntCautiousAdaptive (τ =0.3)Adaptive (τ =0.5)Adaptive (τ =0.8)

Fig. 5. Comparison between the three jamming strategies for the maximumefficiency configurations of the jammer. The plot shows the area of eavesdrop-per locations leading to a ∆Pout above a certain value (x axis). The zoomedarea at ∆Pout = 1 shows the coverage attained by each strategy, namely 174m2 - blunt, 271 m2 - cautious, 264 m2 - adaptive (τ = 0.3), 246 m2 -adaptive (τ = 0.5) and 223 m2 - adaptive (τ = 0.8).

half (∆Pout > 2) in a region of 15 m2. This shows that thisstrategy excels in terms of jamming efficiency.

D. Relevance of CSI

Irrespectively of the jamming strategy considered, the opti-mal configurations of the jammer favor a large distance tothe receiver. In such cases, we have seen that CSI provesuseful to provide large coverage, although it fails to providedesirable ∆Pout values, therefore resulting in low jammingefficiency. Although a precise analytical comparison of thejamming strategies seems beyond reach, it is possible toestablish generic ordering results that confirms the effect ofCSI and the inherent tradeoff between coverage and efficiency.

Proposition 4: Let C(·) denote the coverage of a jammingstrategy. The strategies satisfy the following coverage order-ing:

C(Blunt) = C(Adaptive with τ →∞) ≤C(Cautious) ≤ C(Adaptive with τ → 0)

Proof: As τ → ∞, the probability that the jammeris active under adaptive jamming tends to 1. This limitingcase is therefore equivalent to blunt jamming and C(Blunt) =C(Adaptive with τ → ∞), which could also be verified bytaking the limit τ →∞ in Proposition 3.

Cautious jamming avoids situations in which jamming hurtsthe legitimate receiver more than the eavesdropper. Assumethat the realization of the channel gains gtr and gte is such thatctrgtr ≥ ctegte so that there is no outage without jamming.Since a cautious jammer only jams if cjrgjr ≤ cjegje, then

ctrgtr1 + cjrgjr

≥ ctegte1 + cjegje

,

and there is no outage with cautious jamming either. Therefore,unlike blunt jamming, cautious jamming never creates anoutage unless the system is already in outage without jamming.Consequently, the coverage of cautious jamming can onlyexceed that of blunt jamming and C(Blunt) ≤ C(Cautious).

Finally, we show that as τ → 0, adaptive jamming achievesfull coverage. In fact, the probability of outage with adaptivejamming and no jamming differ only in the term

P

[ctrGtr

1 + cjrGjr<

cteGte1 + cjeGje

|Gjr < τ

],

which can be bounded as

P

[ctrGtr

1 + cjrGjr<

cteGte1 + cjeGje

|Gjr < τ

]≤ P

[ctrGtr

1 + cjrτ<

cteGte1 + cjeGje

|Gjr < τ

]≤ P [ctrGtr < cteGte]

for τ small enough. Note that the last inequality only holds be-cause of the fading term Gte. Therefore, C(Adaptive with τ →0) = 100% and C(Cautious) ≤ C(Adaptive with τ → 0).

Note that the only way to avoid harming the receiver morethan the eavesdropper at all times would be to exploit theknowledge of CSI for all channels. Consequently, cautious andadaptive jamming, which do not exploit CSI for the channelsfrom the transmitter to the receiver and the eavesdropper, areunable to detect all favorable jamming opportunities. Thisexplains the lower values of ∆Pout and the resulting lowerefficiencies achieved by these strategies.

Even with partial information, the benefit of CSI becomesapparent when the jammer is closer to the legitimate receiver.Figure 6(a) illustrates the effect of increased distance betweenthe jammer and the legitimate receiver on coverage. Forall strategies, the coverage grows with increased distance.However, cautious jamming is able to sustain a large coverageeven at small distances to the receiver. This happens becausethis strategy uses CSI to reduce the impact on the legitimatereceiver. In terms of efficiency, Figure 6(b) shows that theconservative approach of cautious jamming again leads tobetter results at smaller distances. As distance increases, theimpact of the jammer on the legitimate receiver is lower andthe strategy of cautious jamming becomes less useful, even-tually getting surpassed by a simpler approach such as bluntjamming. This result highlights once more the importance ofCSI to improve secrecy, most notably in the vicinity of thelegitimate receiver.

V. MULTIPLE JAMMERS

None of the aforementioned strategies is capable of achiev-ing high efficiency over large regions. Furthermore, the strate-gies that are capable to detect beneficial jamming opportunitiesrequire CSI that may not always be available. To overcomethese difficulties, we now extend our analysis to more thanone jammer. Specifically, we provide a characterization ofthe secrecy outage probability for the case of multiple bluntjammers and discuss the effect of having more jammers onthe defined secrecy measures.

Page 7: Wireless Secrecy Regions with Friendly Jammingjpvilela/publications/ieeetifs-secrecyregions.pdf · jamming coverage and the jamming efficiency. Our analysis for various jamming strategies

7

0 2 4 6 8 10Distance to Main Receiver (m)

0

50

100

150

200

250

300

JammingCoverage(m

2 )

BluntCautiousAdaptive (τ = 0.3)Adaptive (τ = 0.5)Adaptive (τ = 0.8)

(a) Coverage vs Distance to Receiver

0 2 4 6 8 10Distance to Main Receiver (m)

0.4

0.5

0.6

0.7

0.8

0.9

1.0

1.1

1.2

JammingEfficiency

BluntCautiousAdaptive (τ = 0.3)Adaptive (τ = 0.5)Adaptive (τ = 0.8)

(b) Efficiency vs Distance to Receiver

Fig. 6. This figure shows the variation of the coverage (a) and the efficiency(b) measures according to the distance to the receiver for optimal powerallocations of the jammer.

A. Secrecy Outage Probability for Multiple Blunt Jammers

Proposition 5: Letting κ =eR − 1

ctr, β = eR

ctectr

and

Ω(x) = exE1(x), the secrecy outage probability for multipleblunt jammers is given by

P [Cs < R] = 1− 1∏j

cjr

1∏j

cje×

∑j

∑j′

1∏l 6=j

(1

clr− 1

cjr

) 1∏l 6=j′

(1

cle− 1

cj′e

) I(j, j′) e−κ

with I(j, j′) given by

• Case 1: κ+1

cjr6= β

cj′e

I(j, j′) =cj′e(

κ+1

cjr

)− β

cj′e

− 1(κ+

1

cjr− β

cj′e

)2

×[κ+

1

cjr− β

cj′e− β

[(κ+

1

cjr

)(1 + β

β

)]− β(

κ+1

cjr− β

cj′e

)2

[κ+

1

cjr− β

cj′e+ 1

(1 + β

cj′e

)

−5 0 5

−5

0

5

Tx

Rx

J

0.0

0.8

1.5

2.2

3.0

3.8

4.5

5.2

6.0

6.8

∆Pout

Coverage =174m2, Efficiency=1.19

(a) Single blunt jammer

−5 0 5

−5

0

5

Tx

Rx

JJ

0.0

0.8

1.5

2.2

3.0

3.8

4.5

5.2

6.0

6.8

∆Pou

t

Coverage =186m2, Efficiency=1.35

(b) Two blunt jammers

Fig. 7. This figure shows the impact of the maximum efficiency configurationsfor the single jammer and the case with two jammers, respectively in (a)and (b). The helpful interference region is delimited by the thick white linesurrounding the jammers.

• Case 2: κ+1

cjr=

β

cj′e

I(j, j′) = − β(κ+ 1

cj′r

) (1− 1 + β

cj′eΩ

(1 + β

cj′e

))

+ 12

1(κ+ 1

cjr

) β(κ+ 1

cjr

)(

1 + 1+βcj′e−(

1+βcj′e

)2

Ω(

1+βcj′e

))Proof: See Appendix C

B. Analysis

Let S be a set of active jammers. When |S| 0, thecapacity of the receiver and eavesdropper channels are likelyto decrease as a result of added interference. In the limit, wehave P [Cs < Rs] → 1, i.e. ∆Pout ≤ 1 across the entireregion. However, we shall see that two jammers and a properallocation of power can lead to significant improvements.

For simplicity, we focus on configurations with only one ortwo jammers, and we distinguish between (a) a regular sce-nario with individual power constraints, and (b) a fair scenarioin which the collective power sum of the jammers is, at most,the same as in the single jammer case, i.e.

∑j Pj ≤ 10W.

Table I shows a comparison of the maximum coverage andmaximum efficiency configurations, for one and two jammers.

1) Coverage: The maximum coverage configurations withtwo jammers are the same for the regular scenario and the fairscenario. This happens because these configurations operate atlow jamming power and therefore, the results are not affectedby the power sum restriction of the fair scenario. It is clear thatmultiple jammers offer some advantage over a single jammer,increasing the secrecy benefits both in terms of efficiencyand coverage, as illustrated by Figure 7. Beyond these gains,multiple jammers also lead to the following benefits:• The area where a jammer is useful without the need of

CSI becomes larger. Specifically, the joint operation ofthe two jammers allows one of them to be located closerto the legitimate receiver, while still achieving significantcoverage results;

• Higher transmit powers can be used by the jammers, thusyielding improved efficiency results.

Page 8: Wireless Secrecy Regions with Friendly Jammingjpvilela/publications/ieeetifs-secrecyregions.pdf · jamming coverage and the jamming efficiency. Our analysis for various jamming strategies

8

TABLE ICOMPARISON BETWEEN CONFIGURATIONS LEADING TO MAXIMUM COVERAGE AND EFFICIENCY RESULTS FOR ONE AND TWO JAMMERS.

Configuration # Jammers Coverage (m2) Efficiency Pj (W)

Maximum Coverage1 197 1.0024 0.012 229 1.0075 [0.01, 0.01]2† 229 1.0075 [0.01, 0.01]

Maximum Efficiency1 174 1.19 102 186 1.35 [9.5, 9.5]2† 157 1.21 [0.5, 9.5]

The case of two jammers considers the regular scenario as well as the fair scenario(†).

1 2 3 4 5 6 7 8∆ Pout larger than

10−1

100

101

102

103

Area(m

2 )

30 m2

15 m2

Blunt: 1 JammerBlunt: 2 JammersBlunt: 2 Jammers Fair

Fig. 8. Comparison between single and multiple blunt jammers for themaximum efficiency configurations of the jammer.

2) Efficiency: Since jamming efficiency increases withhigher jamming power, the fair scenario prevents the twojammers from achieving their full potential; however, twojammers still provide higher efficiency than the single jam-mer. Removing the power sum restriction leads to furtherimprovements and the two jammers outperform the singlejammer, albeit at a cost in terms of energy expenditure.This is consistent with previous results, which show that acontrolled increase in the transmit power of the jammers leadsto improved efficiency results.

Figure 8 shows that along with these efficiency gains, theavailability of more jammers greatly increases the area where arelevant ∆Pout is achieved. For example, the area in which thesecrecy outage probability gets reduced by half (∆Pout > 2)goes from 15 m2 with one jammer to 30 m2 with two jammers.Besides, the availability of more jammers enlarges the areawhere placing a jammer is useful. The potential jammerpositions that fail to provide security benefits occur close to thelegitimate receiver. This is a consequence of the harmful effectof the interference of the jammer on the legitimate receiver,and can be dealt with by employing a more conservativestrategy such as cautious jamming.

VI. CONCLUSIONS

Friendly jamming is a powerful tool to increase the secrecyof wireless systems. Our results show that high transmit power

and proximity to the legitimate receiver can become harmful,but a proper selection of such parameters leads to significantsecrecy gains. Moreover, there is an inherent trade-off betweenthe coverage and efficiency achieved by the jammer, whichis reflected on the different jamming strategies and theirrequirements in terms of CSI. As an example, blunt jammingwithout CSI provides the highest efficiency but fails to achievelarge coverage. By using CSI of the impact of jamming onthe legitimate receiver, adaptive jamming can be adjusted toprovide large coverage yet paying a price in terms of effi-ciency. Cautious jamming highlights the usefulness of CSI byusing full CSI about the impact of the jammer to improve onthe results of the remaining strategies, specifically when closeto the legitimate receiver. Unfortunately, a strategy able todetermine every favorable opportunity to jam requires CSI forall channels, which may not always be available realistically.Our analysis of multiple jammers suggests that the key toachieve high coverage and high efficiency simultaneously liesin having more than one jammer.

Finally, we note that there is still much work to do in evalu-ating the secrecy potential of different spatial configurations. Anatural extension to this work includes analyzing the behaviorof other system parameters, such as the interplay between thesecure communication rate Rs and the transmission power ofthe jammer Pj that guarantees a prescribed level of jammingefficiency.

Acknowledgements

The authors gratefully acknowledge useful discussions withTiago T. V. Vinhoza and Rui A. Costa from Universidade doPorto, Portugal.

REFERENCES

[1] J. P. Vilela, M. Bloch, J. Barros, and S. W. McLaughlin, “Friendlyjamming for wireless secrecy,” in IEEE International Conference onCommunications, Cape Town, South Africa, May 2010.

[2] A. D. Wyner, “The wire-tap channel,” Bell System Technical Journal,vol. 54, pp. 1355–1387, 1975.

[3] S. Leung-Yan-Cheong and M. Hellman, “The Gaussian wire-tap chan-nel,” IEEE Transactions on Information Theory, vol. 24, no. 4, pp. 451–456, July 1978.

[4] J. Barros and M. Rodrigues, “Secrecy capacity of wireless channels,”in Proc. IEEE International Symposium on Information Theory, Seattle,WA, USA, July 2006, pp. 356–360.

[5] M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, “Wire-less information-theoretic security,” IEEE Transactions on InformationTheory, vol. 54, no. 6, pp. 2515–2534, June 2008.

[6] Z. Li, R. Yates, and W. Trappe, “Secrecy capacity of independent parallelchannels,” in Proceedings of the 44th Annual Allerton Conferenceon Communication, Control, and Computing. Monticello, IL, USA,September 2006.

Page 9: Wireless Secrecy Regions with Friendly Jammingjpvilela/publications/ieeetifs-secrecyregions.pdf · jamming coverage and the jamming efficiency. Our analysis for various jamming strategies

9

[7] Y. Liang, H. V. Poor, and S. Shamai, “Secure communication over fadingchannels,” IEEE Transactions on Information Theory, vol. 54, no. 6, pp.2470–2492, June 2008.

[8] P. K. Gopala, L. Lai, and H. E. Gamal, “On the secrecy capacity offading channels,” IEEE Transactions on Information Theory, vol. 54,no. 10, pp. 4687–4698, October 2008.

[9] A. Khisti, A. Tchamkerten, and G. W. Wornell, “Secure broadcast-ing over fading channels,” IEEE Transactions on Information Theory,vol. 54, no. 6, pp. 2453–2469, June 2008.

[10] A. Khisti and G. W. Wornell, “The MIMOME channel,” in Proceedingsof the 45th Annual Allerton Conference on Communication, Control,and Computing. Monticello, IL, USA, September 2007.

[11] F. Oggier and B. Hassibi, “The secrecy capacity of the MIMO wiretapchannel,” in IEEE International Symposium on Information Theory.Toronto, Ontario, Canada, July 2008, pp. 524–528.

[12] S. Shafiee, N. Liu, and S. Ulukus, “Towards the Secrecy Capacityof the Gaussian MIMO Wiretap Channel: The 2-2-1 Channel,” IEEETransactions on Information Theory, vol. 55, no. 9, pp. 4033–4039,September 2009.

[13] M. Medard, “Capacity of Correlated Jamming Channels,” in Proceed-ings of the 35th Allerton Conference on Communication Control andComputing. Monticello, IL, USA, 29 September - 1 October 1997, pp.1043–1052.

[14] S. Goel and R. Negi, “Guaranteeing secrecy using artificial noise,” IEEETransactions on Wireless Communications, vol. 7, no. 6, pp. 2180–2189,June 2008.

[15] E. Tekin and A. Yener, “The General Gaussian Multiple-Access andTwo-Way Wire-Tap Channels: Achievable Rates and Cooperative Jam-ming,” IEEE Transactions on Information Theory, vol. 54, no. 6, pp.2735–2751, June 2008.

[16] L. Lai and H. E. Gamal, “The relay-eavesdropper channel: Cooperationfor secrecy,” IEEE Transactions on Information Theory, vol. 54, no. 9,pp. 4005–4019, September 2008.

[17] X. Tang, R. Liu, P. Spasojevic, and H. V. Poor, “The Gaussian WiretapChannel with a Helping Interferer,” in Proc. IEEE International Sympo-sium on Information Theory, Toronto, Canada, July 2008, pp. 389–393.

[18] X. He and A. Yener, “Providing Secrecy with Lattice Codes,” inProceedings of the 46th Annual Allerton Conference on Communication,Control, and Computing, September 2008, pp. 1199–1206.

[19] ——, “Cooperative Jamming: The Tale of Friendly Interference forSecrecy,” in Securing Wireless Communications at the Physical Layer,R. Liu and W. Trappe, Eds. Springer, 2009, pp. 65–88.

[20] T. S. Rappaport, Wireless Communications: Principles and Practice.Prentice Hall, New Jersey, 1996.

[21] R. K. Mallik, M. Z. Win, J. W. Shao, M.-S. Alouini, and A. J.Goldsmith, “Channel capacity of adaptive transmission with maximalratio combining in correlated Rayleigh fading,” IEEE Transactions onWireless Communications, vol. 3, no. 4, pp. 1124–1133, July 2004.

APPENDIX

A. Proof for Proposition 1

The secrecy outage probability is given by [4]

P [Cs < R] = P [Cr − Ce < R]

which, by using the definitions of Section II yields

P [Cs < R] = P

[Gtr < κ(1 + cjrGjr) + βGte

1 + cjrGjr1 + cjeGje

],

where κ = eR−1ctr

and β = eR ctectr .

Let the pdfs of ξ = gte, ν1 = gjr and ν2 = gje be f(ξ),hm(ν1) and he(ν2), respectively.

Since the pdf of gtr is f(x) = e−x, we get

P [Cs < R] = 1−∞∫∫∫

0

exp

(−κ(1 + cjrν1)− βξ 1 + cjrν1

1 + cjeν2

)×f(ξ) hm(ν1) he(ν2) dξ dν1 dν2

Proposition 1 then results through standard calculus.

B. Proof for Propositions 2 and 3The proof for the secrecy outage probability for both

cautious and adaptive jamming is similar to the proof forblunt jamming. The main difference comes from the factthat, instead of adjusting the transmit power according to thedefined jamming scheme as mentioned in Section III-B, weequivalently adjust the fading distributions as follows.

Cautious jammer:

G′jr =

Gjr ifGjr

dαjr<Gje

dαje0 otherwise

G′je =

Gje ifGjr

dαjr<Gje

dαje0 otherwise

Adaptive jammer:

G′jr =

Gjr if Gjr < τ0 otherwise G′je =

Gje if Gjr < τ0 otherwise

We then get the following joint pdf of ν1 = g′jr and ν2 =g′je.

Cautious jammer:

hme(ν1, ν2) =

0 if ν1 > ν20 if ν1 > δν2, ν1 ≤ ν2 and δ < 1e−ν1e−ν2 if ν1 ≤ δν2, ν1 > 0 and δ < 1e−ν1e−ν2 if ν1 ≤ ν2, ν1 > 0 and δ > 11

1+δ if ν1 = ν2 = 0 and δ < 112 if ν1 = ν2 = 0 and δ > 1

,

with δ =

(djrdje

)α.

Adaptive jammer:

hme(ν1, ν2) =

0 if ν1 > τe−ν1e−ν2 if ν1 < τ and ν1 > 0e−τ if ν1 = ν2 = 0

By plugging hme(ν1, ν2) in the formulas of Section A weget,

P [Cs < R] = 1−∞∫∫∫

0

exp

(−κ(1 + cjrν1)− βξ 1 + cjrν1

1 + cjeν2

)×f(ξ) hme(ν1, ν2) dξ dν1 dν2

which leads to the final formulas for the secrecy outageprobability presented in Proposition 2 and Proposition 3.

C. Proof for Proposition 5Extending the results of Appendix A to multiple jammers

yields

P [Cs < R] = P

Gtr < κ

(1 +

∑j

cjrGjr

)+ βGte

1 +∑j

cjrGjr

1 +∑j

cjeGje

.The pdf of ν1 =

∑j cjrGjr is given by [21]

hm(ν1) =1∏j cjr

∑j

exp(− ν1cjr

)∏l 6=j

(1clr− 1

cjr

) .

Page 10: Wireless Secrecy Regions with Friendly Jammingjpvilela/publications/ieeetifs-secrecyregions.pdf · jamming coverage and the jamming efficiency. Our analysis for various jamming strategies

10

Likewise, for ν2 =∑j cjeGje,

he(ν2) =1∏j cje

∑j

exp(− ν2cje

)∏l 6=j

(1cle− 1

cje

) .Let the pdf of ξ = gte be f(ξ) = e−ξ. Since the pdf of gtr

is given by e−x, we have,

P [Cs < R] = 1−∞∫∫∫

0

exp

(−κ(1 + cjrν1)− βξ 1 + cjrν1

1 + cjeν2

)×f(ξ) hm(ν1) he(ν2) dξ dν1 dν2

= 1− 1∏j cjr

1∏j cje

∑j

∑j′

1∏l 6=j

(1clr− 1cjr

) 1∏l 6=j′

(1clr− 1cj′m

) ×∞∫∫∫

0

exp

(−κ(1 + cjrν1)− βξ 1 + cjrν1

1 + cjeν2

)e−ξ− ν1

cjr− ν2cje dξdν1dν2.

This finally leads to the results presented in Proposition 5.

Page 11: Wireless Secrecy Regions with Friendly Jammingjpvilela/publications/ieeetifs-secrecyregions.pdf · jamming coverage and the jamming efficiency. Our analysis for various jamming strategies

11

Joao P. Vilela received his degree in ComputerScience and Network Engineering in 2005 and theM.S. degree in Information Systems in 2007, bothfrom University of Porto, Porto, Portugal. He iscurrently pursuing the Ph.D. degree in ComputerScience in the same University and is also a re-searcher of Instituto de Telecomunicacoes in Porto,Portugal. His research interests include security andcooperation in wireless networks, wireless networkmodels, protocol design and distributed systems. MrVilela was awarded a doctoral scholarship from the

Portuguese Foundation for Science and Technology.

Matthieu Bloch received the Engineering degreefrom Supelec, Gif-sur-Yvettes, France, the M.S.degree in Electrical Engineering from the GeorgiaInstitute of Technology, Atlanta, in 2003, the Ph.D.degree in Engineering Science from the Universitede Franche-Comte, Besancon, France, in 2006, andthe Ph.D. degree in Electrical Engineering from theGeorgia Institute of Technology in 2008. In 2008-2009, he was a postdoctoral research associate at theUniversity of Notre Dame, South Bend, IN, USA.Since July 2009, Dr. Bloch has been on the faculty

of the School of Electrical and Computer Engineering at the Georgia Instituteof Technology, where he is currently an Assistant Professor. His researchinterests are in the areas of information theory, error-control coding, wirelesscommunications, and quantum cryptography. Dr. Bloch is a member of theIEEE and currently serves as the Chair of the Online Committee of the IEEEInformation Theory Society. He is the Co-Chair of the ICC 2011 Workshopon Physical-Layer Security and the co-author of “Physical-Layer Security:From Information Theory to Security Engineering”, which will be publishedby Cambridge University Press in July 2011.

Joao Barros is an Associate Professor of Electricaland Computer Engineering at the University of Portoand the head of the Instituto de Telecomunicoesin Porto, Portugal. Since 2008 he has also been aVisiting Professor with the Massachusetts Instituteof Technology (MIT). In February 2009, Dr. Bar-ros was appointed National Director of the CMU-Portugal Program, a five-year international partner-ship with a total budget of 56M Euros, which fosterscollaborative research and advanced training among12 Portuguese universities and research institutes,

Carnegie Mellon University and more than 70 companies. In recent years,Joao Barros has published extensively in the fields of information theory,networking and security, with a special focus on network coding, physical-layer security, sensor networks, and intelligent transportation systems. Hewas the recipient of a best teaching award by the Bavarian State Ministryof Sciences, Research and the Arts and the winner of the 2010 IEEECommunications Society Young Researcher Award for the Europe, MiddleEast and Africa region. He received his undergraduate education in Electricaland Computer Engineering from the Universidade do Porto (UP), Portugaland Universitaet Karlsruhe, Germany, and the Ph.D. degree in ElectricalEngineering and Information Technology from the Technische UniversitaetMuenchen(TUM), Germany.

Steven W. McLaughlin received the B.S.E. E.degree from Northwestern University, the M.S.E.degree from Princeton University, and the Ph.D.degree from the University of Michigan. He joinedthe School of Electrical and Computer Engineeringat Georgia Tech in September 1996 where is nowVice Provost for International Initiatives and KenByers Professor of ECE. As Vice Provost he isresponsible for Georgia Tech’s global engagementand is the point person for international initiativesin research, education, and economic development.

He is also President of GT Global, Inc. a not-for-profit corporation recentlycreated to manage select Georgia Tech international initiatives. He waspreviously Deputy Director of Georgia Tech - Lorraine - the European Campusof the Georgia Institute of Technology - in Metz, France from 2006-2007.He was President of the IEEE Information Theory Society in 2005. He hasheld positions at Booz, Allen and Hamilton, AT&T Bell Labs, and EastmanKodak. From 1992-1996 he was on the Electrical Engineering faculty at theRochester Institute of Technology. His research interests are in the general areaof communications and information theory. His research group has on-goingprojects in the areas of turbo, LDPC, and constrained codes for magnetic andoptical recording; FEC and equalization for wireless and optical networks;quantum key distribution, wireless and RFID security; and theory of errorcontrol coding. He has published more than 230 papers in journals andconferences and holds 28 US patents. He has served as the research and thesisadvisor to more than 50 students at the bachelors, masters, doctoral and post-doctoral levels. He is a Fellow of the IEEE and served as an Associate Editorfor Coding Techniques for the IEEE Transactions on Information Theory. Healso served as the Publications Editor for that journal from 1995-1999.