Back to Search Start Over

Energy Harvesting in Secret Key Generation Systems under Jamming Attacks

Authors :
Belmega, Elena Veronica
Chorti, Arsenia
Belmega, E. Veronica
Performance analysis and optimization of LARge Infrastructures and Systems (POLARIS )
Inria Grenoble - Rhône-Alpes
Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-Laboratoire d'Informatique de Grenoble (LIG )
Institut polytechnique de Grenoble - Grenoble Institute of Technology (Grenoble INP )-Centre National de la Recherche Scientifique (CNRS)-Université Grenoble Alpes [2016-2019] (UGA [2016-2019])-Institut polytechnique de Grenoble - Grenoble Institute of Technology (Grenoble INP )-Centre National de la Recherche Scientifique (CNRS)-Université Grenoble Alpes [2016-2019] (UGA [2016-2019])
Equipes Traitement de l'Information et Systèmes (ETIS - UMR 8051)
Ecole Nationale Supérieure de l'Electronique et de ses Applications (ENSEA)-Centre National de la Recherche Scientifique (CNRS)-CY Cergy Paris Université (CY)
School of Computer Science and Electronic Engineering [Essex] (CSEE)
University of Essex
Source :
IEEE ICC 2017-IEEE International Conference on Communications, IEEE ICC 2017-IEEE International Conference on Communications, May 2017, Paris, France
Publication Year :
2017
Publisher :
HAL CCSD, 2017.

Abstract

International audience; Secret key generation (SKG) from shared randomness at two remote locations has been shown to be vulnerable to denial of service attacks in the form of jamming. Typically, such attacks are alleviated with frequency hopping/spreading techniques that rely on expansion of the system bandwidth. In the present study, energy harvesting (EH) is exploited as a novel counter-jamming approach that alleviates the need for extra bandwidth resources. Assuming the legitimate users have EH capabilities, the idea is that part of the jamming signal can potentially be harvested and converted into useful communication power. In this framework, the competitive interaction between a pair of legitimate users and a jammer is formulated as a zero-sum game. A critical transmission power for the legitimate users is identified which allows to completely characterize the unique NE of the game in closed form. Remarkably, this threshold also provides the option to effectively neutralize the jammer, i.e., prevent the jammer from carrying out the attack altogether. Through numerical evaluations, EH is shown to be a counter-jamming approach that can offer substantial gains in terms of relative SKG rates.

Details

Language :
English
Database :
OpenAIRE
Journal :
IEEE ICC 2017-IEEE International Conference on Communications, IEEE ICC 2017-IEEE International Conference on Communications, May 2017, Paris, France
Accession number :
edsair.dedup.wf.001..dcfc8329e600cfc3123bf1225f957f0e