A new jamming technique for secrecy in multi-antenna wireless networks

Omar Bakr*, Raghuraman Mudumbai

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Scopus citations


We consider the problem of secure wireless communication in the presence of an eavesdropper when the transmitter has multiple antennas, using a variation of the recently proposed artificial noise technique. Under this technique, the transmitter sends a pseudo-noise jamming signal to selectively degrade the link to the eavesdropper without affecting the desired receiver. The previous work in the literature focuses on ideal Gaussian signaling for both the desired signal and the noise signal. The main contribution of this paper is to show that the Gaussian signaling model has important limitations and propose an alternative "induced fading" jamming technique that takes some of these limitations into account. Specifically we show that under the Gaussian noise scheme, the eavesdropper is able to recover the desired signal with very low bit error rates when the transmitter is constrained to use constant envelope signaling. Furthermore, we show that an eavesdropper with multiple antennas is able to use simple, blind constant-envelope algorithms to completely remove the Gaussian artificial noise signal and thus defeat the secrecy scheme. We propose an alternative scheme that induces artificial fading in the channel to the eavesdropper, and show that it outperforms the Gaussian noise scheme in the sense of causing higher bit error rates at the eavesdropper and is also more resistant to constant modulus-type algorithms. © 2010 IEEE.
Original languageEnglish (US)
Title of host publication2010 IEEE International Symposium on Information Theory
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Number of pages5
ISBN (Print)9781424478927
StatePublished - Jun 2010
Externally publishedYes


Dive into the research topics of 'A new jamming technique for secrecy in multi-antenna wireless networks'. Together they form a unique fingerprint.

Cite this