Secure energy efficiency of selective decode and forward with distributed power allocation

We investigate the secure energy efficiency of a cooperative network where two legitimate users (Alice and Bob) communicate with the help of a relay node, in the presence of a passive eavesdropper (Eve). Power is adequately allocated between Alice and the relay using a Dinkelbach-based iterative power allocation algorithm. We assume channel state information of the legitimate channel only and compare the secure energy efficiency of several cooperative schemes, namely, selective decode-and-forward (SDF), fixed decode-and-forward (DF), amplify-and-forward (AF) and cooperative jamming (CJ). Our results show that, in terms of secure energy efficiency, SDF outperforms the other cooperative schemes in many scenarios. However, when the transmit rate increases or when Eve is close to the legitimate nodes, CJ stands out as the most advantageous scheme.

[1]  Mikael Skoglund,et al.  High SNR performance of amplify-and-forward relaying in Rayleigh fading wiretap channels , 2013, 2013 Iran Workshop on Communication and Information Theory.

[2]  Andrea J. Goldsmith,et al.  Energy-efficiency of MIMO and cooperative MIMO techniques in sensor networks , 2004, IEEE Journal on Selected Areas in Communications.

[3]  Zhu Han,et al.  Energy Efficient Secure Communication Over Decode-and-Forward Relay Channels , 2015, IEEE Transactions on Communications.

[4]  H. Vincent Poor,et al.  On the Throughput of Secure Hybrid-ARQ Protocols for Gaussian Block-Fading Channels , 2007, IEEE Transactions on Information Theory.

[5]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[6]  Matti Latva-aho,et al.  Secrecy Analysis of Transmit Antenna Selection Cooperative Schemes With No Channel State Information at the Transmitter , 2015, IEEE Transactions on Communications.

[7]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[8]  Gerhard Fettweis,et al.  Framework for Link-Level Energy Efficiency Optimization with Informed Transmitter , 2011, IEEE Transactions on Wireless Communications.

[9]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[10]  Mikael Skoglund,et al.  Outage Performance and Power Allocation for Decode-and-Forward Relaying and Cooperative Jamming for the Wiretap Channel , 2011, 2011 IEEE International Conference on Communications Workshops (ICC).

[11]  Mikael Skoglund,et al.  Outage performances for amplify-and-forward, decode-and-forward and cooperative jamming strategies for the wiretap channel , 2011, 2011 IEEE Wireless Communications and Networking Conference.

[12]  Gregory W. Wornell,et al.  Cooperative diversity in wireless networks: Efficient protocols and outage behavior , 2004, IEEE Transactions on Information Theory.

[13]  Werner Dinkelbach On Nonlinear Fractional Programming , 1967 .

[14]  Gerhard Fettweis,et al.  Framework for Link-Level Energy Efficiency Optimization with Informed Transmitter , 2012, IEEE Trans. Wirel. Commun..

[15]  Hesham El Gamal,et al.  The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.

[16]  Matthieu R. Bloch,et al.  Physical-Layer Security: From Information Theory to Security Engineering , 2011 .