On the Security Analysis of a Cooperative Incremental Relaying Protocol in the Presence of an Active Eavesdropper

Physical layer security offers an efficient means to decrease the risk of confidential information leakage through wiretap links. In this paper, we address the physical-layer security in a cooperative wireless subnetwork that includes a source-destination pair and multiple relays, exchanging information in the presence of a malevolent eavesdropper. Specifically, the eavesdropper is active in the network and transmits artificial noise (AN) with a multiple-antenna transmitter to confound both the relays and the destination. We first analyse the secrecy capacity of the direct source-to-destination transmission in terms of intercept probability (IP) and secrecy outage probability (SOP). A decode-and-forward incremental relaying (IR) protocol is then introduced to improve security of communications in the presence of the active eavesdropper. Within this context, and depending on the availability of channel state information, three different schemes (one optimal and two sub-optimal) are proposed to select a trusted relay and improve the achievable secrecy rate. For each one of these schemes, and for both selection and maximum ratio combining at the destination and eavesdropper, we derive new and exact closed-form expressions for the IP and SOP. Our analysis and simulation results demonstrate the superior performance of the proposed IR-based selection schemes for secure communication. They also confirm the existence of a floor phenomenon for the SOP in the absence of AN.

[1]  Hyundong Shin,et al.  Cooperative Communications with Outage-Optimal Opportunistic Relaying , 2007, IEEE Transactions on Wireless Communications.

[2]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[3]  Elza Erkip,et al.  A Secure Communication Game With a Relay Helping the Eavesdropper , 2009, IEEE Transactions on Information Forensics and Security.

[4]  Qiang Li,et al.  Robust Cooperative Beamforming and Artificial Noise Design for Physical-Layer Secrecy in AF Multi-Antenna Multi-Relay Networks , 2015, IEEE Transactions on Signal Processing.

[5]  Performance Improvement of MIMO-OFDM Block Codes by Achieving a Suboptimum Permutation Distance , 2013 .

[6]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[7]  Saeed Vahidian,et al.  Performance analysis of two-way decode-and-forward relaying in the presence of co-channel interferences , 2014, 2014 22nd Iranian Conference on Electrical Engineering (ICEE).

[8]  Mounir Ghogho,et al.  Outage Probability Based Power Distribution Between Data and Artificial Noise for Physical Layer Security , 2012, IEEE Signal Processing Letters.

[9]  Hesham El Gamal,et al.  The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.

[10]  Yasutada Oohama,et al.  Coding for relay channels with confidential messages , 2001, Proceedings 2001 IEEE Information Theory Workshop (Cat. No.01EX494).

[11]  Saeed Vahidian,et al.  Multi-Hop Cooperative Communication Technique for Cognitive DF and AF Relay Networks , 2015, Wirel. Pers. Commun..

[12]  Saeed Vahidian,et al.  Relay Selection for Security-Constrained Cooperative Communication in the Presence of Eavesdropper's Overhearing and Interference , 2015, IEEE Wireless Communications Letters.

[13]  Wei-Ping Zhu,et al.  Relay-Selection Improves the Security-Reliability Trade-Off in Cognitive Radio Systems , 2014, IEEE Transactions on Communications.

[14]  John S. Thompson,et al.  Relay selection for secure cooperative networks with jamming , 2009, IEEE Transactions on Wireless Communications.

[15]  Xiaofeng Li,et al.  Outage probability of multi-hop networks with amplify-and-forward full-duplex relaying , 2018, IET Commun..

[16]  A. Lee Swindlehurst,et al.  Cooperative Jamming for Secure Communications in MIMO Relay Networks , 2011, IEEE Transactions on Signal Processing.

[17]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[18]  Zhu Han,et al.  Joint Relay and Jammer Selection for Secure Two-Way Relay Networks , 2012, IEEE Trans. Inf. Forensics Secur..

[19]  Wenfei Liu,et al.  Transmit filter and artificial noise aided physical layer security for OFDM systems , 2016, 2016 8th International Conference on Wireless Communications & Signal Processing (WCSP).

[20]  Matthew R. McKay,et al.  On the Design of Artificial-Noise-Aided Secure Multi-Antenna Transmission in Slow Fading Channels , 2012, IEEE Transactions on Vehicular Technology.

[21]  D. Rajan Probability, Random Variables, and Stochastic Processes , 2017 .

[22]  Robert Schober,et al.  Buffers Improve the Performance of Relay Selection , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[23]  Aggelos Bletsas,et al.  A simple Cooperative diversity method based on network path selection , 2005, IEEE Journal on Selected Areas in Communications.

[24]  Ying Cai,et al.  Physical layer security in wireless-powered networks with untrusted relays , 2017, 2017 IEEE 17th International Conference on Communication Technology (ICCT).

[25]  Mérouane Debbah,et al.  Relay Selection Schemes for Dual-Hop Networks under Security Constraints with Multiple Eavesdroppers , 2013, IEEE Transactions on Wireless Communications.

[26]  Mohamed-Slim Alouini,et al.  Physical Layer Security for Cooperative Relaying Over Generalized- $K$ Fading Channels , 2018, IEEE Wireless Communications Letters.

[27]  Lajos Hanzo,et al.  Security Versus Reliability Analysis of Opportunistic Relaying , 2013, IEEE Transactions on Vehicular Technology.

[28]  Moustafa Youssef,et al.  Opportunistic Secrecy with a Strict Delay Constraint , 2013, IEEE Transactions on Communications.

[29]  Can Emre Koksal,et al.  On Secrecy Capacity Scaling in Wireless Networks , 2012, IEEE Trans. Inf. Theory.

[30]  Kwok Hung Li,et al.  Artificial Noise Aided Physical Layer Security in Multi-Antenna Small-Cell Networks , 2017, IEEE Transactions on Information Forensics and Security.

[31]  Siamak Talebi,et al.  Alamouti coding scheme for cooperative relay networks with full duplex relaying , 2013, 2013 Iran Workshop on Communication and Information Theory.

[32]  Aarnout Brombacher,et al.  Probability... , 2009, Qual. Reliab. Eng. Int..

[33]  H. Vincent Poor,et al.  Secrecy Performance of Finite-Sized In-Band Selective Relaying Systems With Unreliable Backhaul and Cooperative Eavesdroppers , 2018, IEEE Journal on Selected Areas in Communications.

[34]  Li Xu,et al.  Coordinated Multiple-Relays Based Physical-Layer Security Improvement: A Single-Leader Multiple-Followers Stackelberg Game Scheme , 2018, IEEE Transactions on Information Forensics and Security.

[35]  Frédérique E. Oggier,et al.  The secrecy capacity of the MIMO wiretap channel , 2008, ISIT.

[36]  Xianbin Wang,et al.  Intercept probability analysis of cooperative wireless networks with best relay selection in the presence of eavesdropping attack , 2013, 2013 IEEE International Conference on Communications (ICC).

[37]  Il-Min Kim,et al.  Optimal Power Allocation for Secure Multicarrier Relay Systems , 2011, IEEE Transactions on Signal Processing.

[38]  Yueming Cai,et al.  Physical Layer Security in Cognitive Untrusted Relay Networks , 2018, IEEE Access.

[39]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[40]  Ghosheh Abed Hodtani,et al.  Three-receiver broadcast channels with side information , 2012, 2012 IEEE International Symposium on Information Theory Proceedings.

[41]  Caijun Zhong,et al.  Opportunistic Relay Selection for Secrecy Enhancement in Cooperative Networks , 2015, IEEE Transactions on Communications.

[42]  Siamak Talebi,et al.  Delay–Interleaved Cooperative Relay Networks , 2014, IEEE Communications Letters.

[43]  Yu-Dong Yao,et al.  An Adaptive Cooperation Diversity Scheme With Best-Relay Selection in Cognitive Radio Networks , 2010, IEEE Transactions on Signal Processing.

[44]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[45]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[46]  Thomas Kaiser,et al.  Artificial Noise-Based Physical-Layer Security in Interference Alignment Multipair Two-Way Relaying Networks , 2018, IEEE Access.

[47]  Natasha Devroye,et al.  Dependence balance outer bounds for the discrete memoryless two-way multiple access broadcast channel , 2014, 2014 52nd Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[48]  Lajos Hanzo,et al.  Security-Reliability Tradeoff Analysis of Artificial Noise Aided Two-Way Opportunistic Relay Selection , 2017, IEEE Transactions on Vehicular Technology.

[49]  Yasutada Oohama Relay Channels with Confidential Messages , 2006, ArXiv.

[50]  Sik Kow Leung-Yan-Cheong Multi-user and wiretap channels including feedback , 1976 .

[51]  Erik G. Larsson,et al.  Cooperative transmission based on decode-and-forward relaying with partial repetition coding , 2009, IEEE Transactions on Wireless Communications.

[52]  Saeed Vahidian,et al.  Bidirectional AF Relaying With Underlay Spectrum Sharing in Cognitive Radio Networks , 2017, IEEE Transactions on Vehicular Technology.

[53]  Liyun Zhang,et al.  Improving Physical Layer Security for MISO Systems via Using Artificial Noise , 2014, GLOBECOM 2014.

[54]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[55]  Alkan Soysal,et al.  Capacity Bounds on MIMO Relay Channel With Covariance Feedback at the Transmitters , 2013, IEEE Transactions on Vehicular Technology.

[56]  Saeed Vahidian,et al.  Network-Coded Two-Way Relaying in Spectrum-Sharing Systems With Quality-of-Service Requirements , 2017, IEEE Transactions on Vehicular Technology.

[57]  Saeed Vahidian,et al.  Power allocation and cooperative diversity in two-way non-regenerative cognitive radio networks , 2017, 2017 IEEE International Conference on Communications (ICC).

[58]  A. Lee Swindlehurst,et al.  Secure Relay and Jammer Selection for Physical Layer Security , 2015, IEEE Signal Processing Letters.