Power-Constrained Secrecy Rate Maximization for Joint Relay and Jammer Selection Assisted Wireless Networks

In this paper, we examine the physical layer security for cooperative wireless networks with multiple intermediate nodes, where the decode-and-forward protocol is considered. We propose a new joint relay and jammer selection (JRJS) scheme for protecting wireless communications against eavesdropping, where an intermediate node is selected as the relay for the sake of forwarding the source signal to the destination and meanwhile, the remaining intermediate nodes are employed to act as friendly jammers, which broadcast the artificial noise for disturbing the eavesdropper. We further investigate the power allocation among the source, relay and friendly jammers for maximizing the secrecy rate of proposed JRJS scheme, and derive a closed-form sub-optimal solution. Specifically, all the intermediate nodes, which successfully decode the source signal, are considered as relay candidates. For each candidate, we derive the sub-optimal closed-form power allocation solution and obtain the secrecy rate result of the corresponding JRJS scheme. Then, the candidate, which is capable of achieving the highest secrecy rate, is selected as the relay. Two assumptions about the channel state information (CSI), namely the full CSI (FCSI) and partial CSI (PCSI), are considered. Simulation results show that the proposed JRJS scheme outperforms the conventional pure relay selection, pure jamming, and generalized singular-value-decomposition-based beamforming schemes in terms of secrecy rate. Additionally, the proposed FCSI-based power allocation and PCSI-based power allocation schemes both achieve higher secrecy rates than the equal power allocation scheme.

[1]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[2]  Victor C. M. Leung,et al.  Improving physical-layer security in wireless communications using diversity techniques , 2014, IEEE Network.

[3]  Caijun Zhong,et al.  Opportunistic Relay Selection for Secrecy Enhancement in Cooperative Networks , 2015, IEEE Transactions on Communications.

[4]  Huiming Wang,et al.  Hybrid Opportunistic Relaying and Jamming With Power Allocation for Secure Cooperative Networks , 2015, IEEE Transactions on Wireless Communications.

[5]  Jinhong Yuan,et al.  Transmit Antenna Selection with Alamouti Coding and Power Allocation in MIMO Wiretap Channels , 2014, IEEE Transactions on Wireless Communications.

[6]  Kai-Jie Yang,et al.  On Power Allocation and Relay Selection for a Two-Way Amplify-and-Forward Relaying System , 2013, IEEE Transactions on Communications.

[7]  Steven P. Weber,et al.  On Cooperative Relaying Schemes for Wireless Physical Layer Security , 2010, IEEE Transactions on Signal Processing.

[8]  Taesoo Kwon,et al.  Secure MISO cognitive radio system with perfect and imperfect CSI , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).

[9]  Jianhua Ge,et al.  An Effective Secure Transmission Scheme for AF Relay Networks with Two-Hop Information Leakage , 2013, IEEE Communications Letters.

[10]  Huiming Wang,et al.  Joint null-space beamforming and jamming to secure af relay systems with individual power constraint , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[11]  Ami Wiesel,et al.  On the Gaussian MIMO Wiretap Channel , 2007, 2007 IEEE International Symposium on Information Theory.

[12]  Kin K. Leung,et al.  On the Application of Cooperative Transmission to Secrecy Communications , 2012, IEEE Journal on Selected Areas in Communications.

[13]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2007, IEEE Transactions on Information Theory.

[14]  Jinhong Yuan,et al.  Optimization of Code Rates in SISOME Wiretap Channels , 2015, IEEE Transactions on Wireless Communications.

[15]  Hong Long,et al.  Robust amplify-and-forward relay beamforming for security with mean square error constraint , 2015, IET Commun..

[16]  Shahram Shahbazpanahi,et al.  Optimal Distributed Beamforming for Two-Way Relay Networks , 2010, IEEE Transactions on Signal Processing.

[17]  Feng Liu,et al.  Outage Constrained Secrecy Throughput Maximization for DF Relay Networks , 2015, IEEE Transactions on Communications.

[18]  Chen He,et al.  Joint Relay Selection and Power Allocation for Full-Duplex DF Co-Operative Networks With Outdated CSI , 2016, IEEE Communications Letters.

[19]  Lajos Hanzo,et al.  Joint Relay and Jammer Selection Improves the Physical Layer Security in the Face of CSI Feedback Delays , 2015, IEEE Transactions on Vehicular Technology.

[20]  Huiming Wang,et al.  Joint Cooperative Beamforming and Jamming to Secure AF Relay Systems With Individual Power Constraint and No Eavesdropper's CSI , 2013, IEEE Signal Processing Letters.

[21]  Wei-Ping Zhu,et al.  Robust Cooperative Secure Beamforming for Simultaneous Wireless Information and Power Transfer in Amplify-and-Forward Relay Networks , 2017, IEEE Transactions on Vehicular Technology.

[22]  M.E. Hellman,et al.  An overview of public key cryptography , 1978, IEEE Communications Magazine.

[23]  A. Lee Swindlehurst,et al.  Cooperative Jamming for Secure Communications in MIMO Relay Networks , 2011, IEEE Transactions on Signal Processing.

[24]  Shihao Yan,et al.  Artificial Noise: Transmission Optimization in Multi-Input Single-Output Wiretap Channels , 2015, IEEE Transactions on Communications.

[25]  Caijun Zhong,et al.  Multi-antenna relay aided wireless physical layer security , 2015, IEEE Communications Magazine.

[26]  Asiya Khan,et al.  Joint Relay and Jammer Selection for Secure Two-Way Relay Networks , 2015 .

[27]  Zhu Han,et al.  Physical layer security in wireless networks with passive and active eavesdroppers , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).

[28]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[29]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[30]  Kai-Kit Wong,et al.  Optimal Cooperative Jamming to Enhance Physical Layer Security Using Relays , 2011, IEEE Transactions on Signal Processing.

[31]  Zhu Han,et al.  Joint Relay and Jammer Selection for Secure Two-Way Relay Networks , 2011, IEEE Transactions on Information Forensics and Security.

[32]  Zhu Han,et al.  Joint Relay and Jammer Selection for Secure Decode-and-Forward Two-Way Relay Communications , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[33]  Xianbin Wang,et al.  Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks , 2013, IEEE Journal on Selected Areas in Communications.

[34]  Nikos C. Sagias,et al.  Physical Layer Security for Multiple-Antenna Systems: A Unified Approach , 2016, IEEE Transactions on Communications.

[35]  Frédérique E. Oggier,et al.  The secrecy capacity of the MIMO wiretap channel , 2007, 2008 IEEE International Symposium on Information Theory.

[36]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[37]  Lajos Hanzo,et al.  A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.

[38]  Shahram Shahbazpanahi,et al.  Achievable Rate Region under Joint Distributed Beamforming and Power Allocation for Two-Way Relay Networks , 2012, IEEE Transactions on Wireless Communications.