Performance Analysis of Physical Layer Security of Opportunistic Scheduling in Multiuser Multirelay Cooperative Networks

In this paper, we study the physical layer security (PLS) of opportunistic scheduling for uplink scenarios of multiuser multirelay cooperative networks. To this end, we propose a low-complexity, yet comparable secrecy performance source relay selection scheme, called the proposed source relay selection (PSRS) scheme. Specifically, the PSRS scheme first selects the least vulnerable source and then selects the relay that maximizes the system secrecy capacity for the given selected source. Additionally, the maximal ratio combining (MRC) technique and the selection combining (SC) technique are considered at the eavesdropper, respectively. Investigating the system performance in terms of secrecy outage probability (SOP), closed-form expressions of the SOP are derived. The developed analysis is corroborated through Monte Carlo simulation. Numerical results show that the PSRS scheme significantly improves the secure ability of the system compared to that of the random source relay selection scheme, but does not outperform the optimal joint source relay selection (OJSRS) scheme. However, the PSRS scheme drastically reduces the required amount of channel state information (CSI) estimations compared to that required by the OJSRS scheme, specially in dense cooperative networks.

[1]  Xianbin Wang,et al.  Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks , 2013, IEEE Journal on Selected Areas in Communications.

[2]  Victor C. M. Leung,et al.  Exploiting Opportunistic Scheduling in Uplink Wiretap Networks , 2017, IEEE Transactions on Vehicular Technology.

[3]  Huaiyu Dai,et al.  Asymptotic Analysis on the Interaction Between Spatial Diversity and Multiuser Diversity in Wireless Networks , 2007, IEEE Transactions on Signal Processing.

[4]  Yang Yu,et al.  IEEE 802.16J relay-based wireless access networks: an overview , 2008, IEEE Wireless Communications.

[5]  Iain B. Collings,et al.  Transmit Antenna Selection for Security Enhancement in MIMO Wiretap Channels , 2013, IEEE Transactions on Communications.

[6]  Huiming Wang,et al.  Secure Communication in Uplink Transmissions: User Selection and Multiuser Secrecy Gain , 2016, IEEE Transactions on Communications.

[7]  I. Miller Probability, Random Variables, and Stochastic Processes , 1966 .

[8]  Ying-Chang Liang,et al.  Optimal Relay Selection in IEEE 802.16j Multihop Relay Vehicular Networks , 2010, IEEE Transactions on Vehicular Technology.

[9]  Hamid-Reza Bahrami,et al.  On the Feedback Reduction of Multiuser Relay Networks Using Compressive Sensing , 2016, IEEE Transactions on Communications.

[10]  Daesik Hong,et al.  A new asymptotic analysis of throughput enhancement from selection diversity using a high SNR approach in multiuser systems , 2009, IEEE Trans. Wirel. Commun..

[11]  Gregory W. Wornell,et al.  Cooperative diversity in wireless networks: Efficient protocols and outage behavior , 2004, IEEE Transactions on Information Theory.

[12]  Xuemin Shen,et al.  Relay selection and resource allocation for multi-user cooperative LTE-A uplink , 2012, 2012 IEEE International Conference on Communications (ICC).

[13]  Andreas F. Molisch,et al.  Applying Antenna Selection in WLANs for Achieving Broadband Multimedia Communications , 2006, IEEE Transactions on Broadcasting.

[14]  Daniel Benevides da Costa,et al.  A New Efficient Low-Complexity Scheme for Multi-Source Multi-Relay Cooperative Networks , 2011, IEEE Transactions on Vehicular Technology.

[15]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[16]  Hong Man,et al.  Maximal Ratio Diversity Combining Enhanced Security , 2011, IEEE Communications Letters.

[17]  Xianbin Wang,et al.  Physical-Layer Security with Multiuser Scheduling in Cognitive Radio Networks , 2013, IEEE Transactions on Communications.

[18]  Nan Yang,et al.  Secure Multiuser Communications in Wireless Sensor Networks with TAS and Cooperative Jamming , 2016, Sensors.

[19]  Trung Quang Duong,et al.  Secure Multiuser Scheduling in Downlink Dual-Hop Regenerative Relay Networks Over Nakagami- $m$ Fading Channels , 2016, IEEE Transactions on Wireless Communications.

[20]  Rafael F. Schaefer,et al.  Wireless physical layer security , 2016, Proceedings of the National Academy of Sciences.

[21]  Trung Quang Duong,et al.  On the performance of selection decode-and-forward relay networks over Nakagami-m fading channels , 2009, IEEE Communications Letters.

[22]  M. Yuksel,et al.  Secure Communication with a Relay Helping the Wire-tapper , 2007, 2007 IEEE Information Theory Workshop.

[23]  Wade Trappe,et al.  The challenges facing physical layer security , 2015, IEEE Communications Magazine.

[24]  Victor C. M. Leung,et al.  Improving physical-layer security in wireless communications using diversity techniques , 2014, IEEE Network.

[25]  D. F. Hays,et al.  Table of Integrals, Series, and Products , 1966 .

[26]  Huiming Wang,et al.  Enhancing wireless secrecy via cooperation: signal design and optimization , 2015, IEEE Communications Magazine.

[27]  Hamid Jafarkhani,et al.  Cooperative Jamming and Power Allocation for Wireless Relay Networks in Presence of Eavesdropper , 2011, 2011 IEEE International Conference on Communications (ICC).

[28]  Daniel Benevides da Costa,et al.  Spectrally Efficient Diversity Exploitation Schemes for Downlink Cooperative Cellular Networks , 2012, IEEE Transactions on Vehicular Technology.

[29]  Jesus Gomez Galvan,et al.  Channel Inversion CoMP Technique in Cellular System A User-Selection Algorithm , 2014, ICWMC 2014.

[30]  H. S. Wolff,et al.  iRun: Horizontal and Vertical Shape of a Region-Based Graph Compression , 2022, Sensors.

[31]  Robert Schober,et al.  Diversity Analysis of Multi-User Multi-Relay Networks , 2011, IEEE Transactions on Wireless Communications.

[32]  Mérouane Debbah,et al.  Relay Selection Schemes for Dual-Hop Networks under Security Constraints with Multiple Eavesdroppers , 2013, IEEE Transactions on Wireless Communications.

[33]  George K. Karagiannidis,et al.  Exploiting Direct Links for Physical Layer Security in Multiuser Multirelay Networks , 2016, IEEE Transactions on Wireless Communications.

[34]  Xiaoming Chen,et al.  On the secrecy outage capacity of physical layer security in large-scale MIMO relaying systems with imperfect CSI , 2014, 2014 IEEE International Conference on Communications (ICC).

[35]  Mohamed-Slim Alouini,et al.  Security and reliability analysis of diversity combining techniques in SIMO mixed RF/FSO with multiple users , 2016, 2016 IEEE International Conference on Communications Workshops (ICC).

[36]  Mohamed-Slim Alouini,et al.  Adaptive modulation with best user selection over non-identical Nakagami fading channels , 2011, 2011 8th International Symposium on Wireless Communication Systems.

[37]  Tho Le-Ngoc,et al.  Physical layer security in wireless cooperative relay networks: state of the art and beyond , 2015, IEEE Communications Magazine.

[38]  Maria Huhtala,et al.  Random Variables and Stochastic Processes , 2021, Matrix and Tensor Decompositions in Signal Processing.

[39]  Pingzhi Fan,et al.  Secure multiuser communications in multiple decode-and-forward relay networks with direct links , 2014, 2014 IEEE Global Communications Conference.