Using simple relays to improve physical-layer security

This paper studies different uses of two cooperating relays to improve the secrecy rate of a wiretap channel. These two relays are assumed to perform only simple functions: either amplify-and-forward (AF) or jamming. Complex functions such as decode-and-forward (DF) are not considered. We study three modes of cooperation: i) cooperative jamming (CJ), ii) AF-aided beamforming and iii) mixed AF-aided beamforming and CJ, all with individual relay power constraints. While i) is known in the literature, our efforts are spent on ii) and iii). In particular, for iii), we assume that the jamming signals in two communication stages are correlated, giving rise to improved performances. We also propose a heuristic approach for selecting the appropriate cooperating mode. Simulation results illustrate the performance gain of each scheme under different channel conditions and the effectiveness of the proposed mode selection method.

[1]  Kin K. Leung,et al.  Artificial Noise Generation from Cooperative Relays for Everlasting Secrecy in Two-Hop Wireless Networks , 2011, IEEE Journal on Selected Areas in Communications.

[2]  John S. Thompson,et al.  Relay selection for secure cooperative networks with jamming , 2009, IEEE Transactions on Wireless Communications.

[3]  Kai-Kit Wong,et al.  Optimal Cooperative Jamming to Enhance Physical Layer Security Using Relays , 2011, IEEE Transactions on Signal Processing.

[4]  Steven P. Weber,et al.  On Cooperative Relaying Schemes for Wireless Physical Layer Security , 2010, IEEE Transactions on Signal Processing.

[5]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[6]  Steven P. Weber,et al.  Optimal Cooperative Relaying Schemes for Improving Wireless Physical Layer Security , 2010, ArXiv.

[7]  Athina P. Petropulu,et al.  Physical layer security with uncoordinated helpers implementing cooperative jamming , 2012, 2012 IEEE 7th Sensor Array and Multichannel Signal Processing Workshop (SAM).

[8]  Shlomo Shamai,et al.  Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.

[9]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[10]  Alfred O. Hero,et al.  Secure space-time communication , 2003, IEEE Trans. Inf. Theory.

[11]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.