QoS-Based Design for Security Enhancement in TDMA-Based Wireless Networks

This paper investigates a cross-layer design to secure a set of buffered legitimate source nodes wishing to communicate with a common destination node. We assume a slotted-system and time-division multiple-access spectrum sharing where only one legitimate source node is allowed to transmit in a given time slot. The users' assignment probabilities to the time slots are optimized to satisfy a certain quality-of-service (QoS) requirement for all the legitimate source nodes. These probabilities are shown to be functions of the system parameters, secrecy rate outage probabilities, and arrival rates to the users' queues. To further improve the system's security and maximize the network performance measured by QoS metrics, i.e., secure stable-throughput region, we propose and compare beamforming-based cooperative jamming schemes that depend on the availability of the eavesdropper's instantaneous channel state information at the legitimate nodes. Each of the jamming schemes results in a different set of secrecy outage probabilities for the legitimate users which vary the time-assignment probabilities. We derive the secrecy stable- throughput region of the investigated wireless network. Our proposed jamming schemes achieve significant increase in the secure throughput over the fixed-jamming and no-jamming schemes.

[1]  Derrick Wing Kwan Ng,et al.  Robust Beamforming for Secure Communication in Systems With Wireless Information and Power Transfer , 2013, IEEE Transactions on Wireless Communications.

[2]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[3]  John S. Thompson,et al.  Relay selection for secure cooperative networks with jamming , 2009, IEEE Transactions on Wireless Communications.

[4]  Zhigang Cao,et al.  Cooperative Beamforming for Cognitive Radio Networks: A Cross-Layer Design , 2012, IEEE Transactions on Communications.

[5]  Huiming Wang,et al.  Joint Cooperative Beamforming and Jamming to Secure AF Relay Systems With Individual Power Constraint and No Eavesdropper's CSI , 2013, IEEE Signal Processing Letters.

[6]  K. J. Ray Liu,et al.  Cognitive multiple access via cooperation: Protocol design and performance analysis , 2007, IEEE Transactions on Information Theory.

[7]  R. M. Loynes,et al.  The stability of a queue with non-independent inter-arrival and service times , 1962, Mathematical Proceedings of the Cambridge Philosophical Society.

[8]  Zhu Han,et al.  Cooperative jamming for wireless physical layer security , 2009, 2009 IEEE/SP 15th Workshop on Statistical Signal Processing.

[9]  Rodney A. Kennedy,et al.  Cooperative jamming for secrecy in decentralized wireless networks , 2012, 2012 IEEE International Conference on Communications (ICC).

[10]  Naofal Al-Dhahir,et al.  Security of Rechargeable Energy-Harvesting Transmitters in Wireless Networks , 2016, IEEE Wireless Communications Letters.

[11]  Carl D. Meyer,et al.  Matrix Analysis and Applied Linear Algebra , 2000 .

[12]  K. J. Ray Liu,et al.  Opportunistic Multiple Access for Cognitive Radio Networks , 2011, IEEE Journal on Selected Areas in Communications.