ALLOCATION OF POWER IN RELAY NETWORKS FOR SECURED COMMUNICATION

Secured communications in the presence of eavesdropper node is grave for the successful operations in the wireless relay networks. In the proposed work, choose two hop wireless relay networks to enhance security against the eavesdropper node. This paper considers four node networks, they are one source, and three decode and forward relay, one destination and one eavesdropper node. To transmit the information from source to relay node, eavesdropper interrupt and try to capture that relay node messages. To prevent the eavesdropper interception, destination sends artificial jamming noise to the relay node. This jamming noise has the ability to jam the eavesdropper node. According to the channel state information present at the destination, the four types of jamming power allocation methods are introduced; (i) Fixed jamming power allocation, (ii) Rate optimal power allocation, (iii) Outage optimal power allocation, (iv) Statistical optimal power allocation method. The maximum achievable data rate at the destination is also estimated.

[1]  Taha Abdelshafy,et al.  OPTIMAL DECODING FOR WIRELESS RELAY NETWORKS WITH DECODE-AND-FORWARD COOPERATION PROTOCOL , 2014 .

[2]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[3]  Mounir Ghogho,et al.  Outage Probability Based Power Distribution Between Data and Artificial Noise for Physical Layer Security , 2012, IEEE Signal Processing Letters.

[4]  Mustafa Cenk Gursoy,et al.  Collaborative Relay Beamforming for Secrecy , 2010, 2010 IEEE International Conference on Communications.

[5]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[6]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[7]  Pimal Khanpara A REVIEW ON FUZZY LOGIC BASED ROUTING IN AD HOC NETWORKS , 2014 .

[8]  Chong-Yung Chi,et al.  QoS-Based Transmit Beamforming in the Presence of Eavesdroppers: An Optimized Artificial-Noise-Aided Approach , 2011, IEEE Transactions on Signal Processing.

[9]  Osvaldo Simeone,et al.  Secure Communications via Cooperating Base Stations , 2008, IEEE Communications Letters.

[10]  A. Lee Swindlehurst,et al.  Robust Beamforming for Security in MIMO Wiretap Channels With Imperfect CSI , 2010, IEEE Transactions on Signal Processing.

[11]  Björn E. Ottersten,et al.  Collaborative-Relay Beamforming With Perfect CSI: Optimum and Distributed Implementation , 2009, IEEE Signal Processing Letters.

[12]  Zhu Han,et al.  Secure wireless communications via cooperation , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.

[13]  Il-Min Kim,et al.  Joint Secure Beamforming Design at the Source and the Relay for an Amplify-and-Forward MIMO Untrusted Relay System , 2012, IEEE Transactions on Signal Processing.

[14]  Kin K. Leung,et al.  Multi-user diversity for secrecy in wireless networks , 2010, 2010 Information Theory and Applications Workshop (ITA).

[15]  Steven P. Weber,et al.  On Cooperative Relaying Schemes for Wireless Physical Layer Security , 2010, IEEE Transactions on Signal Processing.

[16]  Kin K. Leung,et al.  On the Application of Cooperative Transmission to Secrecy Communications , 2012, IEEE Journal on Selected Areas in Communications.