Secure Transmission Schemes for Two-Way Relay Networks

We investigate the physical-layer security problems of two-way relay networks in this paper. The whole network consists of two legitimate users and one eavesdropper, where the legal users need the help of some intermediate nodes to exchange information. We propose joint jamming and relaying mechanism, where a jamming node is selected from all intermediate nodes, to create interference upon eavesdropper, while other nodes are used to relay data for two users. All intermediate nodes are subjected to per-node power constraints. Based on null-space beamforming, we propose two different transmission schemes when the number of relay nodes is large enough. One scheme is designed to maximize the secrecy sum rate (MSSR) of the network, and the other is designed to maximize the minimum secrecy rate (MMSR) between two users. In the MMSR scheme, a series of semi-definite programming problems with a rank-1 constraint needs to be solved. We prove that this rank-1 constraint does not affect the solutions of original problems. In addition, we propose two modified secure transmission schemes when the number of relay nodes is less abundant. In short, no matter how many intermediate nodes in the communication networks, one can find suitable transmission schemes to ensure communication security.

[1]  Leandro Ronchini Ximenes Unified Joint Symbol and Channel Estimation with Interference Subtraction for One-Way and Two-Way MIMO Relaying Systems , 2018, 2018 IEEE 10th Latin-American Conference on Communications (LATINCOM).

[2]  Guanding Yu,et al.  On the Secrecy Capacity of Fading Wireless Channel with Multiple Eavesdroppers , 2007, 2007 IEEE International Symposium on Information Theory.

[3]  P. Shanmugapriya,et al.  Improving security in two-way relay networks by optimal relay and jammer selection , 2013, 2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN).

[4]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[5]  Guangyi Liu,et al.  Achievability of the channel reciprocity and its benefit in TDD system , 2010, 2010 5th International ICST Conference on Communications and Networking in China.

[6]  Shahram Shahbazpanahi,et al.  A Semi-Closed-Form Solution to Optimal Distributed Beamforming for Two-Way Relay Networks , 2012, IEEE Transactions on Signal Processing.

[7]  Tiejun Lv,et al.  AN-aided robust secure beamforming design in MIMO two-way relay systems with PNC , 2018, 2018 IEEE Wireless Communications and Networking Conference (WCNC).

[8]  Jianjun Wu,et al.  Jammer selection for secure two-way DF relay communications with imperfect CSI , 2014, 16th International Conference on Advanced Communication Technology.

[9]  Xian Liu Outage Probability of Secrecy Capacity over Correlated Log-Normal Fading Channels , 2013, IEEE Communications Letters.

[10]  Meixia Tao,et al.  Secure Beamforming for MIMO Two-Way Communications With an Untrusted Relay , 2013, IEEE Transactions on Signal Processing.

[11]  Ying-Chang Liang,et al.  Optimal beamforming for two-way multi-antenna relay channel with analogue network coding , 2008, IEEE Journal on Selected Areas in Communications.

[12]  Hyuck M. Kwon,et al.  Achievable rate of a two-way relay channel with structured code under Rayleigh fading , 2014, 2014 International Conference on Computing, Networking and Communications (ICNC).

[13]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[14]  Lihua Li,et al.  An adaptive method utilizing channel reciprocity in TDD-LTE system , 2011 .

[15]  Zhongshan Zhang,et al.  Secure Full-Duplex Two-Way Relaying Networks With Optimal Relay Selection , 2017, IEEE Communications Letters.

[16]  Tong-Xing Zheng,et al.  Improving Anti-Eavesdropping Ability Without Eavesdropper’s CSI: A Practical Secure Transmission Design Perspective , 2018, IEEE Wireless Communications Letters.

[17]  Alister G. Burr,et al.  On the Maximum Achievable Sum-Rate of Interfering Two-Way Relay Channels , 2012, IEEE Communications Letters.

[18]  Tharmalingam Ratnarajah,et al.  Secrecy capacity and secure outage performance for rayleigh fading simo channel , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[19]  Jung Hee Cheon,et al.  A Hybrid Scheme of Public-Key Encryption and Somewhat Homomorphic Encryption , 2015, IEEE Transactions on Information Forensics and Security.

[20]  Hamid Behroozi,et al.  On the Capacity Region of Asymmetric Gaussian Two-Way Line Channel , 2016, IEEE Transactions on Communications.

[21]  Zhi Chen,et al.  Optimal Throughput for Two-Way Relaying: Energy Harvesting and Energy Co-Operation , 2016, IEEE Journal on Selected Areas in Communications.

[22]  Jie Yang,et al.  Distributed Relay Selection for Two-Way Relaying Networks Based on Power Conservation , 2014, 2014 International Conference on Wireless Communication and Sensor Network.

[23]  Richard E. Blahut,et al.  Secrecy capacity of SIMO and slow fading channels , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..

[24]  He Wang,et al.  A novel half-jamming protocol for secure two-way relay systems using a full-duplex jamming relay , 2017, 2017 3rd IEEE International Conference on Computer and Communications (ICCC).

[25]  Zhu Han,et al.  Joint Relay and Jammer Selection for Secure Two-Way Relay Networks , 2012, IEEE Trans. Inf. Forensics Secur..

[26]  Lingfeng Shen,et al.  Cooperative Jamming and Relay Beamforming Design for Physical Layer Secure Two-Way Relaying , 2018, 2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC).

[27]  Ender Tekin,et al.  The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.

[28]  Qiang Gao,et al.  Outage performance of two-way decode-and-forward relaying over block fading channels , 2017, 2017 IEEE 9th International Conference on Communication Software and Networks (ICCSN).