Physical layer security with uncoordinated helpers implementing cooperative jamming

A wireless communication network is considered, consisting of a source, a destination and an eavesdropper, each equipped with a single antenna. The communication is assisted by multiple multi-antenna helpers, which independently transmit jamming noise to confound the eavesdropper. The optimal structure of the jamming noise that maximizes the secrecy rate is derived. A suboptimal solution that results in nulling at the legitimate receiver is also considered. Unlike the optimal solution, which requires global channel information, the suboptimal solution requires local channel information only, i.e., each helper needs to know only its own channel to the destination. Although the nulling solution results in lower secrecy rate as compared to the optimal solution, simulations show that the difference is rather small, with the inexpensive and easy to implement nulling scheme performing near optimal.

[1]  Candice King,et al.  Fundamentals of wireless communications , 2013, 2013 IEEE Rural Electric Power Conference (REPC).

[2]  Kai-Kit Wong,et al.  Optimal Cooperative Jamming to Enhance Physical Layer Security Using Relays , 2011, IEEE Transactions on Signal Processing.

[3]  Steven P. Weber,et al.  On Cooperative Relaying Schemes for Wireless Physical Layer Security , 2010, IEEE Transactions on Signal Processing.

[4]  R. Negi,et al.  Secret communication using artificial noise , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..

[5]  H. Vincent Poor,et al.  Weighted Cross-Layer Cooperative Beamforming for Wireless Networks , 2009, IEEE Transactions on Signal Processing.

[6]  Carles Padró,et al.  Information Theoretic Security , 2013, Lecture Notes in Computer Science.

[7]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[8]  A. Lee Swindlehurst,et al.  Cooperative Jamming in MIMO ad-hoc networks , 2009, 2009 Conference Record of the Forty-Third Asilomar Conference on Signals, Systems and Computers.

[9]  Ender Tekin,et al.  The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.

[10]  Zhu Han,et al.  Cooperative jamming for wireless physical layer security , 2009, 2009 IEEE/SP 15th Workshop on Statistical Signal Processing.

[11]  Athina P. Petropulu,et al.  Secrecy rate optimization under cooperation with perfect channel state information , 2009, 2009 Conference Record of the Forty-Third Asilomar Conference on Signals, Systems and Computers.

[12]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.