Secure cooperative untrusted-relay network with outdated CSI

This paper studies the secrecy performance of an untrusted amplify-and-forward relaying network where both the relaying and the direct links are used to convey the source's information. Since relays act as eavesdroppers, a source-based jamming technique is proposed to keep the source's message secret from these helper nodes. We analyze the secrecy capacity of partial relay selection based on outdated channel state information. The study is conducted analytically by deriving the lower-bound expression for the ergodic secrecy capacity (ESC). We demonstrate through the simulation results the tightness of the derived bound. The use of the direct link is shown to improve the secrecy performance of the proposed scheme. In this case, we found that ESC performance with maximum ratio combining at the destination is better than that with selection combining. The system performance worsens as the correlation coefficient decreases. Furthermore, the maximum of ESC is achieved when relays are in the middle between the source and the destination with equal power allocation between the information and the jamming signals at the source.

[1]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[2]  Victor C. M. Leung,et al.  Improving physical-layer security in wireless communications using diversity techniques , 2014, IEEE Network.

[3]  Huiming Wang,et al.  Secrecy Transmission With a Helper: To Relay or to Jam , 2015, IEEE Transactions on Information Forensics and Security.

[4]  Yueming Cai,et al.  Security performance of multiple antennas multiple relaying networks with outdated relay selection , 2014, 2014 Sixth International Conference on Wireless Communications and Signal Processing (WCSP).

[5]  Xianbin Wang,et al.  Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks , 2013, IEEE Journal on Selected Areas in Communications.

[6]  Kamel Tourki,et al.  Relay selection for optimized cooperative jamming scheme , 2015, 2015 23rd European Signal Processing Conference (EUSIPCO).

[7]  Mohamed-Slim Alouini,et al.  On the Jamming Power Allocation for Secure Amplify-and-Forward Relaying via Cooperative Jamming , 2013, IEEE Journal on Selected Areas in Communications.

[8]  Hamid Jafarkhani,et al.  Cooperative Jamming and Power Allocation for Wireless Relay Networks in Presence of Eavesdropper , 2011, 2011 IEEE International Conference on Communications (ICC).

[9]  Li Sun,et al.  Security-Aware Relaying Scheme for Cooperative Networks With Untrusted Relay Nodes , 2015, IEEE Communications Letters.

[10]  H. Vincent Poor,et al.  Security Enhancement of Cooperative Single Carrier Systems , 2015, IEEE Transactions on Information Forensics and Security.

[11]  Do-Hoon Kim,et al.  Opportunistic Transmission of Nonregenerative Network With Untrusted Relay , 2015, IEEE Transactions on Vehicular Technology.

[12]  Li Sun,et al.  Performance Study of Two-Hop Amplify-and-Forward Systems With Untrustworthy Relay Nodes , 2012, IEEE Transactions on Vehicular Technology.

[13]  Nuwan S. Ferdinand,et al.  Effects of Outdated CSI on the Secrecy Performance of MISO Wiretap Channels with Transmit Antenna Selection , 2013, IEEE Communications Letters.

[14]  I. M. Pyshik,et al.  Table of integrals, series, and products , 1965 .

[15]  George K. Karagiannidis,et al.  Amplify-and-Forward Relay Selection with Outdated Channel State Information , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[16]  David Gesbert,et al.  Cooperative diversity using per-user power control in the multiuser MAC channel , 2007, 2007 IEEE International Symposium on Information Theory.

[17]  Zhu Han,et al.  Energy Efficient Secure Communication Over Decode-and-Forward Relay Channels , 2015, IEEE Transactions on Communications.

[18]  A. Lee Swindlehurst,et al.  Secrecy analysis of unauthenticated amplify-and-forward relaying with antenna selection , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[19]  Jinhong Yuan,et al.  Cooperative jamming protocols in two hop amplify-and-forward wiretap channels , 2013, 2013 IEEE International Conference on Communications (ICC).

[20]  Huiming Wang,et al.  Joint relay selection and artificial jamming power allocation for secure DF relay networks , 2014, 2014 IEEE International Conference on Communications Workshops (ICC).

[21]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[22]  Kerstin Vogler,et al.  Table Of Integrals Series And Products , 2016 .

[23]  Hsueh-Jyh Li,et al.  Effect of Feedback Delay on Secure Cooperative Networks with Joint Relay and Jammer Selection , 2013, IEEE Wireless Communications Letters.

[24]  Jing Huang,et al.  Secure Transmission with Optimal Power Allocation in Untrusted Relay Networks , 2014, IEEE Wireless Communications Letters.

[25]  Caijun Zhong,et al.  Opportunistic Relay Selection for Secrecy Enhancement in Cooperative Networks , 2015, IEEE Transactions on Communications.

[26]  Jaesung Lim,et al.  Capacity Scaling and Diversity Order for Secure Cooperative Relaying With Untrustworthy Relays , 2015, IEEE Transactions on Wireless Communications.