Security--Reliability Tradeoff for Untrusted and Selfish Relay-Assisted D2D Communications in Heterogeneous Cellular Networks for IoT

This paper investigates security–reliability tradeoff for untrusted and selfish two-way relay-assisted device-to-device (D2D) communications in heterogeneous cellular networks for the Internet of Things (IoT). On one hand, the relay is untrusted and may try to extract useful information during the relaying process. On the other hand, the relay is selfish and is only willing to use the harvesting energy from the sources’ signals for relaying. Both instantaneous and statistical security–reliability tradeoffs are taken into consideration. For instantaneous model, the security and the reliability are characterized by the secrecy rate and the data rate, respectively. We aim at maximizing the tradeoff function of a tradeoff factor subject to a total transmit power constraint. For statistical model, the security and the reliability are characterized by the secrecy outage probability (SOP) and the data outage probability (DOP), respectively. An SOP optimization problem is developed with a DOP constraint and a total transmit power constraint. For both the problems, closed-form solutions are achieved. Simulation results show that both instantaneous and statistical security–reliability tradeoffs can achieve the Pareto optimal front.

[1]  Halim Yanikomeroglu,et al.  Device-to-device communication in 5G cellular networks: challenges, solutions, and future directions , 2014, IEEE Communications Magazine.

[2]  Hsiao-Hwa Chen,et al.  Intracluster Device-to-Device Relay Algorithm With Optimal Resource Utilization , 2013, IEEE Transactions on Vehicular Technology.

[3]  Jianhua Ge,et al.  Complexity-Aware Relay Selection for 5G Large-Scale Secure Two-Way Relay Systems , 2017, IEEE Transactions on Vehicular Technology.

[4]  Mazen O. Hasna,et al.  On the Achievable Secrecy Diversity of Cooperative Networks With Untrusted Relays , 2017, IEEE Transactions on Communications.

[5]  Mohsen Guizani,et al.  A Unified Approach for Calculating the Outage Performance of Two-Way AF Relaying Over Fading Channels , 2015, IEEE Transactions on Vehicular Technology.

[6]  Wei-Ping Zhu,et al.  Security–Reliability Tradeoff Analysis of Multirelay-Aided Decode-and-Forward Cooperation Systems , 2015, IEEE Transactions on Vehicular Technology.

[7]  Victor C. M. Leung,et al.  Secure Communications in CIoT Networks with a Wireless Energy Harvesting Untrusted Relay , 2017, Sensors.

[8]  Adrish Banerjee,et al.  Secure Communication via a Wireless Energy Harvesting Untrusted Relay , 2015, IEEE Transactions on Vehicular Technology.

[9]  Victor C. M. Leung,et al.  Interference-Alignment and Soft-Space-Reuse Based Cooperative Transmission for Multi-cell Massive MIMO Networks , 2018, IEEE Transactions on Wireless Communications.

[10]  Jianhua Ge,et al.  Energy-Efficient Power Allocation in Energy Harvesting Two-Way AF Relay Systems , 2017, IEEE Access.

[11]  Shi Jin,et al.  Sparse Bayesian Learning for the Time-Varying Massive MIMO Channels: Acquisition and Tracking , 2019, IEEE Transactions on Communications.

[12]  Fahim Kawsar,et al.  The Internet of Things: The Next Technological Revolution , 2013, Computer.

[13]  Theodoros A. Tsiftsis,et al.  Secrecy Rate-Optimum Energy Splitting for an Untrusted and Energy Harvesting Relay Network , 2018, IEEE Access.

[14]  Aylin Yener,et al.  Cooperation With an Untrusted Relay: A Secrecy Perspective , 2009, IEEE Transactions on Information Theory.

[15]  Xilong Liu,et al.  Green Relay Assisted D2D Communications With Dual Batteries in Heterogeneous Cellular Networks for IoT , 2017, IEEE Internet of Things Journal.

[16]  Xilong Liu,et al.  Green Relay Assisted D2D Communications with Dual Battery for IoT , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).

[17]  A. Lee Swindlehurst,et al.  Secure Communication Via an Untrusted Non-Regenerative Relay in Fading Channels , 2013, IEEE Transactions on Signal Processing.

[18]  Tiecheng Song,et al.  Security-Reliability Tradeoff for Friendly Jammer Assisted User-Pair Selection in the Face of Multiple Eavesdroppers , 2016, IEEE Access.

[19]  Gary B. Lamont,et al.  Evolutionary Algorithms for Solving Multi-Objective Problems , 2002, Genetic Algorithms and Evolutionary Computation.

[20]  Yu Cheng,et al.  Sustainable Cooperative Communication in Wireless Powered Networks With Energy Harvesting Relay , 2017, IEEE Transactions on Wireless Communications.

[21]  Wei-Ping Zhu,et al.  Relay-Selection Improves the Security-Reliability Trade-Off in Cognitive Radio Systems , 2014, IEEE Transactions on Communications.

[22]  Jia-Chin Lin,et al.  Power Allocation and Relay Selection in Relay Networks: A Perturbation-Based Approach , 2017, IEEE Signal Processing Letters.

[23]  Qi Zhang,et al.  Joint Power Allocation and Relay Beamforming in Nonorthogonal Multiple Access Amplify-and-Forward Relay Networks , 2017, IEEE Transactions on Vehicular Technology.

[24]  Ali A. Nasir,et al.  Relaying Protocols for Wireless Energy Harvesting and Information Processing , 2012, IEEE Transactions on Wireless Communications.

[25]  Lajos Hanzo,et al.  Security Versus Reliability Analysis of Opportunistic Relaying , 2013, IEEE Transactions on Vehicular Technology.

[26]  Jianhua Ge,et al.  Energy Efficiency and Spectral Efficiency Tradeoff for Asymmetric Two-Way AF Relaying With Statistical CSI , 2016, IEEE Transactions on Vehicular Technology.

[27]  Stefan Parkvall,et al.  Design aspects of network assisted device-to-device communications , 2012, IEEE Communications Magazine.

[28]  Gregory W. Wornell,et al.  Cooperative diversity in wireless networks: Efficient protocols and outage behavior , 2004, IEEE Transactions on Information Theory.

[29]  Hyung Yun Kong,et al.  Secure communication via an energy-harvesting untrusted relay with imperfect CSI , 2017, Annals of Telecommunications.

[30]  Hyung Yun Kong,et al.  Secure communication in untrusted relay selection networks with wireless energy harvesting , 2017, Wireless Networks.

[31]  Phee Lep Yeoh,et al.  Secure Two-Way Communication via a Wireless Powered Untrusted Relay and Friendly Jammer , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[32]  Jie Tang,et al.  Resource Efficiency: A New Paradigm on Energy Efficiency and Spectral Efficiency Tradeoff , 2014, IEEE Transactions on Wireless Communications.

[33]  Jianhua Ge,et al.  Improving Physical-Layer Security for Wireless Communication Systems Using Duality-Aware Two-Way Relay Cooperation , 2019, IEEE Systems Journal.

[34]  Kiseon Kim,et al.  Secrecy Outage Probability of Optimal Relay Selection for Secure AnF Cooperative Networks , 2015, IEEE Communications Letters.

[35]  Lajos Hanzo,et al.  Security-Reliability Tradeoff Analysis of Artificial Noise Aided Two-Way Opportunistic Relay Selection , 2017, IEEE Transactions on Vehicular Technology.

[36]  Juan Li,et al.  Joint optimal power allocation and relay selection scheme in energy harvesting asymmetric two-way relaying system , 2015, IET Commun..

[37]  Aylin Yener,et al.  Two-Hop Secure Communication Using an Untrusted Relay , 2009, EURASIP J. Wirel. Commun. Netw..

[38]  Jing Huang,et al.  Secure Transmission with Optimal Power Allocation in Untrusted Relay Networks , 2014, IEEE Wireless Communications Letters.

[39]  Liang Liu,et al.  On Networking of Internet of Things: Explorations and Challenges , 2016, IEEE Internet of Things Journal.

[40]  Chi Harold Liu,et al.  The Emerging Internet of Things Marketplace From an Industrial Perspective: A Survey , 2015, IEEE Transactions on Emerging Topics in Computing.

[41]  Dariush Abbasinezhad-Mood,et al.  A Thorough Trust and Reputation Based RBAC Model for Secure Data Storage in the Cloud , 2019, IEEE Transactions on Parallel and Distributed Systems.

[42]  Indraneel Das A preference ordering among various Pareto optimal alternatives , 1999 .

[43]  Geoffrey Ye Li,et al.  Graph-Based Path Selection and Power Allocation for DF Relay-Aided Transmission , 2018, IEEE Wireless Communications Letters.

[44]  Kamel Tourki,et al.  Securing Untrusted RF-EH Relay Networks Using Cooperative Jamming Signals , 2017, IEEE Access.

[45]  David E. Goldberg,et al.  Genetic algorithm design of Pareto optimal broadband microwave absorbers , 1996 .

[46]  Robert Abbas,et al.  Security and reliability performance analysis for two-way wireless energy harvesting based untrusted relaying with cooperative jamming , 2019, IET Commun..

[47]  Mohammad Reza Javan,et al.  Performance analysis of the link selection for secure device-to-device communications with an untrusted relay , 2017 .

[48]  Ling Wang,et al.  Optimal power allocation for achievable secrecy rate in an untrusted relay network with bounded channel estimation error , 2017, 2017 26th Wireless and Optical Communication Conference (WOCC).

[49]  Ekram Hossain,et al.  Dynamic Spectrum Access and Management in Cognitive Radio Networks , 2009 .

[50]  Yueming Cai,et al.  Security–reliability tradeoff analysis of untrusted energy harvesting relay networks , 2018, Int. J. Distributed Sens. Networks.

[51]  Kamel Tourki,et al.  AN-Aided Relay-Selection Scheme for Securing Untrusted RF-EH Relay Systems , 2017, IEEE Transactions on Green Communications and Networking.

[52]  Geoffrey Ye Li,et al.  Device-to-Device Communications Underlaying Cellular Networks , 2013, IEEE Transactions on Communications.

[53]  Miao Pan,et al.  One Stone Two Birds: A Joint Thing and Relay Selection for Diverse IoT Networks , 2018, IEEE Transactions on Vehicular Technology.