Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks

In this paper, we explore the physical-layer security in cooperative wireless networks with multiple relays where both amplify-and-forward (AF) and decode-and-forward (DF) protocols are considered. We propose the AF and DF based optimal relay selection (i.e., AFbORS and DFbORS) schemes to improve the wireless security against eavesdropping attack. For the purpose of comparison, we examine the traditional AFbORS and DFbORS schemes, denoted by T-AFbORS and T-DFbORS, respectively. We also investigate a so-called multiple relay combining (MRC) framework and present the traditional AF and DF based MRC schemes, called T-AFbMRC and T-DFbMRC, where multiple relays participate in forwarding the source signal to destination which then combines its received signals from the multiple relays. We derive closed-form intercept probability expressions of the proposed AFbORS and DFbORS (i.e., P-AFbORS and P-DFbORS) as well as the T-AFbORS, T-DFbORS, T-AFbMRC and T-DFbMRC schemes in the presence of eavesdropping attack. We further conduct an asymptotic intercept probability analysis to evaluate the diversity order performance of relay selection schemes and show that no matter which relaying protocol is considered (i.e., AF and DF), the traditional and proposed optimal relay selection approaches both achieve the diversity order M where M represents the number of relays. In addition, numerical results show that for both AF and DF protocols, the intercept probability performance of proposed optimal relay selection is strictly better than that of the traditional relay selection and multiple relay combining methods.

[1]  Murat Uysal,et al.  Cooperative diversity over log-normal fading channels: performance analysis and optimization , 2008, IEEE Transactions on Wireless Communications.

[2]  Salama Ikki,et al.  Performance Analysis of Cooperative Diversity Wireless Networks over Nakagami-m Fading Channel , 2007, IEEE Communications Letters.

[3]  Jiangzhou Wang,et al.  Chunk-Based Resource Allocation in OFDMA Systems—Part II: Joint Chunk, Power and Bit Allocation , 2012, IEEE Transactions on Communications.

[4]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[5]  Aytac Azgin,et al.  Cooperative MAC and routing protocols for wireless ad hoc networks , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..

[6]  Tung-Sang Ng,et al.  Performance analysis on MIMO-OFCDM systems with multi-code transmission , 2009, IEEE Transactions on Wireless Communications.

[7]  Yu-Dong Yao,et al.  An Adaptive Cooperation Diversity Scheme With Best-Relay Selection in Cognitive Radio Networks , 2010, IEEE Transactions on Signal Processing.

[8]  Xianbin Wang,et al.  Intercept probability analysis of cooperative wireless networks with best relay selection in the presence of eavesdropping attack , 2013, 2013 IEEE International Conference on Communications (ICC).

[9]  Salama Ikki,et al.  Performance analysis of adaptive decode-and-forward cooperative diversity networks with best-relay selection , 2010, IEEE Transactions on Communications.

[10]  Ender Tekin,et al.  The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.

[11]  Gregory W. Wornell,et al.  Cooperative diversity in wireless networks: Efficient protocols and outage behavior , 2004, IEEE Transactions on Information Theory.

[12]  Tung-Sang Ng,et al.  MIMO-OFCDM systems with joint iterative detection and optimal power allocation , 2008, IEEE Transactions on Wireless Communications.

[13]  Xianbin Wang,et al.  Eavesdropping attack in collaborative wireless networks: Security protocols and intercept behavior , 2013, Proceedings of the 2013 IEEE 17th International Conference on Computer Supported Cooperative Work in Design (CSCWD).

[14]  Zhu Han,et al.  Joint Relay and Jammer Selection for Secure Two-Way Relay Networks , 2011, IEEE Transactions on Information Forensics and Security.

[15]  Aggelos Bletsas,et al.  A simple Cooperative diversity method based on network path selection , 2005, IEEE Journal on Selected Areas in Communications.

[16]  M Mahalakshmi,et al.  Implementing a Cooperative MAC Protocol for Wireless LANs , 2012 .

[17]  Sathya Narayanan,et al.  Implementing a Cooperative MAC Protocol for Wireless LANs , 2006, 2006 IEEE International Conference on Communications.

[18]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[19]  Deniz Gündüz,et al.  Opportunistic cooperation by dynamic resource allocation , 2007, IEEE Transactions on Wireless Communications.

[20]  Lizhong Zheng,et al.  Diversity and multiplexing: a fundamental tradeoff in multiple-antenna channels , 2003, IEEE Trans. Inf. Theory.

[21]  Hesham El Gamal,et al.  The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.

[22]  A. Lee Swindlehurst,et al.  Cooperative Jamming for Secure Communications in MIMO Relay Networks , 2011, IEEE Transactions on Signal Processing.

[23]  Andreas F. Molisch,et al.  Wireless Communications , 2005 .

[24]  A. Lee Swindlehurst,et al.  Securing multi-antenna two-way relay channels with analog network coding against eavesdroppers , 2010, 2010 IEEE 11th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).

[25]  M. Yuksel,et al.  Secure Communication with a Relay Helping the Wire-tapper , 2007, 2007 IEEE Information Theory Workshop.

[26]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[27]  Zhu Han,et al.  Physical Layer Security for Two-Way Untrusted Relaying With Friendly Jammers , 2012, IEEE Transactions on Vehicular Technology.

[28]  Jiangzhou Wang,et al.  Chunk-based resource allocation in OFDMA systems - part I: chunk allocation , 2009, IEEE Transactions on Communications.