Optimal Power Allocation and Secrecy Sum Rate in Two-Way Untrusted Relaying

In this paper, we examine the secrecy performance of two-way relaying between a multiple antenna base station (BS) and a single antenna mobile user (MU) in the presence of a multiple antenna friendly jammer (FJ). We consider the untrusted relaying scenario where an amplify-and-forward relay is both a necessary helper and a potential eavesdropper. To maximize the instantaneous secrecy sum rate, we derive new closed-form solutions for the optimal power allocation (OPA) between the BS and MU under the scenario of relaying with friendly jamming (WFJ). Based on the OPA solution, new closed-form expressions are derived for the ergodic secrecy sum rate (ESSR) with Rayleigh fading channel. Furthermore, we explicitly determine the high signal-to-noise ratio slope and power offset of the ESSR to highlight the benefits of friendly jamming. Numerical examples are provided to demonstrate the impact of the FJ's location and number of antennas on the secrecy performance.

[1]  Li Sun,et al.  Performance Study of Two-Hop Amplify-and-Forward Systems With Untrustworthy Relay Nodes , 2012, IEEE Transactions on Vehicular Technology.

[2]  Moslem Noori,et al.  Optimal power allocation to improve secrecy performance of non-regenerative cooperative systems using an untrusted relay , 2016, IET Commun..

[3]  Meixia Tao,et al.  Secure Beamforming for MIMO Two-Way Communications With an Untrusted Relay , 2013, IEEE Transactions on Signal Processing.

[4]  Zhu Han,et al.  Physical Layer Security for Two-Way Untrusted Relaying With Friendly Jammers , 2012, IEEE Transactions on Vehicular Technology.

[5]  Antonia Maria Tulino,et al.  Random Matrix Theory and Wireless Communications , 2004, Found. Trends Commun. Inf. Theory.

[6]  Sennur Ulukus,et al.  Wireless Physical-Layer Security: Lessons Learned From Information Theory , 2015, Proceedings of the IEEE.

[7]  Hsiao-Hwa Chen,et al.  A Survey on Multiple-Antenna Techniques for Physical Layer Security , 2017, IEEE Communications Surveys & Tutorials.

[8]  Yasutada Oohama,et al.  Coding for relay channels with confidential messages , 2001, Proceedings 2001 IEEE Information Theory Workshop (Cat. No.01EX494).

[9]  Antonia Maria Tulino,et al.  High-SNR power offset in multiantenna communication , 2005, IEEE Transactions on Information Theory.

[10]  Aylin Yener,et al.  Two-Hop Secure Communication Using an Untrusted Relay: A Case for Cooperative Jamming , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[11]  Masoud Ardakani,et al.  Ergodic sum rate analysis and efficient power allocation for a massive MIMO two-way relay network , 2017, IET Commun..

[12]  Abbas Mohammadi,et al.  Joint optimal power allocation and relay selection to establish secure transmission in uplink transmission of untrusted relays network , 2016, IET Networks.

[13]  A. Lee Swindlehurst,et al.  Joint transmit design and node selection for one-way and two-way untrusted relay channels , 2013, 2013 Asilomar Conference on Signals, Systems and Computers.

[14]  Mohamed Ibnkahla,et al.  An Accurate Approximation of the Exponential Integral Function Using a Sum of Exponentials , 2013, IEEE Communications Letters.