Secrecy Analysis of Distributed CDD-Based Cooperative Systems With Deliberate Interference

In this paper, a cooperative cyclic-prefixed single carrier (CP-SC) system is studied and a scheme to improve its physical layer security is proposed. In particular, a distributed cyclic delay diversity (dCDD) scheme is employed and a deliberate interfering method is introduced, which degrades the signal-to-interference-plus-noise ratio (SINR) over the channels from a group of remote radio heads (RRHs) to an eavesdropper, while minimizing the signal-to-noise ratio loss over the channels from the RRHs to an intended user. This is obtained by selecting one RRH that acts as an interfering RRH and transmits an interfering artificial noise sequence to the eavesdropper. Through the use of the dCDD scheme, a channel that minimizes the receive SINR at the eavesdropper is selected for the interfering RRH. This choice enhances the secrecy rate of the CP-SC system. The system performance is evaluated by considering the secrecy outage probability and the probability of non-zero achievable secrecy rate, which are formulated in closed-form analytical expressions for the case of identically and non-identically distributed frequency selective fading channels. Based on the proposed analytical framework, the diversity order of the system is studied. Monte Carlo simulations are employed to verify the analytical derivations for numerous system scenarios.

[1]  Luc Vandendorpe,et al.  On secure transmission over parallel relay eavesdropper channel , 2010, 2010 48th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[2]  H. Vincent Poor,et al.  Secrecy Performance of Finite-Sized Cooperative Single Carrier Systems With Unreliable Backhaul Connections , 2016, IEEE Transactions on Signal Processing.

[3]  Dong Wang,et al.  Asynchronous Cooperative Communications with STBC Coded Single Carrier Block Transmission , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.

[4]  Kerstin Vogler,et al.  Table Of Integrals Series And Products , 2016 .

[5]  Luc Deneire,et al.  Training sequence versus cyclic prefix-a new look on single carrier communication , 2001, IEEE Communications Letters.

[6]  George K. Karagiannidis,et al.  Secure Communications With Cooperative Jamming: Optimal Power Allocation and Secrecy Outage Analysis , 2017, IEEE Transactions on Vehicular Technology.

[7]  Yonghong Zeng,et al.  Pilot cyclic prefixed single carrier communication: channel estimation and equalization , 2005, IEEE Signal Processing Letters.

[8]  Kyeong Jin Kim,et al.  Performance Analysis of Cooperative Systems With Unreliable Backhauls and Selection Combining , 2017, IEEE Transactions on Vehicular Technology.

[9]  Jiri Blumenstein,et al.  Coarse Time Synchronization Utilizing Symmetric Properties of Zadoff–Chu Sequences , 2018, IEEE Communications Letters.

[10]  Yulong Zou,et al.  Physical-Layer Security for Spectrum Sharing Systems , 2016, IEEE Transactions on Wireless Communications.

[11]  Keith Q. T. Zhang,et al.  Outage performance for maximal ratio combiner in the presence of unequal-power co-channel interferers , 2004, IEEE Communications Letters.

[12]  Yu Gong,et al.  Physical Layer Network Security in the Full-Duplex Relay System , 2015, IEEE Transactions on Information Forensics and Security.

[13]  Jaehoon Jung,et al.  Zadoff-Chu Sequence Based Signature Identification for OFDM , 2013, IEEE Transactions on Wireless Communications.

[14]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[15]  Toshiaki Miyazaki,et al.  Antieavesdropping With Selfish Jamming in Wireless Networks: A Bertrand Game Approach , 2017, IEEE Transactions on Vehicular Technology.

[16]  H. Vincent Poor,et al.  Security Enhancement of Cooperative Single Carrier Systems , 2015, IEEE Transactions on Information Forensics and Security.

[17]  Luc Vandendorpe,et al.  Multiaccess Channel With Partially Cooperating Encoders and Security Constraints , 2012, IEEE Transactions on Information Forensics and Security.

[18]  Kai-Kit Wong,et al.  Optimal Cooperative Jamming to Enhance Physical Layer Security Using Relays , 2011, IEEE Transactions on Signal Processing.

[19]  Pingzhi Fan,et al.  Asymptotic Studies for the Impact of Antenna Selection on Secure Two-Way Relaying Communications with Artificial Noise , 2014, IEEE Transactions on Wireless Communications.

[20]  최준일 Explicit vs. Implicit Feedback for SU and MU-MIMO , 2010 .

[21]  Roy D. Yates,et al.  Secrecy capacity of independent parallel channels , 2009 .

[22]  Nikos C. Sagias,et al.  Physical Layer Security for Multiple-Antenna Systems: A Unified Approach , 2016, IEEE Transactions on Communications.

[23]  Luc Vandendorpe,et al.  Secure Communication Over Parallel Relay Channel , 2010, IEEE Transactions on Information Forensics and Security.

[24]  Ruoheng Liu,et al.  Securing Wireless Communications at the Physical Layer , 2014 .

[25]  H. Vincent Poor,et al.  Interference Assisted Secret Communication , 2008, IEEE Transactions on Information Theory.

[26]  Tomohiro Hase,et al.  Improvement on the Channel Estimation of Pilot Cyclic Prefixed Single Carrier (PCP-SC) System , 2009, 2009 IEEE 70th Vehicular Technology Conference Fall.

[27]  H. Vincent Poor,et al.  Performance Analysis of Distributed Single Carrier Systems With Distributed Cyclic Delay Diversity , 2017, IEEE Transactions on Communications.

[28]  Il-Min Kim,et al.  Secure Transmission for Multiuser Relay Networks , 2015, IEEE Transactions on Wireless Communications.

[29]  Xianbin Wang,et al.  Physical-Layer Security with Multiuser Scheduling in Cognitive Radio Networks , 2013, IEEE Transactions on Communications.

[30]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[31]  Qimei Cui,et al.  Large-System Analysis of Artificial-Noise-Assisted Communication in the Multiuser Downlink: Ergodic Secrecy Sum Rate and Optimal Power Allocation , 2016, IEEE Transactions on Vehicular Technology.

[32]  John S. Thompson,et al.  Relay selection for secure cooperative networks with jamming , 2009, IEEE Transactions on Wireless Communications.

[33]  H. Vincent Poor,et al.  Secrecy Performance Analysis of Distributed CDD Based Cooperative Systems with Jamming , 2018, 2018 IEEE International Conference on Communications (ICC).

[34]  T.K.Y. Lo,et al.  Maximum ratio transmission , 1999, 1999 IEEE International Conference on Communications (Cat. No. 99CH36311).

[35]  Caijun Zhong,et al.  Opportunistic Relay Selection for Secrecy Enhancement in Cooperative Networks , 2015, IEEE Transactions on Communications.

[36]  Iain B. Collings,et al.  Transmit Antenna Selection for Security Enhancement in MIMO Wiretap Channels , 2013, IEEE Transactions on Communications.

[37]  Zhu Han,et al.  Joint Relay and Jammer Selection for Secure Two-Way Relay Networks , 2012, IEEE Trans. Inf. Forensics Secur..