Secure Semi-Blind AF relaying networks using multiple eavesdroppers

In this paper, we investigate a secure semi-blind amplify-and-forward (AF) relaying system over Rayleigh fading channels. We consider a reactive relay selection where the relay is selected based on the highest instantaneous signal-to-noise ratio (SNR) of the second hop. We evaluate the ergodic secrecy capacity using source-assisted jamming (SAJ) and considering that relays act as eavesdroppers. In order to improve the secrecy performance, a direct link between the source and destination is considered. Numerical results are presented to verify the accuracy of the proposed mathematical analysis. Moreover, a comparison between secure semi-blind AF relaying system and secure channel-state-information (CSI)-assisted AF relaying system is performed to further prove the exactness of our analysis. The proposed secure semi-blind AF relaying system has a simpler mathematical analysis and a comparable secrecy performance as compared to secure CSI-assisted AF relaying system.

[1]  Zhu Han,et al.  Amplify-and-forward based cooperation for secure wireless communications , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.

[2]  Power allocation for asymmetric two-way fixed-gain AF relaying networks , 2018, Telecommunication Systems.

[3]  Hamid Jafarkhani,et al.  Cooperative Jamming and Power Allocation for Wireless Relay Networks in Presence of Eavesdropper , 2011, 2011 IEEE International Conference on Communications (ICC).

[4]  Zhu Han,et al.  Physical Layer Security Game: Interaction between Source, Eavesdropper, and Friendly Jammer , 2009, EURASIP J. Wirel. Commun. Netw..

[5]  Yupeng Liu,et al.  Destination assisted cooperative jamming for wireless physical layer security , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).

[6]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[7]  Jinhong Yuan,et al.  Cooperative jamming protocols in two hop amplify-and-forward wiretap channels , 2013, 2013 IEEE International Conference on Communications (ICC).

[8]  Farid Touati,et al.  Secure two-user AF relaying networks using cooperative jamming , 2018, 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC).

[9]  Hatem Boujemaa,et al.  Multi-way semi-blind AF relaying networks over Rayleigh fading channels , 2018, Phys. Commun..

[10]  D. Owen Handbook of Mathematical Functions with Formulas , 1965 .

[11]  Li Sun,et al.  Security-Aware Relaying Scheme for Cooperative Networks With Untrusted Relay Nodes , 2015, IEEE Communications Letters.

[12]  Kamel Tourki,et al.  Relay selection for optimized cooperative jamming scheme , 2015, 2015 23rd European Signal Processing Conference (EUSIPCO).

[13]  Noureddine Hamdi,et al.  Semi-blind two-way AF relaying over Nakagami-m fading environment , 2015, Ann. des Télécommunications.

[14]  H. Vincent Poor,et al.  The Gaussian wiretap channel with a helping interferer , 2008, 2008 IEEE International Symposium on Information Theory.

[15]  Mohamed-Slim Alouini,et al.  On the Jamming Power Allocation for Secure Amplify-and-Forward Relaying via Cooperative Jamming , 2013, IEEE Journal on Selected Areas in Communications.

[16]  Kamel Tourki,et al.  Secure cooperative untrusted-relay network with outdated CSI , 2016, 2016 International Wireless Communications and Mobile Computing Conference (IWCMC).

[17]  R. Stephenson A and V , 1962, The British journal of ophthalmology.

[18]  Lajos Hanzo,et al.  A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.

[19]  Joseph Lipka,et al.  A Table of Integrals , 2010 .

[20]  Zhu Han,et al.  Secure wireless communications via cooperation , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.

[21]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[22]  Victor C. M. Leung,et al.  Improving physical-layer security in wireless communications using diversity techniques , 2014, IEEE Network.