On Physical Layer Security: Weighted Fractional Fourier Transform Based User Cooperation

In this paper, we propose a novel user cooperation scheme based on weighted fractional Fourier transform (WFRFT), to enhance the physical (PHY) layer security of wireless transmissions against eavesdropping. Specifically, instead of dissipating additional transmission power for friendly jamming, by leveraging the features of WFRFT, the information bearing signal of cooperators can create an identical artificial noise effect at the eavesdropper while causing no performance degradation on the legitimate receiver. Furthermore, to form the cooperation set in an autonomous and distributed manner, we model WFRFT-based PHY-layer security cooperation problem as a coalitional game with non-transferable utility. A distributed merge-and-split algorithm is devised to facilitate the autonomous coalition formation to maximize the security capacity while accounting for the cooperation cost in terms of power consumption. We analyze the stability of the proposed algorithm and also investigate how the network topology efficiently adapts to the mobility of intermediate nodes. Simulation results demonstrate that the WFRFT-based user cooperation scheme leads to a significant performance advantage, in terms of secrecy ergodic capacity, compared with the conventional security-oriented user cooperation schemes, such as relay-jamming and cluster-beamforming.

[1]  R. Negi,et al.  Secret communication using artificial noise , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..

[2]  Miguel R. D. Rodrigues,et al.  Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.

[3]  Xuejun Sha,et al.  Performance Analysis of Hybrid Carrier System with MMSE Equalization over Doubly-Dispersive Channels , 2012, IEEE Communications Letters.

[4]  Dusit Niyato,et al.  Coalition-Based Cooperative Packet Delivery under Uncertainty: A Dynamic Bayesian Coalitional Game , 2013, IEEE Transactions on Mobile Computing.

[5]  Prasant Mohapatra,et al.  Non-cryptographic authentication and identification in wireless networks [Security and Privacy in Emerging Wireless Networks] , 2010, IEEE Wireless Communications.

[6]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[7]  Zhu Han,et al.  Physical Layer Security Game: Interaction between Source, Eavesdropper, and Friendly Jammer , 2009, EURASIP J. Wirel. Commun. Netw..

[8]  Aydin Sezgin,et al.  Broadcasting Into the Uncertainty: Authentication and Confidentiality by Physical-Layer Processing , 2015, Proceedings of the IEEE.

[9]  Feng Liu,et al.  Outage Constrained Secrecy Throughput Maximization for DF Relay Networks , 2015, IEEE Transactions on Communications.

[10]  Matthew R. McKay,et al.  Secure Transmission With Artificial Noise Over Fading Channels: Achievable Rate and Optimal Power Allocation , 2010, IEEE Transactions on Vehicular Technology.

[11]  Qinyu Zhang,et al.  WFRFT Precoding for Narrowband Interference Suppression in DFT-Based Block Transmission Systems , 2013, IEEE Communications Letters.

[12]  Jia Zhu,et al.  Power-Constrained Secrecy Rate Maximization for Joint Relay and Jammer Selection Assisted Wireless Networks , 2017, IEEE Transactions on Communications.

[13]  Xuejun Sha,et al.  Secret Communication Using Parallel Combinatory Spreading WFRFT , 2015, IEEE Commun. Lett..

[14]  Zhenduo Wang,et al.  BER analysis of hybrid carrier system based on WFRFT with carrier frequency offset , 2015 .

[15]  Xuejun Sha,et al.  Iterative frequency-domain equalization for WFRFT and EST based modulation schemes over doubly selective wireless fading channels , 2013, 2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).

[16]  Xiang Zhang,et al.  Partner Selection and Incentive Mechanism for Physical Layer Security , 2015, IEEE Transactions on Wireless Communications.

[17]  Zhu Han,et al.  Distributed Coalition Formation Games for Secure Wireless Transmission , 2009, Mob. Networks Appl..

[18]  Donald F. Towsley,et al.  Multi-Antenna Transmission With Artificial Noise Against Randomly Distributed Eavesdroppers , 2015, IEEE Transactions on Communications.

[19]  Hai Su,et al.  Secret key generation exploiting channel characteristics in wireless communications , 2011, IEEE Wireless Communications.

[20]  Xuejun Sha,et al.  The approach to carrier scheme convergence based on 4-weighted fractional fourier transform , 2010, IEEE Communications Letters.

[21]  Zhu Han,et al.  Coalitional game theory for communication networks , 2009, IEEE Signal Processing Magazine.

[22]  Ioannis Krikidis,et al.  Opportunistic relay selection for cooperative networks with secrecy constraints , 2010, IET Commun..

[23]  Aylin Yener,et al.  MIMO Broadcast Channel with Arbitrarily Varying Eavesdropper Channel: Secrecy Degrees of Freedom , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[24]  Frédérique E. Oggier,et al.  The secrecy capacity of the MIMO wiretap channel , 2007, 2008 IEEE International Symposium on Information Theory.

[25]  Li Yong,et al.  Secret Communication Using Parallel Combinatory Spreading WFRFT , 2015, IEEE Communications Letters.

[26]  Mounir Ghogho,et al.  Secure Communication via Sending Artificial Noise by the Receiver: Outage Secrecy Capacity/Region Analysis , 2012, IEEE Communications Letters.

[27]  Huiming Wang,et al.  Hybrid Cooperative Beamforming and Jamming for Physical-Layer Security of Two-Way Relay Networks , 2013, IEEE Transactions on Information Forensics and Security.

[28]  Xuejun Sha,et al.  Low Complexity Equalization of HCM Systems with DPFFT Demodulation over Doubly-Selective Channels , 2014, IEEE Signal Processing Letters.

[29]  Xuemin Shen,et al.  Cooperative Spectrum Access Towards Secure Information Transfer for CRNs , 2013, IEEE Journal on Selected Areas in Communications.

[30]  Xiaohui Liang,et al.  Security and privacy in mobile social networks: challenges and solutions , 2014, IEEE Wireless Communications.

[31]  Huiming Wang,et al.  Joint Cooperative Beamforming and Jamming to Secure AF Relay Systems With Individual Power Constraint and No Eavesdropper's CSI , 2013, IEEE Signal Processing Letters.

[32]  Daniel S. Yeung,et al.  General multifractional Fourier transform method based on the generalized permutation matrix group , 2005, IEEE Transactions on Signal Processing.

[33]  Xianbin Wang,et al.  Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks , 2013, IEEE Journal on Selected Areas in Communications.

[34]  Lajos Hanzo,et al.  A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.

[35]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[36]  Rafael F. Schaefer,et al.  The Secrecy Capacity of Compound Gaussian MIMO Wiretap Channels , 2015, IEEE Transactions on Information Theory.

[37]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[38]  Xuemin Shen,et al.  Safeguarding Physical Layer Security Using Weighted Fractional Fourier Transform , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).

[39]  Wade Trappe,et al.  The challenges facing physical layer security , 2015, IEEE Communications Magazine.

[40]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[41]  Huiming Wang,et al.  Distributed Beamforming for Physical-Layer Security of Two-Way Relay Networks , 2012, IEEE Transactions on Signal Processing.