Security-Reliability Tradeoff for Cooperative Relay Networks

This chapter investigates the security-reliability tradeoff (SRT) for wireless communications in the face of multiple eavesdroppers, where the security and reliability are measured by using the intercept probability encountered at the eavesdroppers and the outage probability experienced by the legitimate destination, respectively. We consider a cooperative relay network consisting of a source and a destination with the aid of multiple relay nodes and present two relay selection schemes, namely the single-relay selection (SRS) and multi-relay selection (MRS), to protect the security of source-destination transmissions against eavesdropping. To be specific, in the SRS scheme, only the single “best” relay is selected to assist the source-destination transmissions, whereas in the MRS scheme, multiple relays are enabled to participate in forwarding the source signal to the destination. For comparison purposes, we also consider the traditional direct transmission as a benchmark. We carry out the SRT analysis for the direct transmission as well as the SRS and MRS schemes in terms of deriving their closed-form intercept and outage probability expressions over Rayleigh fading channels. Numerical results demonstrate that both the SRS and MRS schemes perform better than the conventional direct transmission in terms of their SRTs, showing the security and reliability benefits of exploiting the relay selection against eavesdropping. Additionally, with an increasing number of eavesdroppers, the SRTs of the SRS and MRS schemes degrade. By contrast, as the number of relay nodes increases, the SRTs of both the SRS and MRS schemes improve significantly and the MRS consistently outperforms the SRS in terms of their SRTs.

[1]  Tolga M. Duman,et al.  Cooperative Precoding and Artificial Noise Design for Security Over Interference Channels , 2015, IEEE Signal Processing Letters.

[2]  George K. Karagiannidis,et al.  On Secrecy Performance of Antenna-Selection-Aided MIMO Systems Against Eavesdropping , 2015, IEEE Transactions on Vehicular Technology.

[3]  Liuqing Yang,et al.  Securing physical-layer communications for cognitive radio networks , 2015, IEEE Communications Magazine.

[4]  Wan Choi,et al.  Enhanced Secrecy in Stochastic Wireless Networks: Artificial Noise With Secrecy Protected Zone , 2014, IEEE Transactions on Information Forensics and Security.

[5]  A. Lee Swindlehurst,et al.  Robust Beamforming for Security in MIMO Wiretap Channels With Imperfect CSI , 2010, IEEE Transactions on Signal Processing.

[6]  Alfred O. Hero,et al.  Secure space-time communication , 2003, IEEE Trans. Inf. Theory.

[7]  Mounir Ghogho,et al.  Outage Probability Based Power Distribution Between Data and Artificial Noise for Physical Layer Security , 2012, IEEE Signal Processing Letters.

[8]  C. E. SHANNON,et al.  A mathematical theory of communication , 1948, MOCO.

[9]  Mustafa Cenk Gursoy,et al.  Relay beamforming strategies for physical-layer security , 2010, 2010 44th Annual Conference on Information Sciences and Systems (CISS).

[10]  Jinhong Yuan,et al.  Transmit Antenna Selection with Alamouti Coding and Power Allocation in MIMO Wiretap Channels , 2014, IEEE Transactions on Wireless Communications.

[11]  A. Lee Swindlehurst,et al.  Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.

[12]  Ashish Khisti,et al.  Artificial-Noise Alignment for Secure Multicast using Multiple Antennas , 2012, IEEE Communications Letters.

[13]  Ha H. Nguyen,et al.  On the capacity of Rayleigh fading cooperative systems under adaptive transmission , 2009 .

[14]  Victor C. M. Leung,et al.  Improving physical-layer security in wireless communications using diversity techniques , 2014, IEEE Network.

[15]  Wade Trappe,et al.  The challenges facing physical layer security , 2015, IEEE Communications Magazine.

[16]  Zhi Ding,et al.  On Secrecy of Codebook-Based Transmission Beamforming under Receiver Limited Feedback , 2011, IEEE Transactions on Wireless Communications.

[17]  Nuwan S. Ferdinand,et al.  Effects of Outdated CSI on the Secrecy Performance of MISO Wiretap Channels with Transmit Antenna Selection , 2013, IEEE Communications Letters.

[18]  Kin K. Leung,et al.  Artificial Noise Generation from Cooperative Relays for Everlasting Secrecy in Two-Hop Wireless Networks , 2011, IEEE Journal on Selected Areas in Communications.

[19]  Wei-Ping Zhu,et al.  Relay-Selection Improves the Security-Reliability Trade-Off in Cognitive Radio Systems , 2014, IEEE Transactions on Communications.

[20]  John S. Thompson,et al.  Relay selection for secure cooperative networks with jamming , 2009, IEEE Transactions on Wireless Communications.

[21]  Mehdi Bennis,et al.  Performance of Transmit Antenna Selection Physical Layer Security Schemes , 2012, IEEE Signal Processing Letters.

[22]  Norman C. Beaulieu,et al.  On the performance of amplify-and-forward cooperative systems with fixed gain relays , 2008, IEEE Transactions on Wireless Communications.

[23]  Lajos Hanzo,et al.  Security Versus Reliability Analysis of Opportunistic Relaying , 2013, IEEE Transactions on Vehicular Technology.