Optimal Power Allocation and Secrecy Sum Rate in Two-Way Untrusted Relaying Networks With an External Jammer

In this paper, we examine the secrecy performance of two-way relaying between a large-scale multiple antenna base station (BS) and a single antenna mobile user (MU) in the presence of a multiple antenna external jammer. We consider the untrusted relaying scenario, where an amplify-and-forward relay is both a necessary helper and a potential eavesdropper to the BS and MU transmissions. With the aim of maximizing the instantaneous secrecy sum rate, we derive new closed-form solutions for the optimal power allocation (OPA) under the following three scenarios: 1) without jamming (WoJ) where the jammer is not activated; 2) friendly jamming (FJ) where the jamming signal is known a priori at the BS and MU; and 3) Gaussian noise jamming (GNJ) where the jamming signal is unknown at the BS and MU. Based on our OPA solutions, new closed-form expressions are derived for the ergodic secrecy sum rate (ESSR) with Rayleigh fading channels. Furthermore, we characterize the high signal-to-noise ratio slope and power offset of the ESSR to provide a fundamental comparison of the WoJ, FJ, and GNJ scenarios. Based on our analysis, we propose a simple relay selection criterion for the scenario when the BS and MU are assisted by multiple untrusted relays. Numerical examples are presented to demonstrate the impact of the jammer’s location, number of antennas and the advantage of the proposed relay selection criterion on the secrecy performance. Our findings highlight that similar to the trusted relaying scenario, the ESSR of all three secure transmission scenarios improve as the number of untrusted relays increases. Moreover, we highlight an interesting insight that the OPA for the GNJ scenario results in the same ESSR performance as the OPA for the WoJ scenario.

[1]  Zhu Han,et al.  Physical Layer Security for Two-Way Untrusted Relaying With Friendly Jammers , 2012, IEEE Transactions on Vehicular Technology.

[2]  Xiaoli Chu,et al.  Secure resource allocation for OFDMA two-way relay networks , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).

[3]  Haijun Zhang,et al.  Resource allocation for OFDMA two-way relay networks with the smart grid , 2014, 2014 International Symposium on Wireless Personal Multimedia Communications (WPMC).

[4]  Ender Tekin,et al.  The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.

[5]  A. Lee Swindlehurst,et al.  Joint transmit design and node selection for one-way and two-way untrusted relay channels , 2013, 2013 Asilomar Conference on Signals, Systems and Computers.

[6]  Jaesung Lim,et al.  Capacity Scaling and Diversity Order for Secure Cooperative Relaying With Untrustworthy Relays , 2015, IEEE Transactions on Wireless Communications.

[7]  Mohamed Ibnkahla,et al.  An Accurate Approximation of the Exponential Integral Function Using a Sum of Exponentials , 2013, IEEE Communications Letters.

[8]  Yasutada Oohama,et al.  Coding for relay channels with confidential messages , 2001, Proceedings 2001 IEEE Information Theory Workshop (Cat. No.01EX494).

[9]  Matthew R. McKay,et al.  Secure Transmission With Artificial Noise Over Fading Channels: Achievable Rate and Optimal Power Allocation , 2010, IEEE Transactions on Vehicular Technology.

[10]  Lifeng Wang,et al.  Physical Layer Security of Maximal Ratio Combining in Two-Wave With Diffuse Power Fading Channels , 2014, IEEE Transactions on Information Forensics and Security.

[11]  Toshiaki Miyazaki,et al.  Antieavesdropping With Selfish Jamming in Wireless Networks: A Bertrand Game Approach , 2017, IEEE Transactions on Vehicular Technology.

[12]  Eduard A. Jorswieck,et al.  Secrecy in the two-way untrusted relay channel with compute-and-forward , 2015, 2015 IEEE International Conference on Communications (ICC).

[13]  Ali Kuhestani,et al.  Joint Relay Selection and Power Allocation in Large-Scale MIMO Systems With Untrusted Relays and Passive Eavesdroppers , 2017, IEEE Transactions on Information Forensics and Security.

[14]  Phee Lep Yeoh,et al.  Optimal Power Allocation and Secrecy Sum Rate in Two-Way Untrusted Relaying , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[15]  Masoud Ardakani,et al.  Ergodic sum rate analysis and efficient power allocation for a massive MIMO two-way relay network , 2017, IET Commun..

[16]  Jing Huang,et al.  Secure Transmission with Optimal Power Allocation in Untrusted Relay Networks , 2014, IEEE Wireless Communications Letters.

[17]  Jun Zhao,et al.  Resource Management Based on Security Satisfaction Ratio with Fairness-Aware in Two-Way Relay Networks , 2015, Int. J. Distributed Sens. Networks.

[18]  Lajos Hanzo,et al.  Joint Relay and Jammer Selection Improves the Physical Layer Security in the Face of CSI Feedback Delays , 2015, IEEE Transactions on Vehicular Technology.

[19]  Li Sun,et al.  Performance Study of Two-Hop Amplify-and-Forward Systems With Untrustworthy Relay Nodes , 2012, IEEE Transactions on Vehicular Technology.

[20]  Moslem Noori,et al.  Optimal power allocation to improve secrecy performance of non-regenerative cooperative systems using an untrusted relay , 2016, IET Commun..

[21]  Victor C. M. Leung,et al.  Secure Resource Allocation for OFDMA Two-Way Relay Wireless Sensor Networks Without and With Cooperative Jamming , 2016, IEEE Transactions on Industrial Informatics.

[22]  Majid Moradikia,et al.  EE-RS and PA for untrusted relay network at high signal-to-noise ratio regime , 2016, IET Commun..

[23]  Andrew Thangaraj,et al.  Secure Compute-and-Forward in , 2015 .

[24]  Meixia Tao,et al.  Secure Beamforming for MIMO Two-Way Communications With an Untrusted Relay , 2013, IEEE Transactions on Signal Processing.

[25]  Tho Le-Ngoc,et al.  Physical layer security in wireless cooperative relay networks: state of the art and beyond , 2015, IEEE Communications Magazine.

[26]  Sennur Ulukus,et al.  Wireless Physical-Layer Security: Lessons Learned From Information Theory , 2015, Proceedings of the IEEE.

[27]  Abbas Mohammadi,et al.  Joint optimal power allocation and relay selection to establish secure transmission in uplink transmission of untrusted relays network , 2016, IET Networks.

[28]  Antonia Maria Tulino,et al.  Random Matrix Theory and Wireless Communications , 2004, Found. Trends Commun. Inf. Theory.

[29]  Huiming Wang,et al.  Hybrid Opportunistic Relaying and Jamming With Power Allocation for Secure Cooperative Networks , 2015, IEEE Transactions on Wireless Communications.

[30]  Branka Vucetic,et al.  Performance analysis of beamforming in two hop amplify and forward relay networks with antenna correlation , 2009, IEEE Transactions on Wireless Communications.

[31]  Jinhong Yuan,et al.  Cooperative jamming protocols in two hop amplify-and-forward wiretap channels , 2013, 2013 IEEE International Conference on Communications (ICC).

[32]  Lifeng Wang,et al.  Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.

[33]  Aylin Yener,et al.  Two-Hop Secure Communication Using an Untrusted Relay: A Case for Cooperative Jamming , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[34]  A. Lee Swindlehurst,et al.  Secure Communication Via an Untrusted Non-Regenerative Relay in Fading Channels , 2013, IEEE Transactions on Signal Processing.

[35]  Zhu Han,et al.  Physical Layer Security Game: Interaction between Source, Eavesdropper, and Friendly Jammer , 2009, EURASIP J. Wirel. Commun. Netw..