On Security-Delay Trade-Off in Two-Hop Wireless Networks With Buffer-Aided Relay Selection

This paper investigates the security-delay trade-off of the buffer-aided relay selection scheme in a two-hop wireless system, which consists of a source-destination pair, one eavesdropper, and multiple relays each having a finite buffer. To evaluate the security and delay performances of the system, we derive analytical expressions for the end-to-end (E2E) secure transmission probability (STP) and the expected E2E delay under both perfect and partial eavesdropper channel state information (CSI) cases. These analytical expressions help us to explore the inherent trade-off between the security and delay performances of the concerned system. In particular, the results in this paper indicate that: 1) the maximum E2E STP increases as the constraint on the expected E2E delay becomes less strict, and such trend is more sensitive to the variation of the number of relays than that of the relay buffer size; 2) on the other hand, the minimum expected E2E delay tends to decrease when a less strict constraint on E2E STP is imposed, and this trend is more sensitive to the variation of the relay buffer size than that of the number of relays.

[1]  Rodrigo C. de Lamare,et al.  Study of Relay Selection for Physical-Layer Security in Buffer-Aided Relay Networks Based on the Secrecy Rate Criterion , 2016, ArXiv.

[2]  Feifei Gao,et al.  Zero-forcing beamforming for physical layer security of energy harvesting wireless communications , 2015, EURASIP Journal on Wireless Communications and Networking.

[3]  H. Vincent Poor,et al.  Cooperative Beamforming and User Selection for Improving the Security of Relay-Aided Systems , 2015, IEEE Transactions on Communications.

[4]  John S. Thompson,et al.  Relay selection for secure cooperative networks with jamming , 2009, IEEE Transactions on Wireless Communications.

[5]  Yajun Zhang,et al.  A New Max-Ratio Relay Selection Scheme in Secure Buffer-Aided Cooperative Wireless Networks , 2015, 2015 8th International Symposium on Computational Intelligence and Design (ISCID).

[6]  Meixia Tao,et al.  Relay Placement for Physical Layer Security: A Secure Connection Perspective , 2012, IEEE Communications Letters.

[7]  Li Xu,et al.  Stackelberg game based relay selection for physical layer security and energy efficiency enhancement in cognitive radio networks , 2017, Appl. Math. Comput..

[8]  Huiming Wang,et al.  On the Secrecy Throughput Maximization for MISO Cognitive Radio Network in Slow Fading Channels , 2014, IEEE Transactions on Information Forensics and Security.

[9]  A. Lee Swindlehurst,et al.  Buffer-Aided Relaying for Two-Hop Secure Communication , 2015, IEEE Transactions on Wireless Communications.

[10]  Zhenqiang Wu,et al.  The Delay-Security Trade-Off in Two-Hop Buffer-Aided Relay Wireless Network , 2016, 2016 International Conference on Networking and Network Applications (NaNA).

[11]  J. Barros,et al.  LDPC codes for the Gaussian wiretap channel , 2009 .

[12]  Zhi Chen,et al.  Max-Ratio Relay Selection in Secure Buffer-Aided Cooperative Wireless Networks , 2014, IEEE Transactions on Information Forensics and Security.

[13]  A. Lee Swindlehurst,et al.  Cooperative Jamming for Secure Communications in MIMO Relay Networks , 2011, IEEE Transactions on Signal Processing.

[14]  Matthieu R. Bloch,et al.  Physical-Layer Security: From Information Theory to Security Engineering , 2011 .

[15]  Hong Wen,et al.  Achieving Secure Communications over Wiretap Channels via Security Codes from Resilient Functions , 2014, IEEE Wireless Communications Letters.

[16]  Peter W. Shor,et al.  Algorithms for quantum computation: discrete logarithms and factoring , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.

[17]  Byung-Jae Kwak,et al.  LDPC Codes for the Gaussian Wiretap Channel , 2009, IEEE Transactions on Information Forensics and Security.

[18]  Vahid Jamali,et al.  Bidirectional Buffer-Aided Relay Networks With Fixed Rate Transmission - Part II: Delay-Constrained Case , 2015, IEEE Trans. Wirel. Commun..

[19]  Remi A. Chou,et al.  Polar coding for the multiple access wiretap channel via rate-splitting and cooperative jamming , 2016, 2016 IEEE International Symposium on Information Theory (ISIT).

[20]  A T Karygiannis,et al.  Wireless Network Security: 802.11, Bluetooth and Handheld Devices , 2002 .

[21]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[22]  Can Emre Koksal,et al.  On Secrecy Capacity Scaling in Wireless Networks , 2012, IEEE Trans. Inf. Theory.

[23]  Katrin Baumgartner,et al.  Computer Networks And Systems Queueing Theory And Performance Evaluation , 2016 .

[24]  Xiangyun Zhou,et al.  When Does Relay Transmission Give a More Secure Connection in Wireless Ad Hoc Networks? , 2014, IEEE Transactions on Information Forensics and Security.

[25]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2007, ISIT.

[26]  Shihao Yan,et al.  Artificial Noise: Transmission Optimization in Multi-Input Single-Output Wiretap Channels , 2015, IEEE Transactions on Communications.

[27]  Yueming Cai,et al.  Secrecy Outage Analysis of Buffer-Aided Cooperative MIMO Relaying Systems , 2018, IEEE Transactions on Vehicular Technology.

[28]  Cheng Huang,et al.  PTRS: A privacy-preserving trust-based relay selection scheme in VANETs , 2016, Peer-to-Peer Networking and Applications.

[29]  Matthew R. McKay,et al.  On the Design of Artificial-Noise-Aided Secure Multi-Antenna Transmission in Slow Fading Channels , 2012, IEEE Transactions on Vehicular Technology.

[30]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[31]  Yueming Cai,et al.  Secrecy outage analysis of buffer-aided multi-antenna relay systems without eavesdropper's CSI , 2017, 2017 IEEE International Conference on Communications (ICC).

[32]  R. K. Bunkar,et al.  Data Security and Privacy Protection Issues in Cloud Computing , 2014 .

[33]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[34]  Javier López,et al.  Relay selection for secure 5G green communications , 2015, Telecommun. Syst..

[35]  Naofal Al-Dhahir,et al.  Enhancing the PHY-Layer Security of MIMO Buffer-Aided Relay Networks , 2016, IEEE Wireless Communications Letters.

[36]  Naofal Al-Dhahir,et al.  Physical-Layer Security of a Buffer-Aided Full-Duplex Relaying System , 2016, IEEE Communications Letters.

[37]  Kah Chan Teh,et al.  Buffer State Based Relay Selection for Buffer-Aided Cooperative Relaying Systems , 2015, IEEE Transactions on Wireless Communications.

[38]  Vijay K. Bhargava,et al.  Diversity and Delay Analysis of Buffer-Aided BICM-OFDM Relaying , 2013, IEEE Transactions on Wireless Communications.

[39]  John S. Thompson,et al.  Buffer-Aided Relay Selection for Cooperative Diversity Systems without Delay Constraints , 2012, IEEE Transactions on Wireless Communications.

[40]  Tony Q. S. Quek,et al.  Physical-Layer Secret Key Generation With Colluding Untrusted Relays , 2016, IEEE Transactions on Wireless Communications.

[41]  Yuping Zhao,et al.  Delay Sensitive Communications over Cognitive Radio Networks , 2012, IEEE Transactions on Wireless Communications.