Energy-efficient secure multiuser scheduling in energy harvesting untrusted relay networks

In this paper, we investigate opportunistic secure multiuser scheduling in energy harvesting untrusted relay networks, where an energy-constrained amplify-and-forward (AF) relay harvests energy from the received radio frequency signal via using the power splitting protocol. To exploit the potential advantages (e.g., multiuser diversity and direct links) for secrecy improvement, we examine three opportunistic user scheduling schemes, i.e., optimal scheduling scheme, maximum scheduling scheme, and minimum scheduling scheme. Specifically, the optimal scheduling scheme performs user selection by maximizing the ratio between the signal-to-noise-ratio (SNR) at the destination and the corresponding SNR at the untrusted relay. The maximum scheduling scheme is conventional user selection that maximizes the channel gain of the direct links. For the minimum scheduling scheme, we try to reduce the overheard information at the untrusted relay by selecting the user with the lowest channel gain of the relay links. For these three schemes, we comprehensively examine the achievable secrecy performance including probability of positive secrecy rate, secrecy outage probability (SOP), asymptotic SOP, secrecy throughput (ST), as well as secure energy efficiency (SEE) to help facilitate an energy-efficient secure transmission design. Simulation results demonstrate that the maximum scheduling scheme outperforms the minimum scheduling scheme in terms of SOP at relatively low SNRs and target secrecy rates.

[1]  Yueming Cai,et al.  Secure Downlink Transmission in the Internet of Things: How Many Antennas Are Needed? , 2018, IEEE Journal on Selected Areas in Communications.

[2]  Kin K. Leung,et al.  On the Application of Cooperative Transmission to Secrecy Communications , 2012, IEEE Journal on Selected Areas in Communications.

[3]  Xianbin Wang,et al.  Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks , 2013, IEEE Journal on Selected Areas in Communications.

[4]  Xiangfeng Wang,et al.  Joint Power Splitting and Secure Beamforming Design in the Multiple Non-Regenerative Wireless-Powered Relay Networks , 2015, IEEE Communications Letters.

[5]  Li Sun,et al.  Security-Aware Relaying Scheme for Cooperative Networks With Untrusted Relay Nodes , 2015, IEEE Communications Letters.

[6]  Adrish Banerjee,et al.  Secure Communication via a Wireless Energy Harvesting Untrusted Relay , 2015, IEEE Transactions on Vehicular Technology.

[7]  Yueming Cai,et al.  Secure Transmission Design With Feedback Compression for the Internet of Things , 2018, IEEE Transactions on Signal Processing.

[8]  Il-Min Kim,et al.  Joint Secure Beamforming Design at the Source and the Relay for an Amplify-and-Forward MIMO Untrusted Relay System , 2012, IEEE Transactions on Signal Processing.

[9]  Aylin Yener,et al.  Cooperation With an Untrusted Relay: A Secrecy Perspective , 2009, IEEE Transactions on Information Theory.

[10]  John S. Thompson,et al.  Amplify-and-forward with partial relay selection , 2008, IEEE Communications Letters.

[11]  Ali A. Nasir,et al.  Relaying Protocols for Wireless Energy Harvesting and Information Processing , 2012, IEEE Transactions on Wireless Communications.

[12]  Zhu Han,et al.  Physical Layer Security for Two-Way Untrusted Relaying With Friendly Jammers , 2012, IEEE Transactions on Vehicular Technology.

[13]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[14]  K. J. Ray Liu,et al.  Advances in Energy Harvesting Communications: Past, Present, and Future Challenges , 2016, IEEE Communications Surveys & Tutorials.

[15]  Ali Kuhestani,et al.  Joint Relay Selection and Power Allocation in Large-Scale MIMO Systems With Untrusted Relays and Passive Eavesdroppers , 2017, IEEE Transactions on Information Forensics and Security.

[16]  Kamel Tourki,et al.  Adaptive Secure Transmission for RF-EH Untrusted Relaying with Alien Eavesdropping , 2017, IEEE Communications Letters.

[17]  Michael Gastpar,et al.  Secure Transmission on the Two-Hop Relay Channel With Scaled Compute-and-Forward , 2015, IEEE Transactions on Information Theory.

[18]  Zhu Han,et al.  Secure Green Communication via Untrusted Two-Way Relaying: A Physical Layer Approach , 2016, IEEE Transactions on Communications.

[19]  Aylin Yener,et al.  Multi-Terminal Two-Hop Untrusted-Relay Networks With Hierarchical Security Guarantees , 2017, IEEE Transactions on Information Forensics and Security.

[20]  Lajos Hanzo,et al.  Joint Relay and Jammer Selection Improves the Physical Layer Security in the Face of CSI Feedback Delays , 2015, IEEE Transactions on Vehicular Technology.

[21]  H. Vincent Poor,et al.  Power Allocation Strategies in Energy Harvesting Wireless Cooperative Networks , 2013, IEEE Transactions on Wireless Communications.

[22]  Rose Qingyang Hu,et al.  Multiuser Cognitive Relay Networks: Joint Impact of Direct and Relay Communications , 2014, IEEE Transactions on Wireless Communications.

[23]  Do-Hoon Kim,et al.  Opportunistic Transmission of Nonregenerative Network With Untrusted Relay , 2015, IEEE Transactions on Vehicular Technology.

[24]  Farshad Lahouti,et al.  Link Adaptation with Untrusted Relay Assignment: Design and Performance Analysis , 2013, IEEE Transactions on Communications.

[25]  Meixia Tao,et al.  Secure Beamforming for MIMO Two-Way Communications With an Untrusted Relay , 2013, IEEE Transactions on Signal Processing.

[26]  George K. Karagiannidis,et al.  Secure Multiuser Communications in Multiple Amplify-and-Forward Relay Networks , 2014, IEEE Transactions on Communications.

[27]  Zhu Han,et al.  Wireless Networks With RF Energy Harvesting: A Contemporary Survey , 2014, IEEE Communications Surveys & Tutorials.

[28]  Dongtang Ma,et al.  Destination-Aided Cooperative Jamming for Dual-Hop Amplify-and-Forward MIMO Untrusted Relay Systems , 2016, IEEE Transactions on Vehicular Technology.

[29]  Yueming Cai,et al.  Energy-Efficient Secure Transmission Design for the Internet of Things With an Untrusted Relay , 2018, IEEE Access.

[30]  Xiaofeng Tao,et al.  Secure Transmission in SWIPT-Powered Two-Way Untrusted Relay Networks , 2018, IEEE Access.

[31]  Li Sun,et al.  Performance Study of Two-Hop Amplify-and-Forward Systems With Untrustworthy Relay Nodes , 2012, IEEE Transactions on Vehicular Technology.

[32]  Yueming Cai,et al.  Physical Layer Security in Cognitive Untrusted Relay Networks , 2018, IEEE Access.

[33]  Miguel R. D. Rodrigues,et al.  Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.

[34]  Tao Zhang,et al.  Secure Multiantenna Cognitive Wiretap Networks , 2017, IEEE Transactions on Vehicular Technology.

[35]  Amitav Mukherjee,et al.  Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints , 2015, Proceedings of the IEEE.

[36]  Kin K. Leung,et al.  Opportunistic Relaying for Secrecy Communications: Cooperative Jamming vs. Relay Chatting , 2011, IEEE Transactions on Wireless Communications.

[37]  Quanzhong Li,et al.  Robust AN-Aided Secure Precoding for an AF MIMO Untrusted Relay System , 2017, IEEE Transactions on Vehicular Technology.

[38]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[39]  Yueming Cai,et al.  Energy efficiency analysis and enhancement for secure transmission in SWIPT systems exploiting full duplex techniques , 2016, IET Commun..

[40]  A. Lee Swindlehurst,et al.  Secure Communication Via an Untrusted Non-Regenerative Relay in Fading Channels , 2013, IEEE Transactions on Signal Processing.