Distributed Matching Algorithms: Maximizing Secrecy in the Presence of Untrusted Relay

In this paper, we propose a secrecy sum-rate maximization based matching algorithm between primary transmitters and secondary cooperative jammers in the presence of an eavesdropper. More explicitly, we consider an untrusted relay scenario, where the relay is a potential eavesdropper. We first show the achievable secrecy regions employing a friendly jammer in a cooperative scenario with employing an untrusted relay. Then, we provide results for the secrecy regions for two cases, one where we consider that there is no direct link between the source and the destination, for the second case we consider that in addition to the relay link we also have a direct link between the source and destination. Furthermore, a friendly jammer helps to send a noise signal during the first phase of the cooperative transmission, for securing the information transmitted from the source. In our matching algorithm, the selected cooperative jammer or the secondary user, is rewarded with the spectrum allocation for a fraction of time slot from the source which is the primary user. The Conventional Distributed Algorithm (CDA) and the Pragmatic Distributed Algorithm (PDA), which were originally designed for maximising the user’s sum rate, are modified and adapted for maximizing the secrecy sum-rate for the primary user. Instead of assuming perfect modulation and/or perfect channel coding, we have also investigated our proposed schemes when practical channel coding and modulation schemes are invoked.

[1]  Aylin Yener,et al.  Multi-terminal networks with an untrusted relay , 2014, 2014 52nd Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[2]  Kai-Kit Wong,et al.  To Harvest and Jam: A Paradigm of Self-Sustaining Friendly Jammers for Secure AF Relaying , 2015, IEEE Transactions on Signal Processing.

[3]  Wenyu Luo,et al.  A tractable approach to analyzing the physical-layer security in K-tier heterogeneous cellular networks , 2015 .

[4]  Lida Xu,et al.  The internet of things: a survey , 2014, Information Systems Frontiers.

[5]  Lajos Hanzo,et al.  Pragmatic Distributed Algorithm for Spectral Access in Cooperative Cognitive Radio Networks , 2014, IEEE Transactions on Communications.

[6]  Peng Ning,et al.  No time to demodulate - fast physical layer verification of friendly jamming , 2015, MILCOM 2015 - 2015 IEEE Military Communications Conference.

[7]  Ivan Martinovic,et al.  Friendly Jamming on Access Points: Analysis and Real-World Measurements , 2016, IEEE Transactions on Wireless Communications.

[8]  Lajos Hanzo,et al.  On the MIMO channel capacity of multidimensional signal sets , 2006, IEEE Transactions on Vehicular Technology.

[9]  Dongtang Ma,et al.  Destination-Aided Cooperative Jamming for Dual-Hop Amplify-and-Forward MIMO Untrusted Relay Systems , 2016, IEEE Transactions on Vehicular Technology.

[10]  Wang Baoyun,et al.  Coalition formation game of dual-identity nodes for improving PHY security of wireless networks , 2015, The 27th Chinese Control and Decision Conference (2015 CCDC).

[11]  Amitav Mukherjee,et al.  Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints , 2015, Proceedings of the IEEE.

[12]  Aylin Yener,et al.  Improving Secrecy Rate via Spectrum Leasing for Friendly Jamming , 2013, IEEE Transactions on Wireless Communications.

[13]  Marwan Krunz,et al.  Supporting PHY-Layer Security in Multi-Link Wireless Networks Using Friendly Jamming , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).

[14]  Lifeng Wang,et al.  Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.

[15]  Donald F. Towsley,et al.  Physical Layer Security in Heterogeneous Cellular Networks , 2016, IEEE Transactions on Communications.

[16]  Branka Vucetic,et al.  Dynamic decentralised algorithms for cognitive radio relay networks with multiple primary and secondary users utilising matching theory , 2013, Trans. Emerg. Telecommun. Technol..

[17]  Xiang Zhang,et al.  Partner Selection and Incentive Mechanism for Physical Layer Security , 2015, IEEE Transactions on Wireless Communications.

[18]  An Wang,et al.  Power allocation based on Stackelberg game in a jammer-assisted secure network , 2013 .

[19]  Farshad Lahouti,et al.  Link Adaptation with Untrusted Relay Assignment: Design and Performance Analysis , 2013, IEEE Transactions on Communications.

[20]  Lajos Hanzo,et al.  Self-Concatenated Code Design and its Application in Power-Efficient Cooperative Communications , 2012, IEEE Communications Surveys & Tutorials.

[21]  Adrish Banerjee,et al.  Secure Communication via a Wireless Energy Harvesting Untrusted Relay , 2015, IEEE Transactions on Vehicular Technology.

[22]  Aylin Yener,et al.  The two-hop interference untrusted-relay channel with confidential messages , 2015, 2015 IEEE Information Theory Workshop - Fall (ITW).

[23]  Aylin Yener,et al.  Cooperation With an Untrusted Relay: A Secrecy Perspective , 2009, IEEE Transactions on Information Theory.