Cooperative jamming for energy harvesting multicast networks with an untrusted relay

Recently, there are increasing requirements of security in wireless communications, especially for the multiuser systems. In this study, the authors consider the security of two-hop cooperative multicast networks with an untrusted relay. An energy harvesting destination aided cooperative jamming framework is proposed to protect information from being intercepted by the untrusted relay. For the multiple destinations, a maximum interference jammer selection (MIJS) scheme is proposed to further improve physical layer security. Then the ergodic secrecy rate (ESR) for MIJS scheme is investigated and both the lower bound of ESR and the approximation of ESR are obtained. Finally, the effect of both the energy arrival rate and the number of destination nodes on ESR has been shown via numerical simulations. It can be revealed that as the number of destinations increases, the ESR is determined with two common behaviours regarding the multicast nature and energy arrival rate: (i) multicast nature forces the secrecy rate to decrease with the increasing number of destinations and (ii) the probability that a jammer exists increases with the increasing number of destinations but limited to one.

[1]  Jianfeng Ma,et al.  Divide-and-conquer based cooperative jamming: Addressing multiple eavesdroppers in close proximity , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.

[2]  Hai Su,et al.  Fast and scalable secret key generation exploiting channel phase randomness in wireless networks , 2011, 2011 Proceedings IEEE INFOCOM.

[3]  Lajos Hanzo,et al.  A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.

[4]  Huiming Wang,et al.  Hybrid Opportunistic Relaying and Jamming With Power Allocation for Secure Cooperative Networks , 2015, IEEE Transactions on Wireless Communications.

[5]  Kin K. Leung,et al.  On the Application of Cooperative Transmission to Secrecy Communications , 2012, IEEE Journal on Selected Areas in Communications.

[6]  Rui Zhang,et al.  Wireless Powered Cooperative Jamming for Secrecy Multi-AF Relaying Networks , 2015, IEEE Transactions on Wireless Communications.

[7]  Abbas Mohammadi,et al.  Joint optimal power allocation and relay selection to establish secure transmission in uplink transmission of untrusted relays network , 2016, IET Networks.

[8]  He Chen,et al.  Towards secure communication via a wireless-powered full-duplex jammer , 2016, 2016 IEEE International Conference on Ubiquitous Wireless Broadband (ICUWB).

[9]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[10]  Michele Zorzi,et al.  Achievable Secrecy Rates of an Energy Harvesting Device , 2016, IEEE Journal on Selected Areas in Communications.

[11]  Zhu Han,et al.  Joint Relay and Jammer Selection for Secure Two-Way Relay Networks , 2012, IEEE Trans. Inf. Forensics Secur..

[12]  Dongtang Ma,et al.  Destination-Aided Cooperative Jamming for Dual-Hop Amplify-and-Forward MIMO Untrusted Relay Systems , 2016, IEEE Transactions on Vehicular Technology.

[13]  H. Vincent Poor,et al.  Near-Optimal Modulo-and-Forward Scheme for the Untrusted Relay Channel , 2016, IEEE Transactions on Information Theory.

[14]  Adrish Banerjee,et al.  Secure Communication via a Wireless Energy Harvesting Untrusted Relay , 2015, IEEE Transactions on Vehicular Technology.

[15]  Mansoor Shafi,et al.  Capacity Limits and Performance Analysis of Cognitive Radio With Imperfect Channel Knowledge , 2010, IEEE Transactions on Vehicular Technology.

[16]  Il-Min Kim,et al.  Joint Secure Beamforming Design at the Source and the Relay for an Amplify-and-Forward MIMO Untrusted Relay System , 2012, IEEE Transactions on Signal Processing.

[17]  Aylin Yener,et al.  Cooperation With an Untrusted Relay: A Secrecy Perspective , 2009, IEEE Transactions on Information Theory.

[18]  Zhu Han,et al.  Physical Layer Security for Two Way Relay Communications with Friendly Jammers , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[19]  Jing Wang,et al.  Cooperative jamming and power allocation with untrusty two-way relay nodes , 2014, IET Commun..

[20]  Li Sun,et al.  Performance Study of Two-Hop Amplify-and-Forward Systems With Untrustworthy Relay Nodes , 2012, IEEE Transactions on Vehicular Technology.

[21]  Rui Zhang,et al.  MIMO Broadcasting for Simultaneous Wireless Information and Power Transfer , 2013 .

[22]  Zhu Han,et al.  Secure Green Communication via Untrusted Two-Way Relaying: A Physical Layer Approach , 2016, IEEE Transactions on Communications.

[23]  Steven P. Weber,et al.  On Cooperative Relaying Schemes for Wireless Physical Layer Security , 2010, IEEE Transactions on Signal Processing.

[24]  Jeffrey G. Andrews,et al.  Multicast Outage Probability and Transmission Capacity of Multihop Wireless Networks , 2011, IEEE Transactions on Information Theory.

[25]  A. Lee Swindlehurst,et al.  Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.

[26]  Hamid Jafarkhani,et al.  Cooperative Jamming and Power Allocation for Wireless Relay Networks in Presence of Eavesdropper , 2011, 2011 IEEE International Conference on Communications (ICC).

[27]  Zhu Han,et al.  Physical Layer Security for Two-Way Untrusted Relaying With Friendly Jammers , 2012, IEEE Transactions on Vehicular Technology.

[28]  Ioannis Krikidis,et al.  Relay Selection in Wireless Powered Cooperative Networks With Energy Storage , 2015, IEEE Journal on Selected Areas in Communications.

[29]  Xudong Wang,et al.  Fast secret key generation in static wireless networks: A virtual channel approach , 2013, 2013 Proceedings IEEE INFOCOM.

[30]  Tran Trung Duy,et al.  Relay Selection for Security Enhancement in Cognitive Relay Networks , 2015, IEEE Wireless Communications Letters.

[31]  Yaming Wang,et al.  Secure Beamforming for MIMO Broadcasting With Wireless Information and Power Transfer , 2014, IEEE Transactions on Wireless Communications.

[32]  Minyi Guo,et al.  Secrecy Capacity Optimization via Cooperative Relaying and Jamming for WANETs , 2015, IEEE Transactions on Parallel and Distributed Systems.

[33]  Naofal Al-Dhahir,et al.  Security of Rechargeable Energy-Harvesting Transmitters in Wireless Networks , 2016, IEEE Wireless Communications Letters.

[34]  Lu Lv,et al.  Improving physical layer security in untrusted relay networks: cooperative jamming and power allocation , 2017, IET Commun..

[35]  Anthony Ephremides,et al.  On the Stability of Random Multiple Access With Stochastic Energy Harvesting , 2015, IEEE Journal on Selected Areas in Communications.

[36]  Zhiguo Ding,et al.  Cooperative non-orthogonal relaying for security enhancement in untrusted relay networks , 2017, 2017 IEEE International Conference on Communications (ICC).

[37]  Hai Jiang,et al.  Cooperative Wireless Multicast: Performance Analysis and Time Allocation , 2016, IEEE Transactions on Vehicular Technology.

[38]  Yupeng Liu,et al.  Destination assisted cooperative jamming for wireless physical layer security , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).

[39]  Salman Durrani,et al.  Secure Communication With a Wireless-Powered Friendly Jammer , 2014, IEEE Transactions on Wireless Communications.

[40]  Do-Hoon Kim,et al.  Opportunistic Transmission of Nonregenerative Network With Untrusted Relay , 2015, IEEE Transactions on Vehicular Technology.