Joint subcarrier and power allocation for physical layer security in cooperative OFDMA networks

In this paper, a joint subcarrier and power allocation algorithm is proposed to improve the physical layer security in cooperative orthogonal frequency division multiple access (OFDMA) networks, where several source-destination pairs and one untrusted relay are involved. The relay is friendly and intends to help these pairs to enhance their communications. However, it may be overheard by a malicious eavesdropper at the same time. To optimize the joint subcarrier and power allocation with low complexity, we divide the optimization problem into two simpler subproblems. Firstly, the subcarriers are assigned to the source-destination pairs by employing the dual approach under the assumption that the relay power is equally allocated to all the subcarriers. Then, the relay power is allocated to the subcarriers based on the alternative ascending clock auction mechanism. In addition, we prove that the two subproblems can converge after a finite number of iterations. We also find that the proposed auction is cheat-proof and, thus, can avoid the cheating behaviors in the auction process. Numerical results demonstrate that our proposed algorithm can effectively improve the system sum secrecy rate, and the convergence performance is also desirable.

[1]  Lawrence M. Ausubel An Efficient Ascending-Bid Auction for Multiple Objects , 2004 .

[2]  Peter Marbach,et al.  Downlink resource allocation and pricing for wireless networks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.

[3]  Zhu Han,et al.  Physical layer security: Coalitional games for distributed cooperation , 2009, 2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks.

[4]  Zhu Han,et al.  Physical Layer Security Game: Interaction between Source, Eavesdropper, and Friendly Jammer , 2009, EURASIP J. Wirel. Commun. Netw..

[5]  Meixia Tao,et al.  Power and Subcarrier Allocation for Physical-Layer Security in OFDMA Networks , 2011, 2011 IEEE International Conference on Communications (ICC).

[6]  Mounir Ghogho,et al.  Outage Probability Based Power Distribution Between Data and Artificial Noise for Physical Layer Security , 2012, IEEE Signal Processing Letters.

[7]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[8]  David J. Keffer,et al.  Using Multiple-Mode Models for Fitting and Predicting Rheological Properties of Polymeric Melts , 2006 .

[9]  Wei Yu,et al.  Dual methods for nonconvex spectrum optimization of multicarrier systems , 2006, IEEE Transactions on Communications.

[10]  Michael L. Honig,et al.  Auction-Based Spectrum Sharing , 2006, Mob. Networks Appl..

[11]  Hamid Jafarkhani,et al.  Cooperative Jamming and Power Allocation for Wireless Relay Networks in Presence of Eavesdropper , 2011, 2011 IEEE International Conference on Communications (ICC).

[12]  Zhu Han,et al.  Physical Layer Security for Two-Way Untrusted Relaying With Friendly Jammers , 2012, IEEE Transactions on Vehicular Technology.

[13]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[14]  G. Nemhauser,et al.  Integer Programming , 2020 .

[15]  Zhu Han,et al.  Improve physical layer security in cooperative wireless network using distributed auction games , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[16]  Aylin Yener,et al.  Two-Hop Secure Communication Using an Untrusted Relay: A Case for Cooperative Jamming , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[17]  Zhu Han,et al.  Physical Layer Security for Two Way Relay Communications with Friendly Jammers , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[18]  Zhu Han,et al.  Auction-Based Resource Allocation for Cooperative Communications , 2008, IEEE Journal on Selected Areas in Communications.

[19]  Jianhua Lu,et al.  QoS aware relay selection and subcarrier allocation in cooperative OFDMA systems , 2010, IEEE Communications Letters.

[20]  Aylin Yener,et al.  Cooperation With an Untrusted Relay: A Secrecy Perspective , 2009, IEEE Transactions on Information Theory.

[21]  Chi Wan Sung,et al.  A generalized framework for distributed power control in wireless networks , 2005, IEEE Trans. Inf. Theory.