Secrecy Outage and Diversity Analysis of Multiple Cooperating Source-Destination Pairs

We study the physical-layer security of multiple source-destination (SD) pairs communicating within a wireless network in the face of an eavesdropper attacking the SD pairs. In order to protect the wireless transmission against eavesdropping, we propose a cooperation framework relying on two stages. Specifically, an SD pair is selected to access the total allocated spectrum using an appropriately designed scheme at the beginning of the first stage. The other source nodes (SNs) simultaneously transmit their data to the SN of the above-mentioned SD pair relying on orthogonal resources during the first stage. Then, the SN of the chosen SD pair transmits the data packets containing its own messages and the other SNs’ messages to its dedicated destination node (DN) in the second stage. Finally, this dedicated DN will forward all the other DNs’ data to the application center via the core network. We conceive a specific SD pair selection scheme, termed as the transmit antenna selection aided source-destination pair selection (TAS-SDPS). We continue by deriving the secrecy outage probability (SOP) expressions of both the TAS-SDPS conceived, as well as of the conventional round-robin source-destination pair selection (RSDPS) and of the conventional non-cooperative (Non-coop) schemes for comparison. Furthermore, we carry out the secrecy diversity gain analysis in the high main-to-eavesdropper ratio (MER) region, showing that the TAS-SDPS scheme is capable of achieving the maximum attainable secrecy diversity order. Additionally, we show that increasing the number of transmitting pairs will reduce the SOP, whilst increasing the secrecy diversity order of the TAS-SDPS scheme. It is demonstrated that the SOP of the TAS-SDPS scheme is better than that of the RSDPS and of the conventional Non-coop schemes. We also demonstrate that the secrecy diversity gain of the proposed TAS-SDPS scheme is $M$ times that of the RSDPS scheme in the high-MER region, where $M$ is the number of the SD pairs.

[1]  Zhetao Li,et al.  Dynamic Spectrum Sharing for Hybrid Access in OFDMA-Based Cognitive Femtocell Networks , 2018, IEEE Transactions on Vehicular Technology.

[2]  Satyanarayana Vuppala,et al.  Secrecy-Rate Analysis in Multitier Heterogeneous Networks Under Generalized Fading Model , 2017, IEEE Internet of Things Journal.

[3]  Ying-Chang Liang,et al.  Performance Analysis of Collaborative Beamforming With Outdated CSI for Multi-Relay Spectrum Sharing Networks , 2018, IEEE Transactions on Vehicular Technology.

[4]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[5]  Mohamed-Slim Alouini,et al.  Secrecy Outage of Max–Min TAS Scheme in MIMO-NOMA Systems , 2018, IEEE Transactions on Vehicular Technology.

[6]  Feng Liu,et al.  Outage Constrained Secrecy Throughput Maximization for DF Relay Networks , 2015, IEEE Transactions on Communications.

[7]  N. Pillay,et al.  A Study of Single Transmit Antenna Selection with Modulation , 2018 .

[8]  George K. Karagiannidis,et al.  On Secrecy Performance of Antenna-Selection-Aided MIMO Systems Against Eavesdropping , 2015, IEEE Transactions on Vehicular Technology.

[9]  Xuelong Li,et al.  Secrecy Outage and Diversity Analysis of Cognitive Radio Systems , 2014, IEEE Journal on Selected Areas in Communications.

[10]  Lajos Hanzo,et al.  Security-Reliability Tradeoff Analysis of Artificial Noise Aided Two-Way Opportunistic Relay Selection , 2017, IEEE Transactions on Vehicular Technology.

[11]  Jie Xu,et al.  Proactive eavesdropping via cognitive jamming in fading channels , 2016, 2016 IEEE International Conference on Communications (ICC).

[12]  Shihao Yan,et al.  Location-Based Beamforming for Enhancing Secrecy in Rician Wiretap Channels , 2016, IEEE Transactions on Wireless Communications.

[13]  Zhu Han,et al.  Joint Source-Relay Secure Precoding for MIMO Relay Networks With Direct Links , 2017, IEEE Transactions on Communications.

[14]  Zhiguo Ding,et al.  Design of Secure NOMA Against Full-Duplex Proactive Eavesdropping , 2019, IEEE Wireless Communications Letters.

[15]  Tiejun Lv,et al.  Secrecy Transmit Beamforming for Heterogeneous Networks , 2015, IEEE Journal on Selected Areas in Communications.

[16]  Mohamed-Slim Alouini,et al.  On Secure Underlay MIMO Cognitive Radio Networks With Energy Harvesting and Transmit Antenna Selection , 2017, IEEE Transactions on Green Communications and Networking.

[17]  Ali Bereyhi,et al.  Optimal Transmit Antenna Selection for Massive MIMO Wiretap Channels , 2018, IEEE Journal on Selected Areas in Communications.

[18]  Anas M. Salhab,et al.  New Bandwidth Efficient Relaying Schemes in Cooperative Cognitive Two-Way Relay Networks With Physical Layer Security , 2017, IEEE Transactions on Vehicular Technology.

[19]  Geoffrey Ye Li,et al.  Dual-UAV-Enabled Secure Communications: Joint Trajectory Design and User Scheduling , 2018, IEEE Journal on Selected Areas in Communications.

[20]  Lizhong Zheng,et al.  Diversity and multiplexing: a fundamental tradeoff in multiple-antenna channels , 2003, IEEE Trans. Inf. Theory.

[21]  Il-Min Kim,et al.  Joint Secure Beamforming Design at the Source and the Relay for an Amplify-and-Forward MIMO Untrusted Relay System , 2012, IEEE Transactions on Signal Processing.

[22]  Lifeng Wang,et al.  Artificial-Noise Aided Secure Transmission in Large Scale Spectrum Sharing Networks , 2016, IEEE Transactions on Communications.

[23]  Yuan Liu,et al.  Physical Layer Security in Heterogeneous Networks With Jammer Selection and Full-Duplex Users , 2017, IEEE Transactions on Wireless Communications.

[24]  Zhiguo Ding,et al.  Secure MISO-NOMA Transmission With Artificial Noise , 2018, IEEE Transactions on Vehicular Technology.

[25]  Yulong Zou,et al.  Physical-Layer Security for Spectrum Sharing Systems , 2016, IEEE Transactions on Wireless Communications.

[26]  Yunfei Chen,et al.  On Secrecy Performance of MISO SWIPT Systems With TAS and Imperfect CSI , 2016, IEEE Transactions on Communications.

[27]  Huan Zhang,et al.  Secrecy Outage Performance for SIMO Underlay Cognitive Radio Systems With Generalized Selection Combining Over Nakagami-$m$ Channels , 2016, IEEE Transactions on Vehicular Technology.

[28]  Bo Wang,et al.  Artificial-Noise-Aided Beamforming Design in the MISOME Wiretap Channel Under the Secrecy Outage Probability Constraint , 2017, IEEE Transactions on Wireless Communications.

[29]  Yu-Dong Yao,et al.  An Adaptive Cooperation Diversity Scheme With Best-Relay Selection in Cognitive Radio Networks , 2010, IEEE Transactions on Signal Processing.

[30]  Tiejun Lv,et al.  Energy Efficiency and Spectrum Efficiency Tradeoff in the D2D-Enabled HetNet , 2017, IEEE Transactions on Vehicular Technology.

[31]  Tiejun Lv,et al.  Energy-Efficient User Association and Power Control in the Heterogeneous Network , 2017, IEEE Access.

[32]  Dan Keun Sung,et al.  Artificial Noise-Aided User Scheduling for Optimal Secrecy Multiuser Diversity , 2017, IEEE Communications Letters.

[33]  Chengwen Xing,et al.  Space-Time Network Coding With Transmit Antenna Selection and Maximal-Ratio Combining , 2015, IEEE Transactions on Wireless Communications.

[34]  Donald F. Towsley,et al.  Physical Layer Security in Heterogeneous Cellular Networks , 2016, IEEE Transactions on Communications.

[35]  Iain B. Collings,et al.  Transmit Antenna Selection for Security Enhancement in MIMO Wiretap Channels , 2013, IEEE Transactions on Communications.

[36]  Kwok Hung Li,et al.  Enhanced Physical Layer Security in D2D Spectrum Sharing Networks , 2017, IEEE Wireless Communications Letters.

[37]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[38]  Hien Quoc Ngo,et al.  Secure Massive MIMO With the Artificial Noise-Aided Downlink Training , 2018, IEEE Journal on Selected Areas in Communications.

[39]  Geoffrey Ye Li,et al.  Modulation and Multiple Access for 5G Networks , 2017, IEEE Communications Surveys & Tutorials.

[40]  Tony Q. S. Quek,et al.  Transmit Antenna Selection in MIMO Wiretap Channels: A Machine Learning Approach , 2018, IEEE Wireless Communications Letters.

[41]  Lajos Hanzo,et al.  Security Versus Reliability Analysis of Opportunistic Relaying , 2013, IEEE Transactions on Vehicular Technology.