Physical-Layer Security in Full-Duplex Multi-Hop Multi-User Wireless Network With Relay Selection

This paper investigates the relay selection (RS) problem for multi-hop full-duplex relay networks where multiple source–destination (SD) pairs compete for the same pool of relays, under the attack of multiple eavesdroppers. To enhance the physical-layer security, within a given coherence time, our objective is to jointly assign the available relays at each hop to different SD pairs to maximize the minimum secrecy rate among all pairs. Two RS schemes, optimal RS and suboptimal RS (SRS), are proposed for two-hop networks based on global channel state information (CSI) and only SD pairs CSI, respectively. Since all users can communicate within the same coherence time, our joint RS schemes are important for the user-fairness and ultra-reliable low-latency communications. To evaluate the performance, the exact secrecy outage probability of the SRS scheme is derived under two residual self-interference models. The asymptotic analysis shows that the SRS scheme achieves full diversity. A relay-based jamming scheme is also proposed by using unassigned relays for user communications. Finally, the two-hop RS schemes and the analysis are extended to the general multi-hop network with multiple eavesdroppers. The numerical results reveal interesting fundamental trends where the proposed schemes can significantly enhance the secrecy performance.

[1]  Tho Le-Ngoc,et al.  Performance of Full-Duplex AF Relaying in the Presence of Residual Self-Interference , 2014, IEEE Journal on Selected Areas in Communications.

[2]  Xiangyun Zhou,et al.  Secure Routing in Multihop Wireless Ad-Hoc Networks With Decode-and-Forward Relaying , 2016, IEEE Transactions on Communications.

[3]  Song Ci,et al.  On physical layer security for cognitive radio networks , 2013, IEEE Network.

[4]  A. Lee Swindlehurst,et al.  Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.

[5]  Xianbin Wang,et al.  Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks , 2013, IEEE Journal on Selected Areas in Communications.

[6]  Xiangyun Zhou,et al.  Artificial-Noise-Aided Secure Transmission in Wiretap Channels With Transmitter-Side Correlation , 2016, IEEE Transactions on Wireless Communications.

[7]  Jong-Ho Lee,et al.  Full-Duplex Relay for Enhancing Physical Layer Security in Multi-Hop Relaying Systems , 2015, IEEE Communications Letters.

[8]  Joseph B. Evans,et al.  IEEE radio communications - components, systems, and networks [Guest Editorial] , 2008, IEEE Commun. Mag..

[9]  Walid Saad,et al.  Tree Formation with Physical Layer Security Considerations in Wireless Multi-Hop Networks , 2012, IEEE Transactions on Wireless Communications.

[10]  Yindi Jing,et al.  Physical-Layer Security in Full-Duplex Multi-User Relay Networks , 2018, 2018 IEEE International Conference on Communications (ICC).

[11]  Björn E. Ottersten,et al.  Improving Physical Layer Secrecy Using Full-Duplex Jamming Receivers , 2013, IEEE Transactions on Signal Processing.

[12]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[13]  George K. Karagiannidis,et al.  Secure Multiuser Communications in Multiple Amplify-and-Forward Relay Networks , 2014, IEEE Transactions on Communications.

[14]  Lajos Hanzo,et al.  Security-Reliability Tradeoff Analysis of Artificial Noise Aided Two-Way Opportunistic Relay Selection , 2017, IEEE Transactions on Vehicular Technology.

[15]  Philip Levis,et al.  Applications of self-interference cancellation in 5G and beyond , 2014, IEEE Communications Magazine.

[16]  R. Srikant,et al.  Correlated Jamming on MIMO Gaussian Fading Channels , 2004, IEEE Trans. Inf. Theory.

[17]  Zhen Yang,et al.  Joint Source-Relay Selection for Improving Wireless Physical-Layer Security , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).

[18]  Il-Min Kim,et al.  Secure Transmission for Multiuser Relay Networks , 2015, IEEE Transactions on Wireless Communications.

[19]  Xu Yuan,et al.  Secrecy Rate Optimization in Wireless Multi-Hop Full Duplex Networks , 2018, IEEE Access.

[20]  M. Di Renzo,et al.  Energy-Efficient Relay Assignment and Power Control in Multi-User and Multi-Relay Networks , 2018, IEEE Wireless Communications Letters.

[21]  Hien Quoc Ngo,et al.  Secure full-duplex small-cell networks in a spectrum sharing environment , 2016, IEEE Access.

[22]  Amitabh Mishra,et al.  Radio communications: components, systems, and networks [Series Editorial] , 2014, IEEE Commun. Mag..

[23]  Tho Le-Ngoc,et al.  Improving Wireless Secrecy Rate via Full-Duplex Relay-Assisted Protocols , 2015, IEEE Transactions on Information Forensics and Security.

[24]  Jia Zhu,et al.  Power-Constrained Secrecy Rate Maximization for Joint Relay and Jammer Selection Assisted Wireless Networks , 2017, IEEE Transactions on Communications.

[25]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[26]  Ashutosh Sabharwal,et al.  Full-duplex wireless communications using off-the-shelf radios: Feasibility and first results , 2010, 2010 Conference Record of the Forty Fourth Asilomar Conference on Signals, Systems and Computers.

[27]  Dennis Goeckel,et al.  Jamming-aware minimum energy routing in wireless networks , 2014, 2014 IEEE International Conference on Communications (ICC).

[28]  Ariel Orda,et al.  Minimum Energy Routing and Jamming to Thwart Wireless Network Eavesdroppers , 2015, IEEE Transactions on Mobile Computing.

[29]  George K. Karagiannidis,et al.  Exploiting Direct Links for Physical Layer Security in Multiuser Multirelay Networks , 2016, IEEE Transactions on Wireless Communications.

[30]  Li Sun,et al.  Full-Duplex or Half-Duplex? Hybrid Relay Selection for Physical Layer Secrecy , 2016, 2016 IEEE 83rd Vehicular Technology Conference (VTC Spring).

[31]  Lifeng Wang,et al.  Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.

[32]  Hsiao-Hwa Chen,et al.  Enhancing wireless information and power transfer by exploiting multi-antenna techniques , 2015, IEEE Communications Magazine.

[33]  Jeffrey G. Andrews,et al.  Secure Wireless Network Connectivity with Multi-Antenna Transmission , 2011, IEEE Transactions on Wireless Communications.

[34]  Chintha Tellambura,et al.  Multi-User Relay Selection for Full-Duplex Radio , 2019, IEEE Transactions on Communications.

[35]  Aaas News,et al.  Book Reviews , 1893, Buffalo Medical and Surgical Journal.

[36]  Yiwei Thomas Hou,et al.  An Optimal Algorithm for Relay Node Assignment in Cooperative Ad Hoc Networks , 2011, IEEE/ACM Transactions on Networking.

[37]  Anas M. Salhab,et al.  New Bandwidth Efficient Relaying Schemes in Cooperative Cognitive Two-Way Relay Networks With Physical Layer Security , 2017, IEEE Transactions on Vehicular Technology.

[38]  A. Lee Swindlehurst,et al.  Secure Relay and Jammer Selection for Physical Layer Security , 2015, IEEE Signal Processing Letters.

[39]  Fredrik Rusek,et al.  Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks , 2015, IEEE Communications Magazine.

[40]  Tarik Taleb,et al.  Security/QoS-aware route selection in multi-hop wireless ad hoc networks , 2016, 2016 IEEE International Conference on Communications (ICC).

[41]  Aarnout Brombacher,et al.  Probability... , 2009, Qual. Reliab. Eng. Int..

[42]  Yu Gong,et al.  Physical Layer Network Security in the Full-Duplex Relay System , 2015, IEEE Transactions on Information Forensics and Security.

[43]  Hai Jiang,et al.  Relay Selection and Performance Analysis in Multiple-User Networks , 2011, IEEE Journal on Selected Areas in Communications.

[44]  Shihao Yan,et al.  Physical layer security enhancement in multi-user multi-full-duplex-relay networks , 2017, 2017 IEEE International Conference on Communications (ICC).

[45]  Aylin Yener,et al.  Cooperation With an Untrusted Relay: A Secrecy Perspective , 2009, IEEE Transactions on Information Theory.