Secrecy Analysis in Wireless Network With Passive Eavesdroppers by Using Partial Cooperation

This paper proposes a new location-based multicasting technique, for dual phase amplify-and-forward (AF) large networks, aiming to improve the security in the presence of non-colluding passive eavesdroppers. These eavesdroppers could also be part of this cooperative network as relays. In order to reduce the impact of these eavesdroppers on the network security, we propose a new transmission strategy where, for the first hop of each transmission time, while the destination is jamming, the source randomly chooses a different subset <inline-formula><tex-math notation="LaTeX">$K$</tex-math></inline-formula> of the total <inline-formula><tex-math notation="LaTeX">$T$</tex-math></inline-formula> relays, to transmit its message toward the destination. For practical implementation, sectoral transmission can be achieved with analog beamforming at the source's side. In the second hop, using the distributed beamforming technique, the <inline-formula><tex-math notation="LaTeX">$K$</tex-math></inline-formula> AF relays retransmit the received signal to the destination. We analytically demonstrated that the proposed technique decreases the probability of choosing the same sector that has certain eavesdroppers again, for each transmission time, to <inline-formula><tex-math notation="LaTeX">$K/T$</tex-math></inline-formula>. Moreover, we also show that the secrecy capacity scaling of our technique is still the same as for broadcasting. Hereafter, the lower and upper bounds of the secrecy outage probability are calculated, and it is shown that the security performance is remarkably enhanced, compared to conventional multicasting technique.

[1]  Helmut Bölcskei,et al.  Capacity scaling laws in MIMO relay networks , 2006, IEEE Transactions on Wireless Communications.

[2]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2007, ISIT.

[3]  George K. Karagiannidis,et al.  Secure Communications With Cooperative Jamming: Optimal Power Allocation and Secrecy Outage Analysis , 2017, IEEE Transactions on Vehicular Technology.

[4]  Mohamed-Slim Alouini,et al.  Power allocation and cooperative jamming for enhancing physical layer security in opportunistic relay networks in the presence of interference , 2017, Trans. Emerg. Telecommun. Technol..

[5]  Hsiao-Hwa Chen,et al.  A Survey on Multiple-Antenna Techniques for Physical Layer Security , 2017, IEEE Communications Surveys & Tutorials.

[6]  Il-Min Kim,et al.  Joint Secure Beamforming Design at the Source and the Relay for an Amplify-and-Forward MIMO Untrusted Relay System , 2012, IEEE Transactions on Signal Processing.

[7]  Aylin Yener,et al.  Cooperation With an Untrusted Relay: A Secrecy Perspective , 2009, IEEE Transactions on Information Theory.

[8]  Claudio Valencia Cordero,et al.  Towards physical layer security systems design using game theory approaches , 2017, 2017 CHILEAN Conference on Electrical, Electronics Engineering, Information and Communication Technologies (CHILECON).

[9]  Georges Kaddoum,et al.  A Survey on Cooperative Jamming Applied to Physical Layer Security , 2015, 2015 IEEE International Conference on Ubiquitous Wireless Broadband (ICUWB).

[10]  Huiming Wang,et al.  Enhancing wireless secrecy via cooperation: signal design and optimization , 2015, IEEE Communications Magazine.

[11]  Huiming Wang,et al.  Joint Cooperative Beamforming and Jamming to Secure AF Relay Systems With Individual Power Constraint and No Eavesdropper's CSI , 2013, IEEE Signal Processing Letters.

[12]  Jia Zhu,et al.  Joint Cooperative Beamforming and Jamming for Physical-Layer Security of Decode-and-Forward Relay Networks , 2017, IEEE Access.

[13]  Mazen O. Hasna,et al.  Performance analysis of secure AF relay networks using cooperative jamming under outdated CSI , 2017, IET Commun..

[14]  Huiming Wang,et al.  Robust Joint Beamforming and Jamming for Secure AF Networks: Low-Complexity Design , 2015, IEEE Transactions on Vehicular Technology.

[15]  A. Goldsmith,et al.  Capacity of Rayleigh fading channels under different adaptive transmission and diversity-combining techniques , 1999, IEEE Transactions on Vehicular Technology.

[16]  Hyun-Ho Choi,et al.  Adaptive Wireless-Powered Relaying Schemes With Cooperative Jamming for Two-Hop Secure Communication , 2018, IEEE Internet of Things Journal.

[17]  Georges Kaddoum,et al.  Secrecy Capacity Scaling With Untrustworthy Aggressive Relays Cooperating With a Wire-Tapper , 2016, IEEE Wireless Communications Letters.

[18]  Jaesung Lim,et al.  Capacity Scaling and Diversity Order for Secure Cooperative Relaying With Untrustworthy Relays , 2015, IEEE Transactions on Wireless Communications.

[19]  R. Serfling Approximation Theorems of Mathematical Statistics , 1980 .

[20]  Edward W. Ng,et al.  A table of integrals of the exponential integral. , 1969 .

[21]  Feng Liu,et al.  Joint Cooperative Beamforming, Jamming, and Power Allocation to Secure AF Relay Systems , 2015, IEEE Transactions on Vehicular Technology.