Secure Data Transmission in Cooperative Modes: Relay and MAC

Cooperation in clouds provides a promising technique for 5G wireless networks, supporting higher data rates. Security of data transmission over wireless clouds could put constraints on devices; whether to cooperate or not. Therefore, our aim is to provide analytical framework for the security on the physical layer of such setup and to define the constraints embodied with cooperation in small size wireless clouds. In this paper, two legitimate transmitters Alice and John cooperate to increase the reliable transmission rate received by their common legitimate receiver Bob, where one eavesdropper, Eve exists. We provide the achievable secure data transmission rates with cooperative relaying and when no cooperation exists creating a Multiple Access Channel (MAC). The paper considers the analysis of different cooperative scenarios: a cooperative scenario with two relaying devices, a cooperative scenario without relaying, a non-cooperative scenario, and cooperation from one side. We derive analytical expressions for the optimal power allocation that maximizes the achievable secrecy rates for the different set of scenarios where the implication of cooperation on the achievable secrecy rates was analyzed. We propose a distributed algorithm that allows the devices to select whether to cooperate or not and to choose their optimal power allocation based on the cooperation framework selected. Moreover, we defined distance constraints to enforce the benefits of cooperation between devices in a wireless cloud.

[1]  Mohammad Reza Pakravan,et al.  A Game-Theoretic Approach for Power Allocation in Bidirectional Cooperative Communication , 2010, 2010 IEEE Wireless Communication and Networking Conference.

[2]  Aleksandar Kavcic,et al.  Capacity theorems for relay channels with ISI , 2008, 2008 IEEE International Symposium on Information Theory.

[3]  Zhu Han,et al.  Cooperative jamming for wireless physical layer security , 2009, 2009 IEEE/SP 15th Workshop on Statistical Signal Processing.

[4]  Elza Erkip,et al.  A secrecy game with an informed jammer relay , 2010, 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications.

[5]  Zhu Han,et al.  Physical layer security game: How to date a girl with her boyfriend on the same table , 2009, 2009 International Conference on Game Theory for Networks.

[6]  Frank H. P. Fitzek,et al.  Cooperation in Wireless Networks: Principles and Applications , 2006 .

[7]  Miguel R. D. Rodrigues,et al.  Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.

[8]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[9]  Samah A. M. Ghanem MAC Gaussian channels with arbitrary inputs: Optimal precoding and power allocation , 2012, 2012 International Conference on Wireless Communications and Signal Processing (WCSP).

[10]  Khaled Ben Letaief,et al.  Power Allocation in Gaussian Interference Relay Channels via Game Theory , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[11]  Aydano B. Carleial,et al.  Interference channels , 1978, IEEE Trans. Inf. Theory.

[12]  Miguel R. D. Rodrigues,et al.  Power allocation strategies for OFDM Gaussian wiretap channels with a friendly jammer , 2013, 2013 IEEE International Conference on Communications (ICC).

[13]  Roy D. Yates,et al.  The Discrete Memoryless Multiple Access Channel with Confidential Messages , 2006, 2006 IEEE International Symposium on Information Theory.

[14]  João M. F. Xavier,et al.  Filter Design with Secrecy Constraints: The Degraded Multiple-Input Multiple-Output Gaussian Wiretap Channel , 2011, 2011 IEEE 73rd Vehicular Technology Conference (VTC Spring).

[15]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[16]  Miguel R. D. Rodrigues,et al.  A zero-sum power allocation game in the parallel Gaussian wiretap channel with an unfriendly jammer , 2012, 2012 IEEE International Conference on Communication Systems (ICCS).

[17]  Hesham El Gamal,et al.  The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.

[18]  Yasutada Oohama,et al.  Coding for relay channels with confidential messages , 2001, Proceedings 2001 IEEE Information Theory Workshop (Cat. No.01EX494).

[19]  Matthieu R. Bloch,et al.  Wireless Secrecy Regions With Friendly Jamming , 2011, IEEE Transactions on Information Forensics and Security.

[20]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[21]  Georgios B. Giannakis,et al.  Mutual Information Jammer-Relay Games , 2008, IEEE Trans. Inf. Forensics Secur..