Relay selection and scaling law in destination assisted physical layer secrecy systems

A distributed wireless network with one source, one destination, one eavesdropper and multiple Decode-and-Forward (DF) relays is investigated. A two-slot cooperative relaying scheme is considered, in which relays help the source transmit to the destination while keeping the message as secret as possible from the eavesdropper. To prevent the system becoming interference limited, a destination assisted jamming scheme is used, i.e., the destination transmits a jamming signal rather than listening to the source. Several relay selection methods are proposed to let the system benefit from increase of the number of relays. With the proposed transmission scheme, the system secrecy rate is shown to outperform the methods in literature and maintain a scaling law of the achievable secrecy rate of log2(1 + P0/8 log K) -1.6252, where K is the number of relays and P0 is the total transmit power.

[1]  Andrea J. Goldsmith,et al.  Multi-Antenna Downlink Channels with Limited Feedback and User Selection , 2007, IEEE Journal on Selected Areas in Communications.

[2]  Steven P. Weber,et al.  On Cooperative Relaying Schemes for Wireless Physical Layer Security , 2010, IEEE Transactions on Signal Processing.

[3]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[4]  Shlomo Shamai,et al.  Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.

[5]  Hesham El Gamal,et al.  The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.

[6]  Joseph Lipka,et al.  A Table of Integrals , 2010 .

[7]  John S. Thompson,et al.  Relay selection for secure cooperative networks with jamming , 2009, IEEE Transactions on Wireless Communications.

[8]  H. Vincent Poor,et al.  Joint Decode-and-Forward and jamming for wireless physical layer security with destination assistance , 2011, 2011 Conference Record of the Forty Fifth Asilomar Conference on Signals, Systems and Computers (ASILOMAR).

[9]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[10]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[11]  Hesham El Gamal,et al.  Cooperative Secrecy: The Relay-Eavesdropper Channel , 2007, 2007 IEEE International Symposium on Information Theory.