Secure Multiple Amplify-and-Forward Relaying With Cochannel Interference

We investigate the impact of cochannel interference on the security performance of multiple amplify-and-forward (AF) relaying networks, where N intermediate AF relays assist the data transmission from the source to the destination. The relays are corrupted by multiple cochannel interferers, and the information transmitted from the relays to the destination can be overheard by the eavesdropper. In order to deal with the interference and wiretap, the best out of N relays is selected for security enhancement. To this end, we derive a novel lower bound on the secrecy outage probability (SOP), which is then utilized to present two best relay selection criteria, based on the instantaneous and statistical channel information of the interfering links. For these criteria and the conventional max-min criterion, we quantify the impact of cochannel interference and relay selection by deriving the lower bound on the SOP. Furthermore, we derive the asymptotic SOP for each criterion, to explicitly reveal the impact of transmit power allocation among interferers on the secrecy performance, which offers valuable insights into practical design. We demonstrate that the all selection criteria achieve full secrecy diversity order N, while the proposed two criteria in this paper outperform the conventional max-min scheme.

[1]  Holger Boche,et al.  ON SCHUR-CONVEXITY OF EXPECTATION OF WEIGHTED SUM OF RANDOM VARIABLES WITH APPLICATIONS , 2004 .

[2]  Caijun Zhong,et al.  Ergodic Capacity Comparison of Different Relay Precoding Schemes in Dual-Hop AF Systems With Co-Channel Interference , 2014, IEEE Transactions on Communications.

[3]  George K. Karagiannidis,et al.  Secure Multiuser Communications in Multiple Amplify-and-Forward Relay Networks , 2014, IEEE Transactions on Communications.

[4]  Ioannis Krikidis,et al.  Opportunistic relay selection for cooperative networks with secrecy constraints , 2010, IET Commun..

[5]  A. Lee Swindlehurst,et al.  IEEE Journal of Selected Topics in Signal Processing Inaugural Issue: [editor-in-chief's message] , 2007, J. Sel. Topics Signal Processing.

[6]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.

[7]  Kenneth W. Shum,et al.  Data Dissemination With Side Information and Feedback , 2014, IEEE Transactions on Wireless Communications.

[8]  Jack M. Winters,et al.  Optimum Combining in Digital Mobile Radio with Cochannel Interference , 1984, IEEE Journal on Selected Areas in Communications.

[9]  John S. Thompson,et al.  Relay selection for secure cooperative networks with jamming , 2009, IEEE Transactions on Wireless Communications.

[10]  Hyundong Shin,et al.  Cooperative Communications with Outage-Optimal Opportunistic Relaying , 2007, IEEE Transactions on Wireless Communications.

[11]  Mehdi Bennis,et al.  Performance of Transmit Antenna Selection Physical Layer Security Schemes , 2012, IEEE Signal Processing Letters.

[12]  Chi Wan Sung,et al.  Linear Network Coding Strategies for the Multiple Access Relay Channel with Packet Erasures , 2013, IEEE Transactions on Wireless Communications.

[13]  Walaa Hamouda,et al.  Outage analysis of relay selection in AF with outdated channel information in the presence of co-channel interference , 2015, 2015 IEEE Wireless Communications and Networking Conference (WCNC).

[14]  Tran Trung Duy,et al.  Secrecy performance analysis with relay selection methods under impact of co-channel interference , 2015, IET Commun..

[15]  Mandy Eberhart,et al.  Digital Communication Over Fading Channels , 2016 .

[16]  A. G. Williamson,et al.  Outage probability calculations for mobile radio systems with multiple interferers , 1988 .

[17]  Jiaheng Wang,et al.  Performance of Secure Communications Over Correlated Fading Channels , 2012, IEEE Signal Processing Letters.

[18]  Feifei Gao,et al.  Joint Information- and Jamming-Beamforming for Physical Layer Security With Full Duplex Base Station , 2014, IEEE Transactions on Signal Processing.

[19]  Tho Le-Ngoc,et al.  Physical layer security in wireless cooperative relay networks: state of the art and beyond , 2015, IEEE Communications Magazine.

[20]  Tao Zhang,et al.  Physical-Layer Security for Full Duplex Communications With Self-Interference Mitigation , 2016, IEEE Transactions on Wireless Communications.

[21]  Shi Jin,et al.  Ergodic Rate Analysis for Multipair Massive MIMO Two-Way Relay Networks , 2015, IEEE Transactions on Wireless Communications.

[22]  Caijun Zhong,et al.  Dual-hop systems with noisy relay and interference-limited destination , 2010, IEEE Transactions on Communications.

[23]  Xianbin Wang,et al.  Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks , 2013, IEEE Journal on Selected Areas in Communications.

[24]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[25]  Kerstin Vogler,et al.  Table Of Integrals Series And Products , 2016 .

[26]  Shlomo Shamai,et al.  Information Theoretic Security , 2009, Found. Trends Commun. Inf. Theory.

[27]  ShengPing Li,et al.  An adaptive control with optimal disturbances rejection , 2011, Science China Information Sciences.

[28]  George K. Karagiannidis,et al.  Secure Switch-and-Stay Combining (SSSC) for Cognitive Relay Networks , 2016, IEEE Transactions on Communications.

[29]  Alexander M. Haimovich,et al.  Performance analysis of optimum combining in wireless communications with Rayleigh fading and cochannel interference , 1998, IEEE Trans. Commun..

[30]  Mérouane Debbah,et al.  Relay Selection Schemes for Dual-Hop Networks under Security Constraints with Multiple Eavesdroppers , 2013, IEEE Transactions on Wireless Communications.

[31]  Caijun Zhong,et al.  Outage Probability of Dual-Hop Multiple Antenna AF Systems with Linear Processing in the Presence of Co-Channel Interference , 2014, IEEE Transactions on Wireless Communications.

[32]  Lifeng Wang,et al.  Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.

[33]  Tharmalingam Ratnarajah,et al.  Secure Communication through Nakagami-m Fading MISO Channel , 2011, 2011 IEEE International Conference on Communications (ICC).

[34]  Caijun Zhong,et al.  Ergodic Capacity Analysis of Amplify-and-Forward MIMO Dual-Hop Systems , 2008, IEEE Transactions on Information Theory.

[35]  Sheng-Ping Li Robust adaptive control of uncertain systems with guaranteed robust stability and asymptotic performance , 2011, Int. J. Syst. Sci..

[36]  George K. Karagiannidis,et al.  Amplify-and-Forward Relay Selection with Outdated Channel Estimates , 2012, IEEE Transactions on Communications.

[37]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.