Information Leakage Neutralization for the Multi-Antenna Non-Regenerative Relay-Assisted Multi-Carrier Interference Channel

In heterogeneous dense networks where spectrum is shared, users' privacy remains one of the major challenges. On a multi-antenna relay-assisted multi-carrier interference channel, each user shares the spectral and spatial resources with all other users. When the receivers are not only interested in their own signals but also in eavesdropping other users' signals, the cross talk on the spectral and spatial channels becomes information leakage. In this paper, we propose a novel secrecy rate enhancing relay strategy that utilizes both spectral and spatial resources, termed as information leakage neutralization. To this end, the relay matrix is chosen such that the effective channel from the transmitter to the colluding eavesdropper is equal to the negative of the effective channel over the relay to the colluding eavesdropper and thus the information leakage to zero. Interestingly, the optimal relay matrix in general is not block-diagonal which encourages users' encoding over the frequency channels. We proposed two information leakage neutralization strategies, namely efficient information leakage neutralization (EFFIN) and local-optimized information leakage neutralization (LOPTIN). EFFIN provides a simple and efficient design of relay processing matrix and precoding matrices at the transmitters in the scenario of limited power and computational resources. LOPTIN, despite its higher complexity, provides a better sum secrecy rate performance by optimizing the relay processing matrix and the precoding matrices jointly. The proposed methods are shown to improve the sum secrecy rates over several state-of-the-art baseline methods.

[1]  A. Wittneben,et al.  Cooperative Distributed Multiuser MMSE Relaying in Wireless Ad-Hoc Networks , 2005, Conference Record of the Thirty-Ninth Asilomar Conference onSignals, Systems and Computers, 2005..

[2]  Armin Wittneben,et al.  Spectral efficient protocols for half-duplex fading relay channels , 2007, IEEE Journal on Selected Areas in Communications.

[3]  Meixia Tao,et al.  Power and Subcarrier Allocation for Physical-Layer Security in OFDMA-Based Broadband Wireless Networks , 2011, IEEE Transactions on Information Forensics and Security.

[4]  Il-Min Kim,et al.  Optimal Power Allocation for Secure Multicarrier Relay Systems , 2011, IEEE Transactions on Signal Processing.

[5]  Suhas N. Diggavi,et al.  Approximate capacity of a class of Gaussian relay-interference networks , 2009, 2009 IEEE International Symposium on Information Theory.

[6]  Abbas El Gamal,et al.  Relay Networks With Delays , 2007, IEEE Transactions on Information Theory.

[7]  H. Vincent Poor,et al.  Physical-Layer Secrecy for OFDM Transmissions Over Fading Channels , 2012, IEEE Transactions on Information Forensics and Security.

[8]  Eduard A. Jorswieck,et al.  Efficient information leakage neutralization on a relay-assisted multi-carrier interference channel , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[9]  Friedemann Mattern Wireless Future: Ubiquitous Computing , 2004 .

[10]  Raef Bassily,et al.  Secure communication in multiple relay networks through decode-and-forward strategies , 2012, Journal of Communications and Networks.

[11]  Suhas N. Diggavi,et al.  Transmission techniques for relay-interference networks , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.

[12]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[13]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[14]  Hesham El Gamal,et al.  The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.

[15]  Ruoheng Liu,et al.  Securing Wireless Communications at the Physical Layer , 2014 .

[16]  A. Lee Swindlehurst,et al.  Cooperative Jamming for Secure Communications in MIMO Relay Networks , 2011, IEEE Transactions on Signal Processing.

[17]  Stefan Berger,et al.  Recent advances in amplify-and-forward two-hop relaying , 2009, IEEE Communications Magazine.

[18]  Björn E. Ottersten,et al.  Non-regenerative two-hop wiretap channels using interference neutralization , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).

[19]  Matthieu R. Bloch,et al.  Physical-Layer Security: From Information Theory to Security Engineering , 2011 .

[20]  Raef Bassily,et al.  Deaf Cooperation for Secrecy With Multiple Antennas at the Helper , 2012, IEEE Transactions on Information Forensics and Security.

[21]  Hamid Jafarkhani,et al.  Cooperative Jamming and Power Allocation for Wireless Relay Networks in Presence of Eavesdropper , 2011, 2011 IEEE International Conference on Communications (ICC).

[22]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[23]  Kai-Kit Wong,et al.  Optimal Cooperative Jamming to Enhance Physical Layer Security Using Relays , 2011, IEEE Transactions on Signal Processing.

[24]  RankovBoris,et al.  Spectral efficient protocols for half-duplex fading relay channels , 2007 .

[25]  H. Vincent Poor,et al.  Information and inference in the wireless physical layer , 2012, IEEE Wireless Communications.

[26]  A. El Gamal,et al.  Relay-without-delay , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..

[27]  Syed Ali Jafar,et al.  Degrees of Freedom of Wireless Networks With Relays, Feedback, Cooperation, and Full Duplex Operation , 2009, IEEE Transactions on Information Theory.

[28]  Derrick Wing Kwan Ng,et al.  Secure Resource Allocation and Scheduling for OFDMA Decode-and-Forward Relay Networks , 2011, IEEE Transactions on Wireless Communications.

[29]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[30]  Eduard A. Jorswieck,et al.  Instantaneous Relaying: Optimal Strategies and Interference Neutralization , 2012, IEEE Transactions on Signal Processing.

[31]  Il-Min Kim,et al.  Joint Secure Beamforming Design at the Source and the Relay for an Amplify-and-Forward MIMO Untrusted Relay System , 2012, IEEE Transactions on Signal Processing.

[32]  Aylin Yener,et al.  Cooperation With an Untrusted Relay: A Secrecy Perspective , 2009, IEEE Transactions on Information Theory.

[33]  Farshad Lahouti,et al.  Link adaptation for fixed relaying with untrusted relays: Transmission strategy design and performance analysis , 2011, 2011 18th International Conference on Telecommunications.

[34]  Hsiao-Chun Wu,et al.  Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.

[35]  Shlomo Shamai,et al.  Information Theoretic Security , 2009, Found. Trends Commun. Inf. Theory.

[36]  Namyoon Lee,et al.  Aligned Interference Neutralization and the Degrees of Freedom of the 2 User Interference Channel with Instantaneous Relay , 2011, ArXiv.

[37]  Eduard A. Jorswieck,et al.  Resource allocation for the wire-tap multi-carrier broadcast channel , 2008, 2008 International Conference on Telecommunications.