Cooperative Jamming and Power Allocation in Two-Way Relaying System with Eavesdropper

The security of the two-way relaying system with an eavesdropper is investigated in this paper. A cooperative jamming and power allocation scheme is proposed to enhance the system secrecy capacity. Both user and pre-defined jamming signals are transmitted by each source node simultaneously. The optimum power allocation between the user and jamming signals at each source node is derived. Our analytical results suggest that the proposed cooperative jamming scheme improves on the system secrecy capacity, especially when the channel gains of the two source-relay links are of large difference. Simulation results in close agreement with analytical results clearly demonstrate the advantage of the proposed cooperative jamming scheme.

[1]  Jianhua Lu,et al.  Improving Wireless Security for Bidirectional Communication Scenarios , 2012, IEEE Transactions on Vehicular Technology.

[2]  Aylin Yener,et al.  Recruiting multi-antenna transmitters as cooperative jammers: An auction-theoretic approach , 2011, 2011 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[3]  Ender Tekin,et al.  The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.

[4]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[5]  John S. Thompson,et al.  Relay selection for secure cooperative networks with jamming , 2009, IEEE Transactions on Wireless Communications.

[6]  Zhu Han,et al.  Physical Layer Security for Two Way Relay Communications with Friendly Jammers , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[7]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[8]  Ender Tekin,et al.  Achievable Rates for the General Gaussian Multiple Access Wire-Tap Channel with Collective Secrecy , 2006, ArXiv.

[9]  Osvaldo Simeone,et al.  Secure Communications via Cooperating Base Stations , 2008, IEEE Communications Letters.

[10]  Jing Wang,et al.  Cooperative jamming and power allocation in three-phase two-way relaying wiretap systems , 2013, 2013 IEEE Wireless Communications and Networking Conference (WCNC).

[11]  Zhu Han,et al.  Joint Relay and Jammer Selection for Secure Two-Way Relay Networks , 2011, IEEE Transactions on Information Forensics and Security.

[12]  Zhu Han,et al.  Joint Relay and Jammer Selection for Secure Decode-and-Forward Two-Way Relay Communications , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[13]  Hamid Jafarkhani,et al.  Cooperative Jamming and Power Allocation for Wireless Relay Networks in Presence of Eavesdropper , 2011, 2011 IEEE International Conference on Communications (ICC).

[14]  Donald F. Towsley,et al.  Physical layer security from inter-session interference in large wireless networks , 2012, 2012 Proceedings IEEE INFOCOM.

[15]  R. Negi,et al.  Secret communication using artificial noise , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..

[16]  Wenbo Wang,et al.  Secrecy Capacity Enhancement With Distributed Precoding in Multirelay Wiretap Systems , 2013, IEEE Transactions on Information Forensics and Security.

[17]  M. Debbah,et al.  Wireless physical-layer security: The challenges ahead , 2009, 2009 International Conference on Advanced Technologies for Communications.