Buffer-Aided Relaying for Two-Hop Secure Communication with Limited Packet Lifetime

A lot of works have been done to demonstrate that buffer-aided relaying can achieve a significant performance gain in cooperative wireless networks. However, the additional delay introduced by buffer has been largely neglected in available works, which is of significant importance for delay-sensitive networks. In this paper, we consider a two-hop buffer-aided relaying system suffering from eavesdropping, where every packet owns a limited lifetime. In order to satisfy a specific secrecy rate of the system, this paper proposes a novel security and lifetime (SELI)-aware relay selection scheme by balancing the security and lifetime constraints. Furthermore, to address the problem of the heterogeneous packets queuing in the buffer, the approach of Markov chain is embedded to model the packet occupancy process. With the help of this complete framework, we derive the exact expressions of performance metrics, including reliable outage probability, packet discarding probability and secrecy throughput. Finally, extensive simulation and numerical results are provided to validate our analysis and illustrate the proposed scheme can efficiently reduce the packet discarding ratio.

[1]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[2]  Naofal Al-Dhahir,et al.  Enhancing the PHY-Layer Security of MIMO Buffer-Aided Relay Networks , 2016, IEEE Wireless Communications Letters.

[3]  Naofal Al-Dhahir,et al.  Physical-Layer Security of a Buffer-Aided Full-Duplex Relaying System , 2016, IEEE Communications Letters.

[4]  Matthieu R. Bloch,et al.  Coding for Secrecy: An Overview of Error-Control Coding Techniques for Physical-Layer Security , 2013, IEEE Signal Processing Magazine.

[5]  Deli Qiao,et al.  Buffer-Aided Two-Hop Secure Communications With Power Control and Link Selection , 2018, IEEE Transactions on Wireless Communications.

[6]  Xiaohong Jiang,et al.  Secure Communication in Non-Geostationary Orbit Satellite Systems: A Physical Layer Security Perspective , 2019, IEEE Access.

[7]  Hesham El Gamal,et al.  The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.

[8]  Zhi Chen,et al.  Max-Ratio Relay Selection in Secure Buffer-Aided Cooperative Wireless Networks , 2014, IEEE Transactions on Information Forensics and Security.

[9]  H. Vincent Poor,et al.  The Gaussian wiretap channel with a helping interferer , 2008, 2008 IEEE International Symposium on Information Theory.

[10]  Yueming Cai,et al.  Secrecy Outage Analysis of Buffer-Aided Cooperative MIMO Relaying Systems , 2018, IEEE Transactions on Vehicular Technology.

[11]  Navrati Saxena,et al.  Next Generation 5G Wireless Networks: A Comprehensive Survey , 2016, IEEE Communications Surveys & Tutorials.

[12]  Shinya Sugiura,et al.  Physical Layer Security in Buffer-State-Based Max-Ratio Relay Selection Exploiting Broadcasting With Cooperative Beamforming and Jamming , 2019, IEEE Transactions on Information Forensics and Security.

[13]  Jia Liu,et al.  Secure and Energy-Efficient Beamforming for MIMO Two-way Untrusted Relay Systems , 2019, 2019 IEEE Wireless Communications and Networking Conference (WCNC).

[14]  Richard E. Blahut,et al.  Secrecy capacity of SIMO and slow fading channels , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..

[15]  Zhiguo Ding,et al.  A General Relaying Transmission Protocol for MIMO Secrecy Communications , 2012, IEEE Transactions on Communications.

[16]  H. A. David,et al.  Order Statistics (2nd ed). , 1981 .

[17]  Yulong Shen,et al.  Transmission protocol for secure big data in two-hop wireless networks with cooperative jamming , 2014, Inf. Sci..

[18]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[19]  Deli Qiao,et al.  Statistical Delay Tradeoffs in Buffer-Aided Two-Hop Wireless Communication Systems , 2016, IEEE Transactions on Communications.

[20]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[21]  A. Lee Swindlehurst,et al.  Buffer-Aided Relaying for Two-Hop Secure Communication , 2015, IEEE Transactions on Wireless Communications.