Adaptive Wireless-Powered Relaying Schemes With Cooperative Jamming for Two-Hop Secure Communication

A two-hop relay network is considered, in which an eavesdropper can overhear the relaying signal. To prevent the eavesdropper from decoding this signal, a destination transmits a jamming noise while a source transmits the data signal to the relay. At the same time, the relay can harvest energy from both the source signal and the jamming noise, and use this harvested energy to forward the received signal to the destination. In such a wireless-powered relay system with cooperative jamming, we propose two adaptive relaying schemes based on power splitting and time switching techniques. In the proposed power splitting-based relaying (PSR) and time switching-based relaying (TSR) schemes, the relay controls the power splitting ratio (<inline-formula> <tex-math notation="LaTeX">${\rho }$ </tex-math></inline-formula>) and time switching ratio (<inline-formula> <tex-math notation="LaTeX">${\alpha }$ </tex-math></inline-formula>), respectively, in order to achieve a balance between signal processing and energy harvesting. We find analytically the optimal values of <inline-formula> <tex-math notation="LaTeX">${\rho }$ </tex-math></inline-formula> and <inline-formula> <tex-math notation="LaTeX">${\alpha }$ </tex-math></inline-formula> in each scheme to maximize the secrecy capacity under the assumption of high signal-to-noise ratio (SNR). Interestingly, although the eavesdropper’s channel state information (CSI) is used in the derivation of the optimal control parameters (<inline-formula> <tex-math notation="LaTeX">${\rho }$ </tex-math></inline-formula> and <inline-formula> <tex-math notation="LaTeX">${\alpha }$ </tex-math></inline-formula>), they are shown not to be affected by the eavesdropper’s CSI in a high SNR regime. This implies that the proposed schemes can be effective even for practical environments where there is no eavesdropper’s CSI. Furthermore, simulation results show that they well coincide with the exact solutions in practical environments even though the closed-form solutions are obtained with a high SNR assumption. Moreover, the comparisons of PSR and TSR in various scenarios show that the two relaying schemes have complementary performances depending on the network conditions. Specifically, PSR achieves greater secrecy capacity than TSR when the channel condition is unfavorable to the eavesdropper for wiretapping.

[1]  Miodrag Potkonjak,et al.  Security of IoT systems: Design challenges and opportunities , 2014, 2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).

[2]  Saman Atapattu,et al.  Optimal Energy Harvesting Protocols for Wireless Relay Networks , 2016, IEEE Transactions on Wireless Communications.

[3]  Mohamed-Slim Alouini,et al.  On the Jamming Power Allocation for Secure Amplify-and-Forward Relaying via Cooperative Jamming , 2013, IEEE Journal on Selected Areas in Communications.

[4]  Gordon L. Stüber,et al.  Channel Estimation for Amplify and Forward Relay Based Cooperation Diversity Systems , 2007, IEEE Transactions on Wireless Communications.

[5]  Kai-Kit Wong,et al.  To Harvest and Jam: A Paradigm of Self-Sustaining Friendly Jammers for Secure AF Relaying , 2015, IEEE Transactions on Signal Processing.

[6]  Salman Durrani,et al.  Secure Communication With a Wireless-Powered Friendly Jammer , 2014, IEEE Transactions on Wireless Communications.

[7]  Zhu Han,et al.  Wireless Networks With RF Energy Harvesting: A Contemporary Survey , 2014, IEEE Communications Surveys & Tutorials.

[8]  A. Lee Swindlehurst,et al.  Secure Relay and Jammer Selection for Physical Layer Security , 2015, IEEE Signal Processing Letters.

[9]  Ali A. Nasir,et al.  Relaying Protocols for Wireless Energy Harvesting and Information Processing , 2012, IEEE Transactions on Wireless Communications.

[10]  Yong Li,et al.  Joint Power Splitting and Antenna Selection in Energy Harvesting Relay Channels , 2015, IEEE Signal Processing Letters.

[11]  Kee Chaing Chua,et al.  Wireless Information and Power Transfer: A Dynamic Power Splitting Approach , 2013, IEEE Transactions on Communications.

[12]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[13]  Wouter A. Serdijn,et al.  Co-Design of a CMOS Rectifier and Small Loop Antenna for Highly Sensitive RF Energy Harvesters , 2014, IEEE Journal of Solid-State Circuits.

[14]  Feifei Gao,et al.  On channel estimation and optimal training design for amplify and forward relay networks , 2008, IEEE Transactions on Wireless Communications.

[15]  Ali A. Nasir,et al.  Wireless-Powered Relays in Cooperative Communications: Time-Switching Relaying Protocols and Throughput Analysis , 2013, IEEE Transactions on Communications.

[16]  Thomas Watteyne,et al.  Understanding the Limits of LoRaWAN , 2016, IEEE Communications Magazine.

[17]  Huiming Wang,et al.  Joint Cooperative Beamforming and Jamming to Secure AF Relay Systems With Individual Power Constraint and No Eavesdropper's CSI , 2013, IEEE Signal Processing Letters.

[18]  Amitav Mukherjee,et al.  Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints , 2015, Proceedings of the IEEE.

[19]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[20]  Kai-Kit Wong,et al.  Optimal Cooperative Jamming to Enhance Physical Layer Security Using Relays , 2011, IEEE Transactions on Signal Processing.

[21]  Adrish Banerjee,et al.  Secure Communication via a Wireless Energy Harvesting Untrusted Relay , 2015, IEEE Transactions on Vehicular Technology.

[22]  Kee Chaing Chua,et al.  Wireless Information Transfer with Opportunistic Energy Harvesting , 2012, IEEE Transactions on Wireless Communications.

[23]  Rui Zhang,et al.  Wireless Powered Cooperative Jamming for Secrecy Multi-AF Relaying Networks , 2015, IEEE Transactions on Wireless Communications.

[24]  He Chen,et al.  Towards secure communication via a wireless-powered full-duplex jammer , 2016, 2016 IEEE International Conference on Ubiquitous Wireless Broadband (ICUWB).