Cooperative Jamming in a Two-Hop Relay Wireless Network with Buffer-Aided Relays

In this paper, we consider a two-hop relay wireless network with one source, one destination, one eavesdropper and multiple half-duplex (HD) relays each having a finite buffer. We assume two cases of the eavesdropper's channel state information (CSI), i.e., the perfect CSI case where the instantaneous CSI of the eavesdropper channels are available, and the partial CSI case where only the average CSI of the eavesdropper channels are available. Cooperative jamming schemes are proposed for both eavesdropper's CSI cases, where two relays are selected in each hop, one is selected as a message relay and another as a jammer to transmit jamming signals to degrade the eavesdropper channel. The security performance in terms of the secrecy outage probability (SOP) is analyzed by simulation. We also make comparison between our proposed cooperative jamming schemes with the random jammer selection scheme. Results show that the proposed cooperative jamming scheme outperforms the random jammer selection scheme and the joint consideration of the buffer-aided relay selection and jamming can achieve better security performance.

[1]  Rodney A. Kennedy,et al.  Cooperative jamming for secrecy in decentralized wireless networks , 2012, 2012 IEEE International Conference on Communications (ICC).

[2]  Zhi Chen,et al.  Max-Ratio Relay Selection in Secure Buffer-Aided Cooperative Wireless Networks , 2014, IEEE Transactions on Information Forensics and Security.

[3]  Xiang Cheng,et al.  Relay Selection in Full-Duplex Energy-Harvesting Two-Way Relay Networks , 2017, IEEE Transactions on Green Communications and Networking.

[4]  Victor C. M. Leung,et al.  Secure Resource Allocation for OFDMA Two-Way Relay Wireless Sensor Networks Without and With Cooperative Jamming , 2016, IEEE Transactions on Industrial Informatics.

[5]  Feifei Gao,et al.  Zero-forcing beamforming for physical layer security of energy harvesting wireless communications , 2015, EURASIP Journal on Wireless Communications and Networking.

[6]  Wen-Zhan Song,et al.  Coprime array adaptive beamforming based on compressive sensing virtual array signal , 2016, 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[7]  George K. Karagiannidis,et al.  Secure Communications With Cooperative Jamming: Optimal Power Allocation and Secrecy Outage Analysis , 2017, IEEE Transactions on Vehicular Technology.

[8]  Matthew R. McKay,et al.  Rethinking the Secrecy Outage Formulation: A Secure Transmission Design Perspective , 2011, IEEE Communications Letters.

[9]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[10]  Rodrigo C. de Lamare,et al.  Study of Relay Selection for Physical-Layer Security in Buffer-Aided Relay Networks Based on the Secrecy Rate Criterion , 2016, ArXiv.

[11]  Hua Wang,et al.  Code-Aided Joint Carrier Phase Estimation and Ambiguity Resolution for APSK Signals , 2016, 2016 IEEE 83rd Vehicular Technology Conference (VTC Spring).

[12]  Hai Jiang,et al.  Optimal Relay Selection for Secure Cooperative Communications With an Adaptive Eavesdropper , 2017, IEEE Transactions on Wireless Communications.

[13]  A. Lee Swindlehurst,et al.  Buffer-Aided Relaying for Two-Hop Secure Communication , 2015, IEEE Transactions on Wireless Communications.

[14]  Hong Wen,et al.  Achieving Secure Communications over Wiretap Channels via Security Codes from Resilient Functions , 2014, IEEE Wireless Communications Letters.

[15]  Huiming Wang,et al.  Secrecy rate maximization for SIMO wiretap channel with uncoordinated cooperative jamming under secrecy outage probability constraint , 2016, 2016 IEEE Wireless Communications and Networking Conference.

[16]  Peter W. Shor,et al.  Algorithms for quantum computation: discrete logarithms and factoring , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.

[17]  Hien Quoc Ngo,et al.  Secure 5G Wireless Communications: A Joint Relay Selection and Wireless Power Transfer Approach , 2016, IEEE Access.

[18]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[19]  Naofal Al-Dhahir,et al.  Enhancing the PHY-Layer Security of MIMO Buffer-Aided Relay Networks , 2016, IEEE Wireless Communications Letters.

[20]  Naofal Al-Dhahir,et al.  Physical-Layer Security of a Buffer-Aided Full-Duplex Relaying System , 2016, IEEE Communications Letters.

[21]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[22]  Hsiao-Chun Wu,et al.  Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.

[23]  Gonzalo Seco-Granados,et al.  Opportunistic relay selection with outdated CSI: outage probability and diversity analysis , 2009, IEEE Transactions on Wireless Communications.

[24]  Ioannis Krikidis,et al.  Opportunistic relay selection for cooperative networks with secrecy constraints , 2010, IET Commun..