Cooperative jamming and power allocation with untrusty two-way relay nodes

This study investigates the security of the two-way relaying system with untrusty relay nodes. Cooperative jamming schemes are considered for bi-directional secrecy communications. The transmit power of each source node is divided into two parts corresponding to the user and jamming signals, respectively. Two different assumptions of the jamming signals are considered. When the jamming signals are a priori known at the two source nodes, closed-form power allocation expressions at two source nodes are derived. Under the assumption of unknown jamming signals, it is proven that the cooperative jamming is useless for the system secrecy capacity, because that all the power should be allocated to the user signals at each source node. Relay selection is also investigated based on the analysis of cooperative jamming. Simulation results are presented to compare the system secrecy capacities under the two jamming signal assumptions.

[1]  Yacov Yacobi,et al.  Topics in wireless security , 2004, IEEE Wirel. Commun..

[2]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[3]  Zhu Han,et al.  Joint Relay and Jammer Selection for Secure Two-Way Relay Networks , 2012, IEEE Trans. Inf. Forensics Secur..

[4]  Meixia Tao,et al.  Power and Subcarrier Allocation for Physical-Layer Security in OFDMA-Based Broadband Wireless Networks , 2011, IEEE Transactions on Information Forensics and Security.

[5]  H. Vincent Poor,et al.  Interference Assisted Secret Communication , 2008, IEEE Transactions on Information Theory.

[6]  A. Lee Swindlehurst,et al.  Secure Communications via Cooperative Jamming in Two-Hop Relay Systems , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[7]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[8]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[9]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[10]  Wenbo Wang,et al.  Secrecy Capacity Enhancement With Distributed Precoding in Multirelay Wiretap Systems , 2013, IEEE Transactions on Information Forensics and Security.

[11]  M. Debbah,et al.  Wireless physical-layer security: The challenges ahead , 2009, 2009 International Conference on Advanced Technologies for Communications.

[12]  Alexandre J. Pierrot,et al.  Strongly Secure Communications Over the Two-Way Wiretap Channel , 2011, IEEE Transactions on Information Forensics and Security.

[13]  Aylin Yener,et al.  Cooperative jamming via spectrum leasing , 2011, 2011 International Symposium of Modeling and Optimization of Mobile, Ad Hoc, and Wireless Networks.

[14]  Ender Tekin,et al.  The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.

[15]  Ender Tekin,et al.  Achievable Rates for the General Gaussian Multiple Access Wire-Tap Channel with Collective Secrecy , 2006, ArXiv.

[16]  Hsiao-Chun Wu,et al.  Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.

[17]  Hamid Jafarkhani,et al.  Cooperative Jamming and Power Allocation for Wireless Relay Networks in Presence of Eavesdropper , 2011, 2011 IEEE International Conference on Communications (ICC).

[18]  Aylin Yener,et al.  Two-Hop Secure Communication Using an Untrusted Relay: A Case for Cooperative Jamming , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[19]  Jianhua Lu,et al.  Improving Wireless Security for Bidirectional Communication Scenarios , 2012, IEEE Transactions on Vehicular Technology.

[20]  Petar Popovski,et al.  Wireless Secrecy in Cellular Systems With Infrastructure-Aided Cooperation , 2009, IEEE Transactions on Information Forensics and Security.

[21]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[22]  Hesham El Gamal,et al.  The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.

[23]  Alistair Munro,et al.  Performance comparison of cooperative and non-cooperative relaying mechanisms in wireless networks , 2006, IEEE Wireless Communications and Networking Conference, 2006. WCNC 2006..

[24]  Osvaldo Simeone,et al.  Secure Communications via Cooperating Base Stations , 2008, IEEE Communications Letters.

[25]  Kin K. Leung,et al.  Artificial Noise Generation from Cooperative Relays for Everlasting Secrecy in Two-Hop Wireless Networks , 2011, IEEE Journal on Selected Areas in Communications.

[26]  John S. Thompson,et al.  Relay selection for secure cooperative networks with jamming , 2009, IEEE Transactions on Wireless Communications.

[27]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[28]  Aylin Yener,et al.  Recruiting multi-antenna transmitters as cooperative jammers: An auction-theoretic approach , 2011, 2011 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[29]  H. Vincent Poor,et al.  Joint Decode-and-Forward and jamming for wireless physical layer security with destination assistance , 2011, 2011 Conference Record of the Forty Fifth Asilomar Conference on Signals, Systems and Computers (ASILOMAR).