QoS-Aware Enhanced-Security for TDMA Transmissions from Buffered Source Nodes

This paper proposes a cross-layer design to enhance the security of a set of buffered legitimate source nodes wishing to communicate with a common destination node using a time-division multiple-access scheme with probabilistic time slot assignment. The users’ assignment probabilities to the time slots are optimized to satisfy a certain quality-of-service (QoS) requirement for each of the legitimate source nodes. To further improve the system security, we propose beamforming-based cooperative jamming schemes subject to the availability of the channel state information (CSI) at the legitimate nodes. We assume that if a source node is not selected for data transmission, it is a cooperative jamming node. We impose an average transmit power constraint (averaged across time slots) on each source node. Hence, the source nodes should efficiently distribute their average transmit powers throughout the network operation between data and artificial noise transmissions to satisfy the QoS requirements. We investigate the two cases where a global CSI is assumed at the legitimate nodes and where there is no eavesdropper’s CSI. The case where there is no CSI at the jamming nodes is also investigated and a new scheme is proposed. We derive closed-form expressions for the instantaneous secrecy rate for each scheme as well as the secrecy outage probability. Moreover, we derive the secrecy stable-throughput and delay-requirement regions of the network. Our proposed jamming schemes achieve significant increases in the secure throughput over existing schemes from the literature and over the no-jamming scheme.

[1]  Jinhong Yuan,et al.  Optimization of Code Rates in SISOME Wiretap Channels , 2015, IEEE Transactions on Wireless Communications.

[2]  Zhigang Cao,et al.  Cooperative Beamforming for Cognitive Radio Networks: A Cross-Layer Design , 2012, IEEE Transactions on Communications.

[3]  Derrick Wing Kwan Ng,et al.  Robust Beamforming for Secure Communication in Systems With Wireless Information and Power Transfer , 2013, IEEE Transactions on Wireless Communications.

[4]  Huiming Wang,et al.  Uncoordinated Jammer Selection for Securing SIMOME Wiretap Channels: A Stochastic Geometry Approach , 2015, IEEE Transactions on Wireless Communications.

[5]  Hui-Ming Wang,et al.  Secrecy-throughput-optimal artificial noise design against randomly located eavesdroppers , 2016, 2016 International Conference on Computing, Networking and Communications (ICNC).

[6]  Xiangyun Zhou,et al.  On–Off-Based Secure Transmission Design With Outdated Channel State Information , 2016, IEEE Transactions on Vehicular Technology.

[7]  R. M. Loynes,et al.  The stability of a queue with non-independent inter-arrival and service times , 1962, Mathematical Proceedings of the Cambridge Philosophical Society.

[8]  Huiming Wang,et al.  Joint Cooperative Beamforming and Jamming to Secure AF Relay Systems With Individual Power Constraint and No Eavesdropper's CSI , 2013, IEEE Signal Processing Letters.

[9]  Ender Tekin,et al.  The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.

[10]  John S. Thompson,et al.  Amplify-and-forward with partial relay selection , 2008, IEEE Communications Letters.

[11]  JAMAL N. AL-KARAKI,et al.  Routing techniques in wireless sensor networks: a survey , 2004, IEEE Wireless Communications.

[12]  Yueming Cai,et al.  A New Secure Transmission Scheme With Outdated Antenna Selection , 2015, IEEE Transactions on Information Forensics and Security.

[13]  Rodney A. Kennedy,et al.  Cooperative jamming for secrecy in decentralized wireless networks , 2012, 2012 IEEE International Conference on Communications (ICC).

[14]  John S. Thompson,et al.  Relay selection for secure cooperative networks with jamming , 2009, IEEE Transactions on Wireless Communications.

[15]  Zhu Han,et al.  Cooperative jamming for wireless physical layer security , 2009, 2009 IEEE/SP 15th Workshop on Statistical Signal Processing.

[16]  David Tse,et al.  Fundamentals of Wireless Communication , 2005 .

[17]  Umberto Spagnolini,et al.  Stable Throughput of Cognitive Radios With and Without Relaying Capability , 2007, IEEE Transactions on Communications.

[18]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[19]  Matthew R. McKay,et al.  Artificial-Noise-Aided Secure Multi-Antenna Transmission With Limited Feedback , 2015, IEEE Transactions on Wireless Communications.

[20]  Matthew R. McKay,et al.  Secure Transmission With Artificial Noise Over Fading Channels: Achievable Rate and Optimal Power Allocation , 2010, IEEE Transactions on Vehicular Technology.

[21]  Lifeng Wang,et al.  Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.

[22]  Trung Quang Duong,et al.  QoS-Based Design for Security Enhancement in TDMA-Based Wireless Networks , 2016, 2016 IEEE Globecom Workshops (GC Wkshps).

[23]  K. J. Ray Liu,et al.  Cognitive multiple access via cooperation: Protocol design and performance analysis , 2007, IEEE Transactions on Information Theory.

[24]  Trung Quang Duong,et al.  Optimal Transmission With Artificial Noise in MISOME Wiretap Channels , 2016, IEEE Transactions on Vehicular Technology.

[25]  A. Lee Swindlehurst,et al.  Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.

[26]  Carl D. Meyer,et al.  Matrix Analysis and Applied Linear Algebra , 2000 .

[27]  K. J. Ray Liu,et al.  Opportunistic Multiple Access for Cognitive Radio Networks , 2011, IEEE Journal on Selected Areas in Communications.

[28]  Xiangyun Zhou,et al.  Secure Transmission Design for Cognitive Radio Networks With Poisson Distributed Eavesdroppers , 2016, IEEE Transactions on Information Forensics and Security.

[29]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[30]  Kerstin Vogler,et al.  Table Of Integrals Series And Products , 2016 .

[31]  I. S. Gradshteyn,et al.  Table of Integrals, Series, and Products , 1976 .

[32]  Naofal Al-Dhahir,et al.  Security of an Ordered-Based Distributive Jamming Scheme , 2017, IEEE Communications Letters.

[33]  Naofal Al-Dhahir,et al.  Security of Rechargeable Energy-Harvesting Transmitters in Wireless Networks , 2016, IEEE Wireless Communications Letters.

[34]  Xiangyun Zhou,et al.  Secure On-Off Transmission Design With Channel Estimation Errors , 2013, IEEE Transactions on Information Forensics and Security.

[35]  Daniel Benevides da Costa,et al.  Performance Analysis of Relay Selection Techniques With Clustered Fixed-Gain Relays , 2010, IEEE Signal Processing Letters.

[36]  Shihao Yan,et al.  Artificial Noise: Transmission Optimization in Multi-Input Single-Output Wiretap Channels , 2015, IEEE Transactions on Communications.