Optimal Power Allocation by Imperfect Hardware Analysis in Untrusted Relaying Networks

By taking a variety of realistic hardware imperfections into consideration, we propose an optimal power allocation (OPA) strategy to maximize the instantaneous secrecy rate of a cooperative wireless network comprised of a source, a destination, and an untrusted amplify-and-forward relay. We assume that either the source or the destination is equipped with a large-scale multiple antennas’ system, while the rest are equipped with a single antenna. To prevent the untrusted relay from intercepting the source message, the destination sends an intended jamming noise to the relay, which is referred to as destination-based cooperative jamming. Given this system model, novel closed-form expressions are presented in the high signal-to-noise ratio regime for the ergodic secrecy rate and the secrecy outage probability. We further improve the secrecy performance of the system by optimizing the associated hardware design. The results reveal that by beneficially distributing the tolerable hardware imperfections across the transmission and reception radio-frequency front ends of each node, the system’s secrecy rate may be improved. The engineering insight is that equally sharing the total imperfections at the relay between the transmitter and the receiver provides the best secrecy performance. Numerical results illustrate that the proposed OPA together with the most appropriate hardware design significantly increases the secrecy rate.

[1]  Caijun Zhong,et al.  Optimum Wirelessly Powered Relaying , 2015, IEEE Signal Processing Letters.

[2]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[3]  Feng Zhao,et al.  Spectral-Energy Efficiency Tradeoff in Relay-Aided Massive MIMO Cellular Networks With Pilot Contamination , 2016, IEEE Access.

[4]  A. Lee Swindlehurst,et al.  Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.

[5]  Wei Xu,et al.  Wireless Information and Power Transfer in Secure Massive MIMO Downlink With Phase Noise , 2017, IEEE Wireless Communications Letters.

[6]  Vijay K. Bhargava,et al.  Physical layer security for massive MIMO systems impaired by phase noise , 2016, 2016 IEEE 17th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).

[7]  Aylin Yener,et al.  Two-Hop Secure Communication Using an Untrusted Relay: A Case for Cooperative Jamming , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[8]  Hsiao-Hwa Chen,et al.  A Survey on Multiple-Antenna Techniques for Physical Layer Security , 2017, IEEE Communications Surveys & Tutorials.

[9]  Derrick Wing Kwan Ng,et al.  Analysis and Design of Secure Massive MIMO Systems in the Presence of Hardware Impairments , 2016, IEEE Transactions on Wireless Communications.

[10]  Il-Min Kim,et al.  Joint Secure Beamforming Design at the Source and the Relay for an Amplify-and-Forward MIMO Untrusted Relay System , 2012, IEEE Transactions on Signal Processing.

[11]  Emil Björnson,et al.  Massive MIMO Systems With Non-Ideal Hardware: Energy Efficiency, Estimation, and Capacity Limits , 2013, IEEE Transactions on Information Theory.

[12]  Li Sun,et al.  Performance Study of Two-Hop Amplify-and-Forward Systems With Untrustworthy Relay Nodes , 2012, IEEE Transactions on Vehicular Technology.

[13]  Moslem Noori,et al.  Optimal power allocation to improve secrecy performance of non-regenerative cooperative systems using an untrusted relay , 2016, IET Commun..

[14]  Emil Björnson,et al.  On the impact of transceiver impairments on af relaying , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[15]  Lifeng Wang,et al.  Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.

[16]  Phee Lep Yeoh,et al.  Optimal Power Allocation and Secrecy Sum Rate in Two-Way Untrusted Relaying , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[17]  Derrick Wing Kwan Ng,et al.  Resource Allocation for a Massive MIMO Relay Aided Secure Communication , 2016, IEEE Transactions on Information Forensics and Security.

[18]  Kamel Tourki,et al.  Secure cooperative untrusted-relay network with outdated CSI , 2016, 2016 International Wireless Communications and Mobile Computing Conference (IWCMC).

[19]  Erik G. Larsson,et al.  Scaling Up MIMO: Opportunities and Challenges with Very Large Arrays , 2012, IEEE Signal Process. Mag..

[20]  Phee Lep Yeoh,et al.  Optimal Power Allocation and Secrecy Sum Rate in Two-Way Untrusted Relaying Networks With an External Jammer , 2018, IEEE Transactions on Communications.

[21]  Lu Lv,et al.  Improving physical layer security in untrusted relay networks: cooperative jamming and power allocation , 2017, IET Commun..

[22]  Erik G. Larsson,et al.  Massive MIMO for next generation wireless systems , 2013, IEEE Communications Magazine.

[23]  A. Lee Swindlehurst,et al.  Cooperative Jamming for Secure Communications in MIMO Relay Networks , 2011, IEEE Transactions on Signal Processing.

[24]  Abbas Mohammadi,et al.  Destination-based cooperative jamming in untrusted amplify-and-forward relay networks: resource allocation and performance study , 2016, IET Commun..

[25]  Muhammad R. A. Khandaker,et al.  Masked Beamforming in the Presence of Energy-Harvesting Eavesdroppers , 2015, IEEE Transactions on Information Forensics and Security.

[26]  John S. Thompson,et al.  Relay selection for secure cooperative networks with jamming , 2009, IEEE Transactions on Wireless Communications.

[27]  H. Vincent Poor,et al.  Joint Decode-and-Forward and jamming for wireless physical layer security with destination assistance , 2011, 2011 Conference Record of the Forty Fifth Asilomar Conference on Signals, Systems and Computers (ASILOMAR).

[28]  Preben E. Mogensen,et al.  Assessing and Modeling the Effect of RF Impairments on UTRA LTE Uplink Performance , 2007, 2007 IEEE 66th Vehicular Technology Conference.

[29]  Jing Huang,et al.  Secure Transmission with Optimal Power Allocation in Untrusted Relay Networks , 2014, IEEE Wireless Communications Letters.

[30]  Vijay K. Bhargava,et al.  Linear Precoding of Data and Artificial Noise in Secure Massive MIMO Systems , 2015, IEEE Transactions on Wireless Communications.

[31]  A. Lee Swindlehurst,et al.  Secure Communication Via an Untrusted Non-Regenerative Relay in Fading Channels , 2013, IEEE Transactions on Signal Processing.

[32]  Andreas Peter Burg,et al.  MIMO transmission with residual transmit-RF impairments , 2010, 2010 International ITG Workshop on Smart Antennas (WSA).

[33]  Ali Kuhestani,et al.  Joint Relay Selection and Power Allocation in Large-Scale MIMO Systems With Untrusted Relays and Passive Eavesdroppers , 2017, IEEE Transactions on Information Forensics and Security.

[34]  Ling Wang,et al.  Optimal power allocation for achievable secrecy rate in an untrusted relay network with bounded channel estimation error , 2017, 2017 26th Wireless and Optical Communication Conference (WOCC).

[35]  Tim Schenk,et al.  RF Imperfections in High-rate Wireless Systems: Impact and Digital Compensation , 2008 .

[36]  Fredrik Rusek,et al.  Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks , 2015, IEEE Communications Magazine.

[37]  George K. Karagiannidis,et al.  How Much Does I/Q Imbalance Affect Secrecy Capacity? , 2016, IEEE Communications Letters.

[38]  Lajos Hanzo,et al.  Joint Relay and Jammer Selection Improves the Physical Layer Security in the Face of CSI Feedback Delays , 2015, IEEE Transactions on Vehicular Technology.

[39]  Robert W. Heath,et al.  Performance analysis of maximum ratio combining with imperfect channel estimation in the presence of cochannel interferences , 2009, IEEE Transactions on Wireless Communications.

[40]  Kwok Hung Li,et al.  Secure Cooperative AF Relaying Networks with Untrustworthy Relay Nodes , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).

[41]  Li Sun,et al.  Security-Aware Relaying Scheme for Cooperative Networks With Untrusted Relay Nodes , 2015, IEEE Communications Letters.