Secure Two-Way Transmission via Wireless-Powered Untrusted Relay and External Jammer

In this paper, we propose a two-way secure communication scheme where two transceivers exchange confidential messages via a wireless-powered untrusted amplify-and-forward relay in the presence of an external jammer. We take into account both friendly jamming (FJ) and Gaussian noise jamming (GNJ) scenarios. Based on the time switching (TS) architecture at the relay, the data transmission is done in three phases. In the first phase, both the energy-starved nodes, the untrustworthy relay and the jammer, are charged by noninformation radio frequency (RF) signals from the sources. In the second phase, the two sources send their information signals and concurrently, the jammer transmits artificial noise to confuse the curious relay. Finally, the third phase is dedicated to forward a scaled version of the received signal from the relay to the sources. For the proposed secure transmission schemes, we derive new closed-form lower-bound expressions for the ergodic secrecy sum rate (ESSR) in the high signal-to-noise ratio (SNR) regime. We further analyze the asymptotic ESSR to determine the key parameters; the high SNR slope and the high SNR power offset of the jamming based scenarios. To highlight the performance advantage of the proposed FJ, we also examine the scenario of without jamming (WoJ). Finally, numerical examples and discussions are provided to acquire some engineering insights, and to demonstrate the impacts of different system parameters on the secrecy performance of the considered communication scenarios. The numerical results illustrate that the proposed FJ significantly outperforms the traditional one-way communication and the constellation rotation (CR) approach, as well as our proposed benchmarks, the two-way WoJ and GNJ scenarios.

[1]  Rahim Tafazolli,et al.  A Novel Equivalent Definition of Modified Bessel Functions for Performance Analysis of Multi-Hop Wireless Communication Systems , 2017, IEEE Access.

[2]  Zhu Han,et al.  Physical Layer Security Game: Interaction between Source, Eavesdropper, and Friendly Jammer , 2009, EURASIP J. Wirel. Commun. Netw..

[3]  Meixia Tao,et al.  Secure Beamforming for MIMO Two-Way Communications With an Untrusted Relay , 2013, IEEE Transactions on Signal Processing.

[4]  Tho Le-Ngoc,et al.  Physical layer security in wireless cooperative relay networks: state of the art and beyond , 2015, IEEE Communications Magazine.

[5]  Meng Zhang,et al.  Artificial Noise Aided Secrecy Information and Power Transfer in OFDMA Systems , 2016, IEEE Transactions on Wireless Communications.

[6]  Moslem Noori,et al.  Optimal power allocation to improve secrecy performance of non-regenerative cooperative systems using an untrusted relay , 2016, IET Commun..

[7]  Sennur Ulukus,et al.  Wireless Physical-Layer Security: Lessons Learned From Information Theory , 2015, Proceedings of the IEEE.

[8]  Li Sun,et al.  Securing Two-Way Cooperative Systems With an Untrusted Relay: A Constellation-Rotation Aided Approach , 2015, IEEE Communications Letters.

[9]  Siad Daboul,et al.  The Lah Numbers and the nth Derivative of e1/x , 2013 .

[10]  Branka Vucetic,et al.  Performance analysis of beamforming in two hop amplify and forward relay networks with antenna correlation , 2009, IEEE Transactions on Wireless Communications.

[11]  Jinhong Yuan,et al.  Cooperative jamming protocols in two hop amplify-and-forward wiretap channels , 2013, 2013 IEEE International Conference on Communications (ICC).

[12]  Aylin Yener,et al.  Two-Hop Secure Communication Using an Untrusted Relay: A Case for Cooperative Jamming , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[13]  Phee Lep Yeoh,et al.  Optimal Power Allocation and Secrecy Sum Rate in Two-Way Untrusted Relaying Networks With an External Jammer , 2018, IEEE Transactions on Communications.

[14]  Adrish Banerjee,et al.  Secure Communication via a Wireless Energy Harvesting Untrusted Relay , 2015, IEEE Transactions on Vehicular Technology.

[15]  Steven W. McLaughlin,et al.  Coding for Cryptographic Security Enhancement Using Stopping Sets , 2011, IEEE Transactions on Information Forensics and Security.

[16]  John G. Proakis,et al.  Probability, random variables and stochastic processes , 1985, IEEE Trans. Acoust. Speech Signal Process..

[17]  Lajos Hanzo,et al.  Security Versus Reliability Analysis of Opportunistic Relaying , 2013, IEEE Transactions on Vehicular Technology.

[18]  Hien Quoc Ngo,et al.  Massive MIMO in Spectrum Sharing Networks: Achievable Rate and Power Efficiency , 2017, IEEE Systems Journal.

[19]  Anant Sahai,et al.  Shannon meets Tesla: Wireless information and power transfer , 2010, 2010 IEEE International Symposium on Information Theory.

[20]  Jaesung Lim,et al.  Capacity Scaling and Diversity Order for Secure Cooperative Relaying With Untrustworthy Relays , 2015, IEEE Transactions on Wireless Communications.

[21]  K. J. Ray Liu,et al.  Advances in Energy Harvesting Communications: Past, Present, and Future Challenges , 2016, IEEE Communications Surveys & Tutorials.

[22]  Mengyu Liu,et al.  Power Allocation for Secure SWIPT Systems With Wireless-Powered Cooperative Jamming , 2017, IEEE Communications Letters.

[23]  Ali A. Nasir,et al.  Wireless-Powered Relays in Cooperative Communications: Time-Switching Relaying Protocols and Throughput Analysis , 2013, IEEE Transactions on Communications.

[24]  Steven W. McLaughlin,et al.  Tandem coding and cryptography on wiretap channels: EXIT chart analysis , 2009, 2009 IEEE International Symposium on Information Theory.

[25]  Zhu Han,et al.  Physical Layer Security for Two-Way Untrusted Relaying With Friendly Jammers , 2012, IEEE Transactions on Vehicular Technology.

[26]  Lajos Hanzo,et al.  Joint Relay and Jammer Selection Improves the Physical Layer Security in the Face of CSI Feedback Delays , 2015, IEEE Transactions on Vehicular Technology.

[27]  Gayan Amarasuriya Aruma Baduge,et al.  Wireless Energy Harvesting in Cognitive Massive MIMO Systems With Underlay Spectrum Sharing , 2017, IEEE Wireless Communications Letters.

[28]  Jing Huang,et al.  Secure Transmission with Optimal Power Allocation in Untrusted Relay Networks , 2014, IEEE Wireless Communications Letters.

[29]  Yasutada Oohama,et al.  Coding for relay channels with confidential messages , 2001, Proceedings 2001 IEEE Information Theory Workshop (Cat. No.01EX494).

[30]  A. Lee Swindlehurst,et al.  Joint transmit design and node selection for one-way and two-way untrusted relay channels , 2013, 2013 Asilomar Conference on Signals, Systems and Computers.

[31]  Erik G. Larsson,et al.  Wireless Information and Power Transfer in Multiway Massive MIMO Relay Networks , 2016, IEEE Transactions on Wireless Communications.

[32]  Toshiaki Miyazaki,et al.  Antieavesdropping With Selfish Jamming in Wireless Networks: A Bertrand Game Approach , 2017, IEEE Transactions on Vehicular Technology.

[33]  Salman Durrani,et al.  Secure Communication With a Wireless-Powered Friendly Jammer , 2014, IEEE Transactions on Wireless Communications.

[34]  Phee Lep Yeoh,et al.  Optimal Power Allocation and Secrecy Sum Rate in Two-Way Untrusted Relaying , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[35]  Antonia Maria Tulino,et al.  High-SNR power offset in multiantenna communication , 2005, IEEE Transactions on Information Theory.

[36]  Lifeng Wang,et al.  Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.

[37]  Ali Kuhestani,et al.  Joint Relay Selection and Power Allocation in Large-Scale MIMO Systems With Untrusted Relays and Passive Eavesdroppers , 2017, IEEE Transactions on Information Forensics and Security.