Joint Relay and Jammer Selection for Wireless Physical-Layer Security

This chapter investigates the physical-layer security for a cooperative wireless network, where a source node transmits to its destination with the aid of multiple intermediate nodes in the face of an eavesdropper. We propose a joint relay and jammer selection scheme for protecting the source-destination transmission against the eavesdropper. To be specific, among the multiple intermediate nodes, one node is first selected to act as the relay for assisting the transmission from the source to destination and meanwhile, another node is chosen as the jammer that is employed to transmit an artificial noise for interfering with the eavesdropper. Also, we consider the conventional pure relay selection and pure jammer selection as benchmark schemes. In the pure relay selection scheme, an intermediate node is selected as the relay to assist the source-destination transmission. By contrast, the pure jammer selection allows an intermediate node to act the jammer for confusing the eavesdropper. We derive the closed-form intercept probability expressions for the proposed joint relay and jammer selection as well as the conventional pure relay selection and pure jammer selection schemes. Numerical results demonstrate that the joint relay and jammer selection outperforms the pure relay selection and pure jammer selection methods in terms of the intercept probability, showing the security benefit of employing the proposed scheme to protect the wireless communications against eavesdropping.

[1]  Per Ola Börjesson,et al.  OFDM channel estimation by singular value decomposition , 1996, Proceedings of Vehicular Technology Conference - VTC.

[2]  Sinem Coleri Ergen,et al.  Channel estimation techniques based on pilot arrangement in OFDM systems , 2002, IEEE Trans. Broadcast..

[3]  Zhu Han,et al.  Joint Relay and Jammer Selection for Secure Two-Way Relay Networks , 2012, IEEE Trans. Inf. Forensics Secur..

[4]  Matthew R. McKay,et al.  Secure Transmission With Artificial Noise Over Fading Channels: Achievable Rate and Optimal Power Allocation , 2010, IEEE Transactions on Vehicular Technology.

[5]  Wenbo Wang,et al.  Transmitter beamforming and artificial noise with delayed feedback: Secrecy rate and power allocation , 2012, Journal of Communications and Networks.

[6]  Kin K. Leung,et al.  Artificial Noise Generation from Cooperative Relays for Everlasting Secrecy in Two-Hop Wireless Networks , 2011, IEEE Journal on Selected Areas in Communications.

[7]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[8]  Mounir Ghogho,et al.  Outage Probability Based Power Distribution Between Data and Artificial Noise for Physical Layer Security , 2012, IEEE Signal Processing Letters.

[9]  John S. Thompson,et al.  Relay selection for secure cooperative networks with jamming , 2009, IEEE Transactions on Wireless Communications.

[10]  Ashish Khisti,et al.  Artificial-Noise Alignment for Secure Multicast using Multiple Antennas , 2012, IEEE Communications Letters.

[11]  Zhu Han,et al.  Physical Layer Security for Two-Way Untrusted Relaying With Friendly Jammers , 2012, IEEE Transactions on Vehicular Technology.