Improving the Physical Layer Security in Cooperative Networks with Multiple Eavesdroppers

Physical layer security is an efficient technique to realize security in wireless network without relying on conventional cryptographic techniques. In cooperative networks with secrecy constraints, joint relay and jammer selection is a promising approach for improving the security of wireless communications. We need to apply more techniques in order to achieve more effective security in contrast to the mentioned method. In this paper, we propose three techniques to increase the secrecy as follows: Firstly, we introduce a new criterion which decreases the rate at the eavesdroppers. Next, a new relay selection schemes are proposed, where two of the available relays are selected for data transmission. Therefore, the secrecy rate is increased considerably. Finally, we propose a sub-optimal power allocation solution for jammer nodes. Sub-optimal power of the jammer nodes vary according to the type of scenario, location of the eavesdroppers, and the destination. The sub-optimal power allocation to the jammer nodes causes more eavesdroppers confusion. As a result, the total secrecy rate is increased. Simulation and analytical results demonstrate the performance improvement of the proposed techniques.

[1]  Liuqing Yang,et al.  Relay selection from a battery energy efficiency perspective , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.

[2]  Michele Nogueira Lima,et al.  Identity-based key management in mobile ad hoc networks: techniques and applications , 2008, IEEE Wireless Communications.

[3]  H. Vincent Poor,et al.  A knapsack problem formulation for relay selection in secure cooperative wireless communication , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[4]  John S. Thompson,et al.  Relay selection for secure cooperative networks with jamming , 2009, IEEE Transactions on Wireless Communications.

[5]  Hyundong Shin,et al.  Outage analysis for co-operative communication with multiple amplify-and-forward relays , 2007 .

[6]  Roy D. Yates,et al.  Discrete Memoryless Interference and Broadcast Channels With Confidential Messages: Secrecy Rate Regions , 2007, IEEE Transactions on Information Theory.

[7]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[8]  Miguel R. D. Rodrigues,et al.  Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.

[9]  S. El-Rabaie,et al.  Proposed relay selection scheme for physical layer security in cognitive radio networks , 2012, IET Commun..

[10]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[11]  Athina P. Petropulu,et al.  Relay selection and scaling law in destination assisted physical layer secrecy systems , 2012, 2012 IEEE Statistical Signal Processing Workshop (SSP).

[12]  Hesham El Gamal,et al.  The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.

[13]  John S. Thompson,et al.  Amplify-and-forward with partial relay selection , 2008, IEEE Communications Letters.

[14]  Sami Muhaidat,et al.  Performance Analysis of Relay Selection With Feedback Delay and Channel Estimation Errors , 2011, IEEE Signal Processing Letters.

[15]  Gonzalo Seco-Granados,et al.  Opportunistic relay selection with outdated CSI: outage probability and diversity analysis , 2009, IEEE Transactions on Wireless Communications.

[16]  Ioannis Krikidis,et al.  Opportunistic relay selection for cooperative networks with secrecy constraints , 2010, IET Commun..

[17]  Yueming Cai,et al.  Secrecy Rates for Relay Selection in OFDMA Networks , 2011, 2011 Third International Conference on Communications and Mobile Computing.

[18]  Dong Liang,et al.  Relay self-selection for secure cooperative in Amplify-And-Forward networks , 2012, 7th International Conference on Communications and Networking in China.

[19]  Raef Bassily,et al.  Deaf Cooperation and Relay Selection Strategies for Secure Communication in Multiple Relay Networks , 2013, IEEE Transactions on Signal Processing.

[20]  Yifei Wei,et al.  Research on secrecy capacity oriented relay selection for mobile cooperative networks , 2011, 2011 IEEE International Conference on Cloud Computing and Intelligence Systems.

[21]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[22]  Fathi E. Abd El-Samie,et al.  Relaying techniques for enhancing the physical layer secrecy in cooperative networks with multiple eavesdroppers , 2014, Trans. Emerg. Telecommun. Technol..

[23]  Robert Schober,et al.  Combined relay selection and cooperative beamforming for physical layer security , 2012, Journal of Communications and Networks.