Optimal Power Control and Link Selection Policy for Buffer-Aided Two-Hop Secure Communications

In this paper, secure communication over a buffer-aided two-hop communication link, in which a source sends data to a destination with the aid of a trusted half-duplex relay node in the presence of a passive eavesdropper, is studied. It is assumed that there is no direct link between the source and the destination, and the buffer-aided relay forwards the information to the destination by employing the decode-and-forward (DF) scheme. Both the source and the relay transmissions are assumed to be vulnerable to the eavesdropper. The perfect channel side information (CSI) of the network is assumed to be available at the source and the relay. Initially, conventional relaying protocols where equal partition of the time for the reception and transmission of the relay is considered. Then, the optimal time fraction with the optimal power control policy that maximizes the secrecy throughput is identified. Subsequently, the optimal joint link selection and power control policy that maximizes the secrecy throughput is derived. Numerical results demonstrate that the joint link selection and power control scheme can significantly improve the achievable secrecy throughput of the buffer-aided two-hop communication system.

[1]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[2]  Romano Fantacci,et al.  Buffer-Aided Diamond Relay Network With Block Fading and Inter-Relay Interference , 2016, IEEE Transactions on Wireless Communications.

[3]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2007, ISIT.

[4]  H. Vincent Poor,et al.  Buffering in a Three-Node Relay Network , 2008, IEEE Transactions on Wireless Communications.

[5]  Naofal Al-Dhahir,et al.  Physical-Layer Security of a Buffer-Aided Full-Duplex Relaying System , 2016, IEEE Communications Letters.

[6]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[7]  Robert Schober,et al.  Buffer-Aided Relaying with Adaptive Link Selection , 2012, IEEE Journal on Selected Areas in Communications.

[8]  Hesham El Gamal,et al.  The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.

[9]  Zhi Chen,et al.  Max-Ratio Relay Selection in Secure Buffer-Aided Cooperative Wireless Networks , 2014, IEEE Transactions on Information Forensics and Security.

[10]  Huiming Wang,et al.  Secrecy Transmission With a Helper: To Relay or to Jam , 2015, IEEE Transactions on Information Forensics and Security.

[11]  A. Lee Swindlehurst,et al.  Buffer-Aided Relaying for Two-Hop Secure Communication , 2015, IEEE Transactions on Wireless Communications.