Joint Relay and Eavesdropper Selection Strategy Against Multiple Eavesdroppers over Nakagami- $m$ Fading Channels in Cooperative Decode-and-Forward Relay Networks

Physical layer security (PLS) in the presence of multiple eavesdroppers over Nakagami-<inline-formula> <tex-math notation="LaTeX">${m}$ </tex-math></inline-formula> fading channels for cooperative decode-and-forward (DF) relay network that consists of one source, one destination, and multiple relays is investigated. Different from the recent PLS system model that only considers one eavesdropper during eavesdropping attack, this paper extends the one-eavesdropper case to a multiple-eavesdropper scenario and investigates joint relay and eavesdropper selection (JRES) strategy against eavesdropping attack over Nakagami-<inline-formula> <tex-math notation="LaTeX">${m}$ </tex-math></inline-formula> fading channels. In the proposed strategy, the best relay is selected via the maximum relay forward channel capacity. In addition, since eavesdroppers are non-cooperative, the worst case is considered. Namely, the wiretap channel between the best relay and the chosen eavesdropper has the maximum capacity. Traditional direct transmission and opportunistic relay selection (ORS) scheme in the presence of one eavesdropper over Rayleigh channel are regarded as benchmarks. Moreover, a security–reliability tradeoff (SRT) performance is analyzed, where the reliability performance is expressed by outage probability (OP), while the security performance is measured by intercept probability (IP). Closed-form expressions of OP and IP are derived. The numerical results show that the proposed JRES scheme outperforms the traditional direct transmission and the ORS scheme in the presence of one eavesdropper over Rayleigh channel. The SRT performance is enhanced obviously with the increasing of relay numbers and Nakagami channel fading factor <inline-formula> <tex-math notation="LaTeX">${m}$ </tex-math></inline-formula> for a given number of eavesdroppers, which extends the PLS and SRT performance analysis to a more general case in a cooperative DF relay network.

[1]  An Liu,et al.  Secrecy outage probability of cognitive decode-and-forward relay networks , 2016, 2016 IEEE International Conference on Communications Workshops (ICC).

[2]  Xuelong Li,et al.  Relay selection for wireless communications against eavesdropping: a security-reliability trade-off perspective , 2016, IEEE Network.

[3]  Lajos Hanzo,et al.  Security Versus Reliability Analysis of Opportunistic Relaying , 2013, IEEE Transactions on Vehicular Technology.

[4]  Lajos Hanzo,et al.  A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.

[5]  Jia Zhu,et al.  Joint Cooperative Beamforming and Jamming for Physical-Layer Security of Decode-and-Forward Relay Networks , 2017, IEEE Access.

[6]  Su Hu,et al.  Physical Layer Security in 5G Based Large Scale Social Networks: Opportunities and Challenges , 2018, IEEE Access.

[7]  Qian Xu,et al.  Experimental Study on Key Generation for Physical Layer Security in Wireless Communications , 2016, IEEE Access.

[8]  Guan Gui,et al.  Relay Selections for Security and Reliability in Mobile Communication Networks over Nakagami-m Fading Channels , 2017, Secur. Commun. Networks.

[9]  Wei-Ping Zhu,et al.  Security–Reliability Tradeoff Analysis of Multirelay-Aided Decode-and-Forward Cooperation Systems , 2015, IEEE Transactions on Vehicular Technology.

[10]  Xiqi Gao,et al.  A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead , 2018, IEEE Journal on Selected Areas in Communications.

[11]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[12]  Lutz Lampe,et al.  Physical layer security in MIMO power line communication networks , 2014, 18th IEEE International Symposium on Power Line Communications and Its Applications.

[13]  A. Lee Swindlehurst,et al.  Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.

[14]  Xianbin Wang,et al.  Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks , 2013, IEEE Journal on Selected Areas in Communications.

[15]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[16]  Stamatios V. Kartalopoulos,et al.  A primer on cryptography in communications , 2006, IEEE Communications Magazine.

[17]  Zhu Han,et al.  Joint Relay and Jammer Selection for Secure Two-Way Relay Networks , 2012, IEEE Trans. Inf. Forensics Secur..

[18]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[19]  Xuelong Li,et al.  Secrecy Outage and Diversity Analysis of Cognitive Radio Systems , 2014, IEEE Journal on Selected Areas in Communications.

[20]  Wuyang Zhou,et al.  Dynamic Spectrum Access With Physical Layer Security: A Game-Based Jamming Approach , 2018, IEEE Access.

[21]  Manu,et al.  Encryption algorithm using dual modulus , 2017, 2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT).

[22]  Jia Zhu,et al.  Power-Constrained Secrecy Rate Maximization for Joint Relay and Jammer Selection Assisted Wireless Networks , 2017, IEEE Transactions on Communications.

[23]  Lajos Hanzo,et al.  Joint Relay and Jammer Selection Improves the Physical Layer Security in the Face of CSI Feedback Delays , 2015, IEEE Transactions on Vehicular Technology.