Physical layer security for cooperative communication system with untrusted relay based on jamming signals

This paper investigates the cooperative communication system with untrusted relay using the new scheme that the source transmits the jamming signals and the source signals at the same time. We exploit greedy power allocation algorithm to divide the source power to ensure maximum secrecy capacity. Besides, we analyze the situation that external eavesdropper and untrusted relay exist at the same time. At the end of the paper, BPSK modulation and demodulation scheme is given as an example, and SER is used to estimate the performance of the system. The simulation results show that the scheme can resist both internal and external eavesdropping nodes.

[1]  Zhu Han,et al.  Physical Layer Security for Two-Way Untrusted Relaying With Friendly Jammers , 2012, IEEE Transactions on Vehicular Technology.

[2]  Yasutada Oohama,et al.  Coding for relay channels with confidential messages , 2001, Proceedings 2001 IEEE Information Theory Workshop (Cat. No.01EX494).

[3]  Yasutada Oohama,et al.  Capacity Theorems for Relay Channels with Confidential Messages , 2007, 2007 IEEE International Symposium on Information Theory.

[4]  Meixia Tao,et al.  Secure Beamforming for MIMO Two-Way Communications With an Untrusted Relay , 2013, IEEE Transactions on Signal Processing.

[5]  Huiming Wang,et al.  To secure amplify-and-forward relay systems via joint cooperative beamforming and jamming , 2013, 2013 IEEE China Summit and International Conference on Signal and Information Processing.

[6]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[7]  Marius Pesavento,et al.  Enhancing physical layer security in untrusted relay networks with artificial noise: A symbol error rate based approach , 2014, 2014 IEEE 8th Sensor Array and Multichannel Signal Processing Workshop (SAM).

[8]  Aylin Yener,et al.  Two-Hop Secure Communication Using an Untrusted Relay , 2009, EURASIP J. Wirel. Commun. Netw..

[9]  Aylin Yener,et al.  Two-Hop Secure Communication Using an Untrusted Relay: A Case for Cooperative Jamming , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[10]  Jing Wang,et al.  Cooperative jamming and power allocation in three-phase two-way relaying system with untrusty relay node , 2014, 2014 XXXIth URSI General Assembly and Scientific Symposium (URSI GASS).

[11]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[12]  Aylin Yener,et al.  Cooperation With an Untrusted Relay: A Secrecy Perspective , 2009, IEEE Transactions on Information Theory.

[13]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.