Amplify-and-forward-based cooperative jamming strategy with power allocation for secure communication

This paper deals with the use of jamming transmission for secure amplify-and-forward-based relay networks with total power constraints. An approach that the source and the relay use some of their available power to transmit jamming signals in order to create interference at the eavesdropper is investigated. Assume that the relay and destination have an a priori knowledge of the jamming signals. A power allocation policy that defines how the available power is distributed between the message signal and that of the jamming signal is presented. The results show that the proposed approach can increase the secrecy level and that a positive secrecy rate can be achieved even when the eavesdropper may be near the source. Copyright © 2014 John Wiley & Sons, Ltd.

[1]  R. Negi,et al.  Secret communication using artificial noise , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..

[2]  Raef Bassily,et al.  Cooperative Security at the Physical Layer: A Summary of Recent Advances , 2013, IEEE Signal Processing Magazine.

[3]  Ioannis Krikidis,et al.  Opportunistic relay selection for cooperative networks with secrecy constraints , 2010, IET Commun..

[4]  Hamid Jafarkhani,et al.  Cooperative Jamming and Power Allocation for Wireless Relay Networks in Presence of Eavesdropper , 2011, 2011 IEEE International Conference on Communications (ICC).

[5]  Mohamed-Slim Alouini,et al.  On the Jamming Power Allocation for Secure Amplify-and-Forward Relaying via Cooperative Jamming , 2013, IEEE Journal on Selected Areas in Communications.

[6]  Jia Hou,et al.  Decode‐and‐forward with full‐duplex relaying , 2012, Int. J. Commun. Syst..

[7]  Ananthanarayanan Chockalingam,et al.  Decode-and-Forward Relay Beamforming for Secrecy with Finite-Alphabet Input , 2013, IEEE Communications Letters.

[8]  M. Yuksel,et al.  Secure Communication with a Relay Helping the Wire-tapper , 2007, 2007 IEEE Information Theory Workshop.

[9]  Kin K. Leung,et al.  On the Application of Cooperative Transmission to Secrecy Communications , 2012, IEEE Journal on Selected Areas in Communications.

[10]  H. Vincent Poor,et al.  Interference Assisted Secret Communication , 2008, IEEE Transactions on Information Theory.

[11]  Raef Bassily,et al.  Deaf Cooperation and Relay Selection Strategies for Secure Communication in Multiple Relay Networks , 2013, IEEE Transactions on Signal Processing.

[12]  Wenbo Wang,et al.  Achievable rate region with secrecy constraints for secure communication in two‐way relay networks , 2015, Int. J. Commun. Syst..

[13]  Sami Muhaidat,et al.  Amplify-and-Forward Selection Cooperation over Rayleigh Fading Channels with Imperfect CSI , 2012, IEEE Transactions on Wireless Communications.

[14]  Zhiguo Ding,et al.  Energy Efficiency of Cooperative Jamming Strategies in Secure Wireless Networks , 2012, IEEE Transactions on Wireless Communications.

[15]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.