Improving secrecy for multi-relay multi-eavesdropper wireless systems through relay selection

In this paper, we consider a cooperative relay network consisting of a source, a destination and multiple decode-and-forward relays in the presence of multiple eavesdroppers, which intend to tap confidential messages transmitted by both the source and relays. We propose both the so-called secrecy maximisation oriented relay selection (SMORS) and multi-relay oriented relay selection (MRORS) schemes to improve the physical layer security of wireless communications. In the SMORS scheme, a single relay with the maximal secrecy rate is selected among all the decode-and-forward relays to forward the source signal. By contrast, in the MRORS scheme, the relays that succeed in decoding the source signal will be employed to simultaneously forward their decoded signals to the destination. We analyse the intercept probability of the SMORS and MRORS schemes as well as the traditional max–min relay selection scheme. It is shown that the proposed MRORS scheme outperforms the SMORS and max–min relay selection schemes in terms of the intercept probability. Additionally, it is shown that with an increasing number of eavesdroppers, the intercept performance of wireless communications degrades, which can be well addressed using the SMORS and MRORS schemes through increasing the number of relays. By contrast, increasing the number of relays has little impact on the intercept probability for the conventional max–min relay selection scheme Transactions on Emerging Telecommunications Technologies. Copyright © 2016 John Wiley & Sons, Ltd.

[1]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[2]  Yu-Dong Yao,et al.  An Adaptive Cooperation Diversity Scheme With Best-Relay Selection in Cognitive Radio Networks , 2010, IEEE Transactions on Signal Processing.

[3]  Huiming Wang,et al.  Secrecy Transmission With a Helper: To Relay or to Jam , 2015, IEEE Transactions on Information Forensics and Security.

[4]  Xiang Zhang,et al.  Partner Selection and Incentive Mechanism for Physical Layer Security , 2015, IEEE Transactions on Wireless Communications.

[5]  Kiseon Kim,et al.  Secrecy Outage Probability of Optimal Relay Selection for Secure AnF Cooperative Networks , 2015, IEEE Communications Letters.

[6]  George K. Karagiannidis,et al.  Secure Multiuser Communications in Multiple Amplify-and-Forward Relay Networks , 2014, IEEE Transactions on Communications.

[7]  Xuelong Li,et al.  Secrecy Outage and Diversity Analysis of Cognitive Radio Systems , 2014, IEEE Journal on Selected Areas in Communications.

[8]  Hong Long,et al.  Robust amplify-and-forward relay beamforming for security with mean square error constraint , 2015, IET Commun..

[9]  Hyung Yun Kong,et al.  CSI-Secured Orthogonal Jamming Method for Wireless Physical Layer Security , 2014, IEEE Communications Letters.

[10]  Hao Chen,et al.  Social Tie Based Cooperative Jamming for Physical Layer Security , 2015, IEEE Communications Letters.

[11]  Zhi Chen,et al.  Cooperative Secrecy Beamforming in Wiretap Interference Channels , 2015, IEEE Signal Processing Letters.

[12]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.

[13]  Tran Trung Duy,et al.  Relay Selection for Security Enhancement in Cognitive Relay Networks , 2015, IEEE Wireless Communications Letters.

[14]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[15]  Javier López,et al.  Relay selection for secure 5G green communications , 2015, Telecommun. Syst..

[16]  Jing Wang,et al.  Cooperative jamming and power allocation with untrusty two-way relay nodes , 2014, IET Commun..

[17]  Wenbo Wang,et al.  Algorithms for Secrecy Guarantee With Null Space Beamforming in Two-Way Relay Networks , 2014, IEEE Transactions on Signal Processing.

[18]  Wei-Ping Zhu,et al.  Relay-Selection Improves the Security-Reliability Trade-Off in Cognitive Radio Systems , 2014, IEEE Transactions on Communications.

[19]  Feng Liu,et al.  Outage Constrained Secrecy Throughput Maximization for DF Relay Networks , 2015, IEEE Transactions on Communications.

[20]  Qiang Li,et al.  Robust Cooperative Beamforming and Artificial Noise Design for Physical-Layer Secrecy in AF Multi-Antenna Multi-Relay Networks , 2015, IEEE Transactions on Signal Processing.

[21]  Il-Min Kim,et al.  Joint Secure Beamforming Design at the Source and the Relay for an Amplify-and-Forward MIMO Untrusted Relay System , 2012, IEEE Transactions on Signal Processing.

[22]  Aylin Yener,et al.  Cooperation With an Untrusted Relay: A Secrecy Perspective , 2009, IEEE Transactions on Information Theory.

[23]  Xianbin Wang,et al.  Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks , 2013, IEEE Journal on Selected Areas in Communications.

[24]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[25]  Stéphane Y. Le Goff,et al.  Secrecy Rate Optimizations for a MIMO Secrecy Channel With a Cooperative Jammer , 2015, IEEE Transactions on Vehicular Technology.

[26]  Athanasios V. Vasilakos,et al.  Full duplex techniques for 5G networks: self-interference cancellation, protocol design, and relay selection , 2015, IEEE Communications Magazine.

[27]  Zhi Chen,et al.  On Secrecy Capacity of Gaussian Wiretap Channel Aided by A Cooperative Jammer , 2014, IEEE Signal Processing Letters.