Secure Communication Via an Untrusted Non-Regenerative Relay in Fading Channels

We investigate a relay network where the source can potentially utilize an untrusted non-regenerative relay to augment its direct transmission of a confidential message to the destination. Since the relay is untrusted, it is desirable to protect the confidential data from it while simultaneously making use of it to increase the reliability of the transmission. We first examine the secrecy outage probability (SOP) of the network assuming a single antenna relay, and calculate the exact SOP for three different schemes: direct transmission without using the relay, conventional non-regenerative relaying, and cooperative jamming by the destination. Subsequently, we conduct an asymptotic analysis of the SOPs to determine the optimal policies in different operating regimes. We then generalize to the multi-antenna relay case and investigate the impact of the number of relay antennas on the secrecy performance. Finally, we study a scenario where the relay has only a single RF chain which necessitates an antenna selection scheme, and we show that unlike the case where all antennas are used, under certain conditions the cooperative jamming scheme with antenna selection provides a diversity advantage for the receiver. Numerical results are presented to verify the theoretical predictions of the preferred transmission policies.

[1]  James S. Harris,et al.  Tables of integrals , 1998 .

[2]  Helmut Bölcskei,et al.  Fading relay channels: performance limits and space-time signal design , 2004, IEEE Journal on Selected Areas in Communications.

[3]  Ender Tekin,et al.  The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.

[4]  A. Lee Swindlehurst,et al.  Robust Secure Transmission in MISO Channels Based on Worst-Case Optimization , 2011, IEEE Transactions on Signal Processing.

[5]  Matthew R. McKay,et al.  Rethinking the Secrecy Outage Formulation: A Secure Transmission Design Perspective , 2011, IEEE Communications Letters.

[6]  Xiangyun Zhou,et al.  Two-way discriminatory channel estimation for non-reciprocal wireless MIMO channels , 2011, 2011 Conference Record of the Forty Fifth Asilomar Conference on Signals, Systems and Computers (ASILOMAR).

[7]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[8]  D. F. Hays,et al.  Table of Integrals, Series, and Products , 1966 .

[9]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[10]  Carles Padró,et al.  Information Theoretic Security , 2013, Lecture Notes in Computer Science.

[11]  Aarnout Brombacher,et al.  Probability... , 2009, Qual. Reliab. Eng. Int..

[12]  Masoud Ardakani,et al.  Feedback Delay Effect on Dual-Hop MIMO AF Relaying with Antenna Selection , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[13]  I. Miller Probability, Random Variables, and Stochastic Processes , 1966 .

[14]  Dongwoo Kim,et al.  End-to-End BER Performance of Cooperative MIMO Transmission with Antenna Selection in Rayleigh Fading , 2006, 2006 Fortieth Asilomar Conference on Signals, Systems and Computers.

[15]  John G. Proakis,et al.  Probability, random variables and stochastic processes , 1985, IEEE Trans. Acoust. Speech Signal Process..

[16]  Pooi Yuen Kam,et al.  Orthogonal Space-Time Block Codes in Vehicular Environments: Optimum Receiver Design and Performance Analysis , 2009, EURASIP J. Wirel. Commun. Netw..

[17]  David J. Edwards,et al.  Near-Optimal Joint Antenna Selection for Amplify-and-Forward Relay Networks , 2009, IEEE Transactions on Wireless Communications.

[18]  Ioannis Krikidis,et al.  Opportunistic relay selection for cooperative networks with secrecy constraints , 2010, IET Commun..

[19]  David J. Edwards,et al.  Near-optimal joint antenna selection for amplify-and-forward relay networks , 2009 .

[20]  Kin K. Leung,et al.  Opportunistic Relaying for Secrecy Communications: Cooperative Jamming vs. Relay Chatting , 2011, IEEE Transactions on Wireless Communications.

[21]  Aylin Yener,et al.  Two-Hop Secure Communication Using an Untrusted Relay , 2009, EURASIP J. Wirel. Commun. Netw..

[22]  Chong-Yung Chi,et al.  Training Sequence Design for Discriminatory Channel Estimation in Wireless MIMO Systems , 2010, IEEE Transactions on Signal Processing.

[23]  Il-Min Kim,et al.  Joint Secure Beamforming Design at the Source and the Relay for an Amplify-and-Forward MIMO Untrusted Relay System , 2012, IEEE Transactions on Signal Processing.

[24]  Aylin Yener,et al.  Cooperation With an Untrusted Relay: A Secrecy Perspective , 2009, IEEE Transactions on Information Theory.

[25]  John S. Thompson,et al.  Relay selection for secure cooperative networks with jamming , 2009, IEEE Transactions on Wireless Communications.

[26]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[27]  Yasutada Oohama,et al.  Coding for relay channels with confidential messages , 2001, Proceedings 2001 IEEE Information Theory Workshop (Cat. No.01EX494).

[28]  A. Lee Swindlehurst,et al.  Cooperative Jamming for Secure Communications in MIMO Relay Networks , 2011, IEEE Transactions on Signal Processing.