Hybrid Opportunistic Relaying and Jamming With Power Allocation for Secure Cooperative Networks

This paper studies the cooperative transmission for securing a decode-and-forward (DF) two-hop network where multiple cooperative nodes coexist with a potential eavesdropper. Under the more practical assumption that only the channel distribution information (CDI) of the eavesdropper is known, we propose an opportunistic relaying with artificial jamming secrecy scheme, where a “best” cooperative node is chosen among a collection of N possible candidates to forward the confidential signal and the others send jamming signals to confuse the eavesdroppers. We first investigate the ergodic secrecy rate (ESR) maximization problem by optimizing the power allocation between the confidential signal and jamming signals. In particular, we exploit the limiting distribution technique of extreme order statistics to build an asymptotic closed-form expression of the achievable ESR and the power allocation is optimized to maximize the ESR lower bound. Although the optimization problems are non-convex, we propose a sequential parametric convex approximation (SPCA) algorithm to locate the Karush-Kuhn-Tucker (KKT) solutions. Furthermore, taking the time variance of the legitimate links' CSIs into consideration, we address the impacts of the outdated CSIs to the proposed secrecy scheme, and derive an asymptotic ESR. Finally, we generalize the analysis to the scenario with multiple eavesdroppers, and give the asymptotic analytical results of the achievable ESR. Simulation results confirm our analytical results.

[1]  Ronald F. Boisvert,et al.  NIST Handbook of Mathematical Functions , 2010 .

[2]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2007, ISIT.

[3]  Alireza Bayesteh,et al.  Asymptotic Analysis of Amplify and Forward Relaying in a Parallel MIMO Relay Network , 2007, IEEE Transactions on Information Theory.

[4]  Gonzalo Seco-Granados,et al.  Opportunistic relay selection with outdated CSI: outage probability and diversity analysis , 2009, IEEE Transactions on Wireless Communications.

[5]  Jianhua Lu,et al.  Improving Wireless Security for Bidirectional Communication Scenarios , 2012, IEEE Transactions on Vehicular Technology.

[6]  Ioannis Krikidis,et al.  Opportunistic relay selection for cooperative networks with secrecy constraints , 2010, IET Commun..

[7]  Shlomo Shamai,et al.  Information Theoretic Security , 2009, Found. Trends Commun. Inf. Theory.

[8]  Joseph Lipka,et al.  A Table of Integrals , 2010 .

[9]  Ozgur Oyman Opportunism in Multiuser Relay Channels: Scheduling, Routing and Spectrum Reuse , 2007, 2007 IEEE International Symposium on Information Theory.

[10]  Wei Xu,et al.  On the Design of Relay Selection Strategies in Regenerative Cooperative Networks with Outdated CSI , 2011, IEEE Transactions on Wireless Communications.

[11]  Kai-Jie Yang,et al.  On Power Allocation and Relay Selection for a Two-Way Amplify-and-Forward Relaying System , 2013, IEEE Transactions on Communications.

[12]  Steven P. Weber,et al.  On Cooperative Relaying Schemes for Wireless Physical Layer Security , 2010, IEEE Transactions on Signal Processing.

[13]  Derrick Wing Kwan Ng,et al.  Secure Resource Allocation and Scheduling for OFDMA Decode-and-Forward Relay Networks , 2011, IEEE Transactions on Wireless Communications.

[14]  W. C. Jakes,et al.  Microwave Mobile Communications , 1974 .

[15]  Xianbin Wang,et al.  Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks , 2013, IEEE Journal on Selected Areas in Communications.

[16]  Amir Beck,et al.  A sequential parametric convex approximation method with applications to nonconvex truss topology design problems , 2010, J. Glob. Optim..

[17]  Shahram Shahbazpanahi,et al.  Achievable Rate Region under Joint Distributed Beamforming and Power Allocation for Two-Way Relay Networks , 2012, IEEE Transactions on Wireless Communications.

[18]  H. Vincent Poor,et al.  Collaborative beamforming for distributed wireless ad hoc sensor networks , 2005, IEEE Transactions on Signal Processing.

[19]  George K. Karagiannidis,et al.  Amplify-and-Forward Relay Selection with Outdated Channel Estimates , 2012, IEEE Transactions on Communications.

[20]  Shahram Shahbazpanahi,et al.  Optimal Distributed Beamforming for Two-Way Relay Networks , 2010, IEEE Transactions on Signal Processing.

[21]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[22]  Hyundong Shin,et al.  Cooperative Communications with Outage-Optimal Opportunistic Relaying , 2007, IEEE Transactions on Wireless Communications.

[23]  Zhu Han,et al.  Physical Layer Security for Two-Way Untrusted Relaying With Friendly Jammers , 2012, IEEE Transactions on Vehicular Technology.

[24]  Huiming Wang,et al.  Hybrid Cooperative Beamforming and Jamming for Physical-Layer Security of Two-Way Relay Networks , 2013, IEEE Transactions on Information Forensics and Security.

[25]  M. V. Clark,et al.  Theoretical reliability of MMSE linear diversity combining in Rayleigh-fading additive interference channels , 1998, IEEE Trans. Commun..

[26]  Mérouane Debbah,et al.  Relay Selection Schemes for Dual-Hop Networks under Security Constraints with Multiple Eavesdroppers , 2013, IEEE Transactions on Wireless Communications.

[27]  Kai-Kit Wong,et al.  Optimal Cooperative Jamming to Enhance Physical Layer Security Using Relays , 2011, IEEE Transactions on Signal Processing.

[28]  George K. Karagiannidis,et al.  The Diversity Potential of Relay Selection with Practical Channel Estimation , 2011, IEEE Transactions on Wireless Communications.

[29]  A. Lee Swindlehurst,et al.  Adaptive Limited Feedback for MISO Wiretap Channels With Cooperative Jamming , 2014, IEEE Trans. Signal Process..

[30]  Kin K. Leung,et al.  On the Application of Cooperative Transmission to Secrecy Communications , 2012, IEEE Journal on Selected Areas in Communications.

[31]  Nuwan S. Ferdinand,et al.  Effects of Outdated CSI on the Secrecy Performance of MISO Wiretap Channels with Transmit Antenna Selection , 2013, IEEE Communications Letters.

[32]  Xiaojun Yuan,et al.  Hermitian Precoding for Distributed MIMO Systems with Individual Channel State Information , 2013, IEEE Journal on Selected Areas in Communications.

[33]  A. Lee Swindlehurst,et al.  Cooperative Jamming for Secure Communications in MIMO Relay Networks , 2011, IEEE Transactions on Signal Processing.

[34]  J. Galambos Review: M. R. Leadbetter, Georg Lindgren and Holger Rootzen, Extremes and related properties of random sequences and processes , 1985 .

[35]  Huiming Wang,et al.  Distributed Beamforming for Physical-Layer Security of Two-Way Relay Networks , 2012, IEEE Transactions on Signal Processing.

[36]  Ozgur Oyman Opportunistic scheduling and spectrum reuse in relay-based cellular networks , 2010, IEEE Transactions on Wireless Communications.

[37]  Qiang Li,et al.  Optimal joint cooperative beamforming and artificial noise design for secrecy rate maximization in AF relay networks , 2013, 2013 IEEE 14th Workshop on Signal Processing Advances in Wireless Communications (SPAWC).

[38]  Mohamed-Slim Alouini,et al.  Order Statistics in Wireless Communications: References , 2011 .

[39]  Kin K. Leung,et al.  Opportunistic Relaying for Secrecy Communications: Cooperative Jamming vs. Relay Chatting , 2011, IEEE Transactions on Wireless Communications.

[40]  Kin K. Leung,et al.  Artificial Noise Generation from Cooperative Relays for Everlasting Secrecy in Two-Hop Wireless Networks , 2011, IEEE Journal on Selected Areas in Communications.

[41]  John S. Thompson,et al.  Relay selection for secure cooperative networks with jamming , 2009, IEEE Transactions on Wireless Communications.

[42]  Xuemin Shen,et al.  Cooperative Spectrum Access Towards Secure Information Transfer for CRNs , 2013, IEEE Journal on Selected Areas in Communications.

[43]  Sennur Ulukus,et al.  Achievable Rates in Gaussian MISO Channels with Secrecy Constraints , 2007, 2007 IEEE International Symposium on Information Theory.

[44]  M. R. Leadbetter,et al.  Extremes and Related Properties of Random Sequences and Processes: Springer Series in Statistics , 1983 .

[45]  Mohamed-Slim Alouini,et al.  On the Jamming Power Allocation for Secure Amplify-and-Forward Relaying via Cooperative Jamming , 2013, IEEE Journal on Selected Areas in Communications.

[46]  Zhu Han,et al.  Joint Relay and Jammer Selection for Secure Two-Way Relay Networks , 2012, IEEE Trans. Inf. Forensics Secur..

[47]  Matthew R. McKay,et al.  Secure Transmission With Artificial Noise Over Fading Channels: Achievable Rate and Optimal Power Allocation , 2010, IEEE Transactions on Vehicular Technology.

[48]  Huiming Wang,et al.  Joint Cooperative Beamforming and Jamming to Secure AF Relay Systems With Individual Power Constraint and No Eavesdropper's CSI , 2013, IEEE Signal Processing Letters.

[49]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.