Improving physical layer security in DF relay networks via two-stage cooperative jamming

The design of a cooperative protocol relying on both cooperative relaying and jamming in order to provide security at the physical layer of wireless communications is considered in this paper. We suppose that pair of nodes is assisted by a number of helpers in their communication, which either relay information or cause harmful interference to an eavesdropper, at both stages of the relaying protocol. Instead of maximizing the secrecy capacity, a signal-to-noise ratio based approach is taken. Solutions for the optimal weights used at each protocol and stage are sought along with the optimal power distribution. To solve this problem, tools from semi-definite and geometric programming are utilized, and an iterative algorithm is proposed. Simulations show noticeable gains (up to 50dB) compared to the non-cooperative case.

[1]  Raef Bassily,et al.  Cooperative Security at the Physical Layer: A Summary of Recent Advances , 2013, IEEE Signal Processing Magazine.

[2]  Qi Zhang,et al.  A Special Class of Fractional QCQP and Its Applications on Cognitive Collaborative Beamforming , 2014, IEEE Transactions on Signal Processing.

[3]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[4]  Hamid Jafarkhani,et al.  Cooperative Jamming and Power Allocation for Wireless Relay Networks in Presence of Eavesdropper , 2011, 2011 IEEE International Conference on Communications (ICC).

[5]  A. Lee Swindlehurst,et al.  Secure Communications via Cooperative Jamming in Two-Hop Relay Systems , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[6]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[7]  Guanghan Xu,et al.  Low complexity power allocation and joint relay-jammer selection in cooperative jamming DF relay wireless secure networks , 2013, 2013 International Conference on Anti-Counterfeiting, Security and Identification (ASID).

[8]  Hui Zhao,et al.  Joint power allocation and relay selection for decode-and-forward cooperative relay in secure communication , 2013 .

[9]  A. Lee Swindlehurst,et al.  Cooperative Jamming for Secure Communications in MIMO Relay Networks , 2011, IEEE Transactions on Signal Processing.

[10]  Alexandros Katsiotis,et al.  Cooperation for secure wireless communications with resource-bounded eavesdroppers , 2014, 2014 IEEE Globecom Workshops (GC Wkshps).

[11]  Zhi-Quan Luo,et al.  Semidefinite Relaxation of Quadratic Optimization Problems , 2010, IEEE Signal Processing Magazine.

[12]  Tan Jianjun,et al.  Decode-and-forward plus cooperative jamming based cooperation for wireless physical layer security , 2013, CloudCom 2013.

[13]  Daniel Pérez Palomar,et al.  Power Control By Geometric Programming , 2007, IEEE Transactions on Wireless Communications.

[14]  Abbas Jamalipour,et al.  Wireless communications , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..

[15]  Steven P. Weber,et al.  On Cooperative Relaying Schemes for Wireless Physical Layer Security , 2010, IEEE Transactions on Signal Processing.

[16]  Yueming Cai,et al.  Increasing secrecy capacity via joint design of cooperative beamforming and jamming , 2011, 2011 IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications.

[17]  Cai Liu,et al.  Joint Decode-and-Forward and Cooperative Jamming for Secure Wireless Communications , 2011, 2011 7th International Conference on Wireless Communications, Networking and Mobile Computing.

[18]  Jianhui Wu,et al.  Secure wireless communications via cooperative relaying and jamming , 2011, 2011 IEEE GLOBECOM Workshops (GC Wkshps).