Maximized secrecy rate based power allocation for wireless cooperative network with control jamming

In this paper, we propose efficient power allocation techniques using both convex optimization (using Lagrange multiplier method) and a soft evolutionary approach (using Differential Evolution (DE) algorithm) to optimize both the relay and jammer powers in addition to an increase in the system performance in terms of secrecy rate. Here, we consider a cooperative wireless network with control jamming comprising of a source-destination pair with a set of relay nodes in the presence of single and multiple eavesdroppers. Optimal relay node is selected based on the SNR received at each relay, which transmits the data to the destination using decode and forward strategy. Amongst the remaining nodes, selection of jammer is done based on the SNR value of the relay to eavesdropper link. The proposed power allocation schemes are compared with equal power allocation policy for using the Monte-Carlo simulation study and these schemes are found to be superior in terms of average secrecy rate.

[1]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[2]  John S. Thompson,et al.  Relay selection for secure cooperative networks with jamming , 2009, IEEE Transactions on Wireless Communications.

[3]  Zhu Han,et al.  Secure wireless communications via cooperation , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.

[4]  Kai-Kit Wong,et al.  Optimal Cooperative Jamming to Enhance Physical Layer Security Using Relays , 2011, IEEE Transactions on Signal Processing.

[5]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[6]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[7]  Lie-Liang Yang,et al.  Security-oriented cooperation scheme in wireless cooperative networks , 2014, IET Commun..

[8]  Hesham El Gamal,et al.  The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.

[9]  Yu Cheng,et al.  Joint cooperative relaying and jamming for maximum secrecy capacity in wireless networks , 2014, 2014 IEEE International Conference on Communications (ICC).

[10]  Jing Huang,et al.  Secure Transmission with Optimal Power Allocation in Untrusted Relay Networks , 2014, IEEE Wireless Communications Letters.

[11]  Rainer Storn,et al.  Differential Evolution – A Simple and Efficient Heuristic for global Optimization over Continuous Spaces , 1997, J. Glob. Optim..

[12]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[13]  Emad S. Hassan,et al.  A New Relay and Jammer Selection Schemes for Secure One-Way Cooperative Networks , 2014, Wirel. Pers. Commun..

[14]  Hamid Jafarkhani,et al.  Cooperative Jamming and Power Allocation for Wireless Relay Networks in Presence of Eavesdropper , 2011, 2011 IEEE International Conference on Communications (ICC).