QoS-Aware EnhancedSecurity EnhancedSecurity EnhancedSecurity for TDMA Transmissions from Buffered Source Nodes

This paper proposes a cross-layer design to secure a set of buffered legitimate source nodes wishing to communic ate with a common destination node using a time-division multipleaccess scheme. The users’ assignment probabilities to the t ime slots are optimized to satisfy a certain quality-of-service (QoS) requirement for all the legitimate source nodes. To further improve the system security, we propose beamforming-based cooperative jamming schemes subject to the availability ofthe channel state information (CSI) at the legitimate nodes. Wederive closed-form expressions for the instantaneous secrecy rat e for each scheme as well as the secrecy outage probability. Moreo ver, we derive the secrecy stable-throughput and delay-require ment regions. In our proposed scheme, if a node is not selected for data transmission, it is a cooperative jamming node. We impose an average transmit power constraint on each source node. We investigate the cases where a global CSI is assumed at the legitimate nodes and where there is no eavesdropper’s CSI. The case where there is no CSI at the jamming nodes is also investigated and a new scheme is proposed. Our proposed jamming schemes achieve significant increases in the secure throughput over existing schemes from the literature and over the no-jamming scheme.

[1]  Ender Tekin,et al.  The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.

[2]  Trung Quang Duong,et al.  Optimal Transmission With Artificial Noise in MISOME Wiretap Channels , 2016, IEEE Transactions on Vehicular Technology.

[3]  Umberto Spagnolini,et al.  Stable Throughput of Cognitive Radios With and Without Relaying Capability , 2007, IEEE Transactions on Communications.

[4]  Xiangyun Zhou,et al.  Secure On-Off Transmission Design With Channel Estimation Errors , 2013, IEEE Transactions on Information Forensics and Security.

[5]  Derrick Wing Kwan Ng,et al.  Robust Beamforming for Secure Communication in Systems With Wireless Information and Power Transfer , 2013, IEEE Transactions on Wireless Communications.

[6]  John S. Thompson,et al.  Amplify-and-forward with partial relay selection , 2008, IEEE Communications Letters.

[7]  Yueming Cai,et al.  A New Secure Transmission Scheme With Outdated Antenna Selection , 2015, IEEE Transactions on Information Forensics and Security.

[8]  Trung Quang Duong,et al.  QoS-Based Design for Security Enhancement in TDMA-Based Wireless Networks , 2016, 2016 IEEE Globecom Workshops (GC Wkshps).

[9]  K. J. Ray Liu,et al.  Opportunistic Multiple Access for Cognitive Radio Networks , 2011, IEEE Journal on Selected Areas in Communications.

[10]  Naofal Al-Dhahir,et al.  Security of Rechargeable Energy-Harvesting Transmitters in Wireless Networks , 2016, IEEE Wireless Communications Letters.

[11]  Carl D. Meyer,et al.  Matrix Analysis and Applied Linear Algebra , 2000 .

[12]  Matthew R. McKay,et al.  Artificial-Noise-Aided Secure Multi-Antenna Transmission With Limited Feedback , 2015, IEEE Transactions on Wireless Communications.

[13]  JAMAL N. AL-KARAKI,et al.  Routing techniques in wireless sensor networks: a survey , 2004, IEEE Wireless Communications.

[14]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[15]  Jinhong Yuan,et al.  Artificial Noise: Transmission Optimization in , 2015 .

[16]  John S. Thompson,et al.  Relay selection for secure cooperative networks with jamming , 2009, IEEE Transactions on Wireless Communications.

[17]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[18]  Lifeng Wang,et al.  Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.

[19]  Huiming Wang,et al.  Uncoordinated Jammer Selection for Securing SIMOME Wiretap Channels: A Stochastic Geometry Approach , 2015, IEEE Transactions on Wireless Communications.

[20]  Xiangyun Zhou,et al.  Secure Transmission Design for Cognitive Radio Networks With Poisson Distributed Eavesdroppers , 2016, IEEE Transactions on Information Forensics and Security.

[21]  Xiangyun Zhou,et al.  On–Off-Based Secure Transmission Design With Outdated Channel State Information , 2016, IEEE Transactions on Vehicular Technology.

[22]  A. Lee Swindlehurst,et al.  Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.

[23]  K. J. Ray Liu,et al.  Cognitive multiple access via cooperation: Protocol design and performance analysis , 2007, IEEE Transactions on Information Theory.

[24]  Daniel Benevides da Costa,et al.  Performance Analysis of Relay Selection Techniques With Clustered Fixed-Gain Relays , 2010, IEEE Signal Processing Letters.

[25]  Zhigang Cao,et al.  Cooperative Beamforming for Cognitive Radio Networks: A Cross-Layer Design , 2012, IEEE Transactions on Communications.

[26]  Zhu Han,et al.  Cooperative jamming for wireless physical layer security , 2009, 2009 IEEE/SP 15th Workshop on Statistical Signal Processing.

[27]  I. S. Gradshteyn,et al.  Table of Integrals, Series, and Products , 1976 .

[28]  Jinhong Yuan,et al.  Optimization of Code Rates in SISOME Wiretap Channels , 2015, IEEE Transactions on Wireless Communications.

[29]  Rodney A. Kennedy,et al.  Cooperative jamming for secrecy in decentralized wireless networks , 2012, 2012 IEEE International Conference on Communications (ICC).

[30]  Hui-Ming Wang,et al.  Secrecy-throughput-optimal artificial noise design against randomly located eavesdroppers , 2016, 2016 International Conference on Computing, Networking and Communications (ICNC).

[31]  R. M. Loynes,et al.  The stability of a queue with non-independent inter-arrival and service times , 1962, Mathematical Proceedings of the Cambridge Philosophical Society.

[32]  Matthew R. McKay,et al.  Secure Transmission With Artificial Noise Over Fading Channels: Achievable Rate and Optimal Power Allocation , 2010, IEEE Transactions on Vehicular Technology.

[33]  Huiming Wang,et al.  Joint Cooperative Beamforming and Jamming to Secure AF Relay Systems With Individual Power Constraint and No Eavesdropper's CSI , 2013, IEEE Signal Processing Letters.