Unequal Secrecy Protection for Untrusted Two-Way Relaying Systems: Constellation Overlapping and Noise Aggregation

This paper studies the secure information exchange of two-way relaying systems, where two terminal users communicate bi-directionally with the assistance of an untrusted relay. Each user is assumed to have two messages with distinct priorities: high priority and low priority. The high-priority messages (HPM) are first transmitted, for which we propose a constellation overlapping scheme such that the received signals at the relay overlap with each other and a high error floor is created to prevent the untrusted relay from deciphering the information. Upon the completion of HPM exchange, each user sends its low-priority message (LPM) by superposing it onto the previously decoded HPM from the other user. By exploiting the difference between the error patterns for HPM at the terminal users and the relay, channel noises in various time slots can be aggregated at the relay to secure the LPM transmission. The symbol error probability (SEP) at the terminal users as well as the untrusted relay is analyzed, from which it is shown that HPM is guaranteed to have greater reliability and higher secrecy level than that of LPM. However, the transmission of LPM enjoys lower implementation complexity and reduced system overhead, which fully demonstrates that the message-prioritization-based unequal secrecy protection framework can realize a good performance-complexity tradeoff. Simulation results exhibit the superiority of the proposed design compared to the existing competing solutions.

[1]  Daniel Benevides da Costa,et al.  Distributed Role Selection With ANC and TDBC Protocols in Two-Way Relaying Systems , 2015, IEEE Transactions on Communications.

[2]  Marco Chiani,et al.  New exponential bounds and approximations for the computation of error probability in fading channels , 2003, IEEE Trans. Wirel. Commun..

[3]  George K. Karagiannidis,et al.  Secure Multiple Amplify-and-Forward Relaying With Cochannel Interference , 2016, IEEE Journal of Selected Topics in Signal Processing.

[4]  Liu,et al.  Enhancing the Physical Layer Security of Non-Orthogonal Multiple Access in Large-Scale Networks , 2016, IEEE Transactions on Wireless Communications.

[5]  Ming Xiao,et al.  Full-Duplex Two-Way and One-Way Relaying: Average Rate, Outage Probability, and Tradeoffs , 2016, IEEE Transactions on Wireless Communications.

[6]  Kai-Kit Wong,et al.  Secure Two-Way Transmission via Wireless-Powered Untrusted Relay and External Jammer , 2017, IEEE Transactions on Vehicular Technology.

[7]  George K. Karagiannidis,et al.  Secrecy Cooperative Networks With Outdated Relay Selection Over Correlated Fading Channels , 2017, IEEE Transactions on Vehicular Technology.

[8]  Lajos Hanzo,et al.  A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.

[9]  Walid Saad,et al.  On the Physical Layer Security of Backscatter Wireless Systems , 2014, IEEE Transactions on Wireless Communications.

[10]  Li Sun,et al.  Securing Two-Way Cooperative Systems With an Untrusted Relay: A Constellation-Rotation Aided Approach , 2015, IEEE Communications Letters.

[11]  Theodoros A. Tsiftsis,et al.  Joint Beamforming Alignment With Suboptimal Power Allocation for a Two-Way Untrusted Relay Network , 2018, IEEE Transactions on Information Forensics and Security.

[12]  Yichen Wang,et al.  Cooperative Privacy Preserving Scheme for Downlink Transmission in Multiuser Relay Networks , 2017, IEEE Transactions on Information Forensics and Security.

[13]  Kamel Tourki,et al.  Adaptive Secure Transmission for RF-EH Untrusted Relaying with Alien Eavesdropping , 2017, IEEE Communications Letters.

[14]  Chengwen Xing,et al.  Millimeter-Wave Secrecy Beamforming Designs for Two-Way Amplify-and-Forward MIMO Relaying Networks , 2017, IEEE Transactions on Vehicular Technology.

[15]  Zesong Fei,et al.  Optimal Transmit Beamforming for Secure SWIPT in a Two-Tier HetNet , 2017, IEEE Communications Letters.

[16]  Yun Hee Kim,et al.  Outage-Optimal Power and Time Allocation for Rate-Aware Two-Way Relaying With a Decode-and-Forward Protocol , 2016, IEEE Transactions on Vehicular Technology.

[17]  Wei Xiang,et al.  Precoding and Cooperative Jamming in Multi- Antenna Two-Way Relaying Wiretap Systems Without Eavesdropper’s Channel State Information , 2017, IEEE Transactions on Information Forensics and Security.

[18]  K. J. Ray Liu,et al.  Two-Way Network-Coded Relaying With Delay Constraint , 2015, IEEE Transactions on Wireless Communications.

[19]  Quanzhong Li,et al.  Artificial Noise Aided Secure Precoding for MIMO Untrusted Two-Way Relay Systems With Perfect and Imperfect Channel State Information , 2018, IEEE Transactions on Information Forensics and Security.

[20]  Zhiguo Ding,et al.  Hybrid Spatio-Temporal Artificial Noise Design for Secure MIMOME-OFDM Systems , 2017, IEEE Transactions on Vehicular Technology.

[21]  Ender Tekin,et al.  The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.

[22]  Li Sun,et al.  Security enhancement for video transmission via noise aggregation in immersive systems , 2015, Multimedia Tools and Applications.

[23]  H. Vincent Poor,et al.  Near-Optimal Modulo-and-Forward Scheme for the Untrusted Relay Channel , 2016, IEEE Transactions on Information Theory.

[24]  Li Sun,et al.  Two Birds With One Stone: Towards Secure and Interference-Free D2D Transmissions via Constellation Rotation , 2016, IEEE Transactions on Vehicular Technology.

[25]  Ahmad Abu Al Haija,et al.  Message Priority in Two-Way Decode-Forward Relaying , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).

[26]  A. Lee Swindlehurst,et al.  Secure Communication Via an Untrusted Non-Regenerative Relay in Fading Channels , 2013, IEEE Transactions on Signal Processing.

[27]  A. Lee Swindlehurst,et al.  Joint transmit design and node selection for one-way and two-way untrusted relay channels , 2013, 2013 Asilomar Conference on Signals, Systems and Computers.

[28]  Zhu Han,et al.  Physical Layer Security for Two-Way Untrusted Relaying With Friendly Jammers , 2012, IEEE Transactions on Vehicular Technology.

[29]  Tobias J. Oechtering,et al.  Polar Coding for Bidirectional Broadcast Channels with Common and Confidential Messages , 2013, IEEE Journal on Selected Areas in Communications.

[30]  Zhu Han,et al.  Joint Relay and Jammer Selection for Secure Two-Way Relay Networks , 2012, IEEE Trans. Inf. Forensics Secur..

[31]  Xiaofeng Tao,et al.  Secure Transmission in SWIPT-Powered Two-Way Untrusted Relay Networks , 2018, IEEE Access.

[32]  Meixia Tao,et al.  Secure Beamforming for MIMO Two-Way Communications With an Untrusted Relay , 2013, IEEE Transactions on Signal Processing.

[33]  Fan Li,et al.  Message-Prioritization Based Unequal Secrecy Protection for Untrusted Two-Way Relaying Networks , 2018, 2018 IEEE International Conference on Communications (ICC).

[34]  Pramod K. Varshney,et al.  Resource Allocation and Outage Analysis for an Adaptive Cognitive Two-Way Relay Network , 2015, IEEE Transactions on Wireless Communications.

[35]  Ruonan Zhang,et al.  Cross-Polarized Three-Dimensional Channel Measurement and Modeling for Small-Cell Street Canyon Scenario , 2018, IEEE Transactions on Vehicular Technology.

[36]  Daniel Benevides da Costa,et al.  Beamforming in Traffic-Aware Two-Way Relay Systems With Channel Estimation Error and Feedback Delay , 2017, IEEE Transactions on Vehicular Technology.

[37]  Xiaomei Zhang,et al.  Connecting a City by Wireless Backhaul: 3D Spatial Channel Characterization and Modeling Perspectives , 2017, IEEE Communications Magazine.

[38]  Aylin Yener,et al.  Cooperation With an Untrusted Relay: A Secrecy Perspective , 2009, IEEE Transactions on Information Theory.

[39]  Jing Huang,et al.  Secure Transmission with Optimal Power Allocation in Untrusted Relay Networks , 2014, IEEE Wireless Communications Letters.

[40]  Mustafa Cenk Gursoy Secure Communication in the Low-SNR Regime , 2012, IEEE Transactions on Communications.

[41]  Armin Wittneben,et al.  Spectral efficient protocols for half-duplex fading relay channels , 2007, IEEE Journal on Selected Areas in Communications.

[42]  Yan Zhang,et al.  Secure Transmission for Heterogeneous Cellular Networks With Wireless Information and Power Transfer , 2018, IEEE Systems Journal.