Secrecy capacity maximization for secure cooperative ad-hoc networks

This paper investigates secure cooperative communication with the involvement of multiple malicious eavesdroppers. By characterizing the security performance of the system by secrecy capacity, we study the secrecy capacity maximization problem in cooperative communication aware ad hoc networks. Specifically, we propose a system model where secrecy capacity enhancement is achieved by the assignment of cooperative relays. We theoretically present a corresponding formulation for the problem and discuss the security gain brought by the relay assignment process. Then, we develop an optimal relay assignment algorithm to solve the secrecy capacity maximization problem in polynomial time. The basic idea behind our proposed algorithm is to boost the capacity of the primary channel by simultaneously decreasing the capacity of the eavesdropping channel. To further increase the system secrecy capacity, we exploit the jamming technique and propose a smart jamming algorithm to interfere the eavesdropping channels. Analysis and experimental results reveal that our proposed algorithms significantly increase the system secrecy capacity under various network settings.

[1]  Bohn Stafleu van Loghum,et al.  Online … , 2002, LOG IN.

[2]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[3]  Wade Trappe,et al.  Network-aware security for group communications , 2007 .

[4]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[5]  Jian Wang,et al.  Analyzing Amplify-and-Forward and Decode-and-Forward Cooperative Strategies in Wyner's Channel Model , 2009, 2009 IEEE Wireless Communications and Networking Conference.

[6]  Xinbing Wang,et al.  Impact of secrecy on capacity in large-scale wireless networks , 2012, 2012 Proceedings IEEE INFOCOM.

[7]  Hai Su,et al.  Fast and scalable secret key generation exploiting channel phase randomness in wireless networks , 2011, 2011 Proceedings IEEE INFOCOM.

[8]  Miguel R. D. Rodrigues,et al.  Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.

[9]  Yingbin Liang,et al.  Wireless broadcast networks: Reliability, security, and stability , 2008, 2008 Information Theory and Applications Workshop.

[10]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[11]  Gregory W. Wornell,et al.  Cooperative diversity in wireless networks: Efficient protocols and outage behavior , 2004, IEEE Transactions on Information Theory.

[12]  Georgios B. Giannakis,et al.  Mutual Information Jammer-Relay Games , 2008, IEEE Trans. Inf. Forensics Secur..

[13]  D. West Introduction to Graph Theory , 1995 .

[14]  Hui Liu,et al.  OFDM-Based Broadband Wireless Networks – Design and Optimization , 2005 .

[15]  Hai Su,et al.  Secret key generation exploiting channel characteristics in wireless communications , 2011, IEEE Wireless Communications.

[16]  Xi Fang,et al.  HERA: An Optimal Relay Assignment Scheme for Cooperative Networks , 2012, IEEE Journal on Selected Areas in Communications.

[17]  Hesham El Gamal,et al.  The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.

[18]  Jie Li,et al.  Optimal relay assignment for secrecy capacity maximization in cooperative ad-hoc networks , 2013, 2013 IEEE International Conference on Communications (ICC).

[19]  Yiwei Thomas Hou,et al.  An Optimal Algorithm for Relay Node Assignment in Cooperative Ad Hoc Networks , 2011, IEEE/ACM Transactions on Networking.

[20]  Hyundong Shin,et al.  Cooperative Communications with Outage-Optimal Opportunistic Relaying , 2007, IEEE Transactions on Wireless Communications.

[21]  Jiannong Cao,et al.  Self-Supported Cooperative Networking for Emergency Services in Multi-Hop Wireless Networks , 2012, IEEE Journal on Selected Areas in Communications.

[22]  John S. Thompson,et al.  Relay selection for secure cooperative networks with jamming , 2009, IEEE Transactions on Wireless Communications.

[23]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[24]  Zhu Han,et al.  Joint Relay and Jammer Selection for Secure Two-Way Relay Networks , 2012, IEEE Trans. Inf. Forensics Secur..

[25]  Raviraj S. Adve,et al.  Improving amplify-and-forward relay networks: optimal power allocation versus selection , 2006, IEEE Transactions on Wireless Communications.