access icon free Joint optimal power allocation and relay selection to establish secure transmission in uplink transmission of untrusted relays network

In this paper, the authors deal with secure transmission in two-hop amplify-and-forward network with untrusted relays. To prevent the untrusted relays from intercepting the source message and to achieve positive secrecy rate, the destination-based cooperative jamming technique is used. The authors propose joint secure best relay selection (BRS) and optimal power allocation (OPA) for uplink transmission of a cellular network when the base station is equipped with very large-scale antenna arrays. Then, the common performance metrics such as ergodic secrecy rate (ESR) and secrecy outage probability are evaluated for the optimised network. Moreover, the diversity order and diversity-multiplexing tradeoff of the system are examined. The authors obtain that the diversity order of joint BRS and OPA scenario is equal to number of relays. Finally, some numerical and simulation results are presented to validate the theoretical analysis and to show the advantages offered by the presented systems. They reveal interesting results that, by increasing number of untrusted relay nodes, the system performance improves. For example, for target ESR 2 bits/s/Hz and ten untrusted relay nodes, the optimised network saves about 5 dB for uplink transmission, in comparison with the system applying the BRS and equal power allocation.

Inspec keywords: jamming; relay networks (telecommunication); antenna arrays; probability; amplify and forward communication; resource allocation; telecommunication security; diversity reception; cellular radio

Other keywords: uplink transmission; very large-scale antenna arrays; diversity-multiplexing tradeoff; diversity order; secure transmission; untrusted relay nodes; destination-based cooperative jamming; two-hop amplify and forward network; untrusted relays network; joint optimal power allocation; ergodic secrecy rate; optimised network; cellular network; secrecy outage probability; joint secure best relay selection; source message

Subjects: Mobile radio systems; Electromagnetic compatibility and interference; Antenna arrays; Other topics in statistics

References

    1. 1)
    2. 2)
    3. 3)
    4. 4)
    5. 5)
    6. 6)
    7. 7)
    8. 8)
      • 30. He, X., Yener, A.: ‘Two-hop secure communication using an untrusted relay’, EURASIP J. Wirel. Commun. Netw., 2009, p. 13, Article ID 305146, doi: 10.1155/2009/305146.
    9. 9)
    10. 10)
    11. 11)
    12. 12)
    13. 13)
      • 20. Liu, Y., Petropulu, A.P., Poor, H.V.: ‘Joint decode-and-forward and jamming for wireless physical layer security with destination assistance’. Proc. of Asilomar Conf. on Signals, Systems and Computer (ASILOMAR'11), Pacific Grove, USA, November 2011.
    14. 14)
    15. 15)
    16. 16)
    17. 17)
      • 21. Huang, J., Swindlehurst, A.L.: ‘Cooperative jamming for secure communications in MIMO relay networks’, IEEE J. Sel. Areas Commun., 2011, 59, (10), pp. 48714884.
    18. 18)
    19. 19)
    20. 20)
    21. 21)
    22. 22)
      • 33. Huang, J., Mukherjee, A., Swindlehurst, A.L.: ‘Secrecy analysis of unauthenticated amplify-and-forward relaying with antenna selection’. Proc. of 2012 IEEE Acoustics, Speech and Signal Processing, pp. 24812484.
    23. 23)
    24. 24)
    25. 25)
    26. 26)
    27. 27)
    28. 28)
      • 41. Gradshteyn, I.S., Ryzhik, I.M.: ‘Table of integrals, series, and products’ (Academic, New York, 2007, 7th edn.).
    29. 29)
    30. 30)
    31. 31)
    32. 32)
    33. 33)
    34. 34)
    35. 35)
    36. 36)
    37. 37)
      • 32. Huang, J., Mukherjee, A., Swindlehurst, A.L.: ‘Outage performance for amplify-and-forward channels with an unauthenticated relay’. Proc. of 2012 IEEE Int. Communication Conf., pp. 893897.
    38. 38)
      • 29. He, X., Yener, A.: ‘Two-hop secure communication using an untrusted relay: a case for cooperative jamming’. Proc. of IEEE Globecom, New Orleans, LA, December 2008, pp. 15.
    39. 39)
    40. 40)
    41. 41)
    42. 42)
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-net.2015.0035
Loading

Related content

content/journals/10.1049/iet-net.2015.0035
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading