© The Institution of Engineering and Technology
In this paper, the authors deal with secure transmission in two-hop amplify-and-forward network with untrusted relays. To prevent the untrusted relays from intercepting the source message and to achieve positive secrecy rate, the destination-based cooperative jamming technique is used. The authors propose joint secure best relay selection (BRS) and optimal power allocation (OPA) for uplink transmission of a cellular network when the base station is equipped with very large-scale antenna arrays. Then, the common performance metrics such as ergodic secrecy rate (ESR) and secrecy outage probability are evaluated for the optimised network. Moreover, the diversity order and diversity-multiplexing tradeoff of the system are examined. The authors obtain that the diversity order of joint BRS and OPA scenario is equal to number of relays. Finally, some numerical and simulation results are presented to validate the theoretical analysis and to show the advantages offered by the presented systems. They reveal interesting results that, by increasing number of untrusted relay nodes, the system performance improves. For example, for target ESR 2 bits/s/Hz and ten untrusted relay nodes, the optimised network saves about 5 dB for uplink transmission, in comparison with the system applying the BRS and equal power allocation.
References
-
-
1)
-
17. Ding, Z., Leung, K.K., Goeckel, D.L., et al: ‘On the application of cooperative transmission to secrecy communictions’, IEEE J. Sel. Areas Commun., 2012, 30, (2), pp. 359–368 (doi: 10.1109/JSAC.2012.120215).
-
2)
-
22. Zhou, N.R., Kang, Z.J., Liang, X.R.: ‘Secure cooperative communication via artificial noise for wireless two-hop relaying networks’, Wirel. Pers. Commun., 2015, 82, (3), pp. 1759–1771 (doi: 10.1007/s11277-015-2311-8).
-
3)
-
37. Khisti, A., Wornell, G.W.: ‘Secure transmission with multiple antennas II: the MIMOME wiretap channel’, IEEE Trans. Inf. Theory, 2010, 56, (11), pp. 5515–5532 (doi: 10.1109/TIT.2010.2068852).
-
4)
-
25. Li, J., Petropulu, A.P., Weber, S.: ‘On cooperative relaying schemes for wireless physical layer security’, IEEE Trans. Signal Process., 2011, 59, (10), pp. 4985–4997 (doi: 10.1109/TSP.2011.2159598).
-
5)
-
12. Zheng, G., Choo, L.-C., Wong, K.-K.: ‘Optimal cooperative jamming to enhance physical layer security using relays’, IEEE Trans. Signal Process., 2011, 59, (3), pp. 1317–1322 (doi: 10.1109/TSP.2010.2092774).
-
6)
-
26. Zheng, T.-X., Wang, H.-M., Liu, F., et al: ‘Outage constrained secrecy throughput maximization for DF relay networks’, IEEE Trans. Commun., 2015, 63, (5), pp. 1741–1755 (doi: 10.1109/TCOMM.2015.2409171).
-
7)
-
2. Leung-Yan-Cheong, S.K., Hellman, M.E.: ‘The Gaussian wire-tap channel’, IEEE Trans. Inf. Theory, 1978, 24, (4), pp. 451–456 (doi: 10.1109/TIT.1978.1055917).
-
8)
-
30. He, X., Yener, A.: ‘Two-hop secure communication using an untrusted relay’, EURASIP J. Wirel. Commun. Netw., 2009, p. 13, .
-
9)
-
18. Jeong, C., Kim, I.-M., Kim, D.I.: ‘Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system’, IEEE Trans. Signal Process., 2012, 60, (1), pp. 310–325 (doi: 10.1109/TSP.2011.2172433).
-
10)
-
18. Wang, L., Elkashlan, M., Huang, J., Tran, N.H., Duong, T.Q.: ‘Secure transmission with optimal power allocation in untrusted relay networks’, IEEE Wirel. Commun. Lett., 2014, 3, (3), pp. 289–292 (doi: 10.1109/WCL.2014.031114.140018).
-
11)
-
17. Huang, J., Mukherjee, A., Swindlehurst, A.L.: ‘Secure communication via an untrusted non-regenerative relay in fading channels’, IEEE Trans. Signal Process., 2013, 61, (10), pp. 2536–2550 (doi: 10.1109/TSP.2013.2247600).
-
12)
-
2. Laneman, J.N., Tse, D.N.C., Wornell, G.W.: ‘Cooperative diversity in wireless networks: Efficient protocols and outage behavior’, IEEE Trans. Inf. Theory, 2004, 50, (12), pp. 3062–3080 (doi: 10.1109/TIT.2004.838089).
-
13)
-
20. Liu, Y., Petropulu, A.P., Poor, H.V.: ‘Joint decode-and-forward and jamming for wireless physical layer security with destination assistance’. Proc. of Asilomar Conf. on Signals, Systems and Computer (ASILOMAR'11), Pacific Grove, USA, November 2011.
-
14)
-
11. Krikidis, I., Thompson, J.S., McLaughlin, S.: ‘Relay selection for secure cooperative networks with jamming’, IEEE Trans. Wirel. Commun., 2009, 8, (10), pp. 5003–5011 (doi: 10.1109/TWC.2009.090323).
-
15)
-
27. Zheng, T., Wang, H.-M., Yin, Q.: ‘On transmission secrecy outage of multi-antenna system with randomly located eavesdroppers’, IEEE Commun. Lett., 2014, 18, (8), pp. 1299–1302 (doi: 10.1109/LCOMM.2014.2332172).
-
16)
-
23. Wang, H.-M., Luo, M., Yin, Q., Xia, X.-G.: ‘Hybrid cooperative beamforming and jamming for physical-layer security of two-way relay networks’, IEEE Trans. Inf. Forensics Sec., 2013, 8, (12), pp. 2007–2020 (doi: 10.1109/TIFS.2013.2287046).
-
17)
-
21. Huang, J., Swindlehurst, A.L.: ‘Cooperative jamming for secure communications in MIMO relay networks’, IEEE J. Sel. Areas Commun., 2011, 59, (10), pp. 4871–4884.
-
18)
-
36. Khisti, A., Wornell, G.W.: ‘Secure transmission with multiple antennas I: the MISOME wiretap channel’, IEEE Trans. Inf. Theory, 2010, 56, (7), pp. 3088–3104 (doi: 10.1109/TIT.2010.2048445).
-
19)
-
13. Dong, L., Han, Z., Petropulu, A.P., Poor, H.V.: ‘Improving wireless physical layer security via cooperating relays’, IEEE Trans. Signal Process., 2010, 58, (3), pp. 1875–1888 (doi: 10.1109/TSP.2009.2038412).
-
20)
-
14. Wang, H.-M., Yin, Q., Xia, X.-G.: ‘Distributed beamforming for physical-layer security of two-way relay networks’, IEEE Trans. Signal Process., 2012, 60, (7), pp. 3532–3545 (doi: 10.1109/TSP.2012.2191543).
-
21)
-
2. Zhao, D., Peng, H., Li, L., et al: ‘A secure and effective anonymous authentication scheme for roaming service in global mobility networks’, Wirel. Pers. Commun., 2015, 78, (1), pp. 247–269 (doi: 10.1007/s11277-014-1750-y).
-
22)
-
33. Huang, J., Mukherjee, A., Swindlehurst, A.L.: ‘Secrecy analysis of unauthenticated amplify-and-forward relaying with antenna selection’. Proc. of 2012 IEEE Acoustics, Speech and Signal Processing, pp. 2481–2484.
-
23)
-
4. Ngo, H.Q., Larsson, D., Marzetta, T.: ‘Energy and spectral efficiency of very large multiuser MIMO systems’, IEEE Trans. Commun., 2013, 61, (4), pp. 1436–1449 (doi: 10.1109/TCOMM.2013.020413.110848).
-
24)
-
16. Yang, B., Wang, W., Yao, B., et al: ‘Destination assisted secret wireless communication with cooperative helpers’, IEEE Signal Process. Lett., 2013, 20, (11), pp. 1032–1035 (doi: 10.1109/LSP.2013.2278835).
-
25)
-
13. Moharrer, H., Olfat, A.: ‘Joint relay selection and cooperative beamforming in two-hop multi-relay decode-and-forward networks’, IET Commun., 2014, 8, (18), pp. 3245–3253 (doi: 10.1049/iet-com.2014.0408).
-
26)
-
1. Wyner, A.D.: ‘The wire-tap channel’, Bell Syst. Tech. J., 1975, 54, (8), pp. 1355–1387 (doi: 10.1002/j.1538-7305.1975.tb02040.x).
-
27)
-
39. |Goel, S., Negi, R.: ‘Guaranteeing secrecy using artificial noise’, IEEE Trans. Wirel. Commun., 2008, 7, (6), pp. 2180–2189 (doi: 10.1109/TWC.2008.060848).
-
28)
-
41. Gradshteyn, I.S., Ryzhik, I.M.: ‘Table of integrals, series, and products’ (Academic, New York, 2007, 7th edn.).
-
29)
-
24. He, X., Yener, A.: ‘Cooperation with an untrusted relay: a secrecy perspective’, IEEE Trans. Inf. Theory, 2010, 56, (8), pp. 3807–3827 (doi: 10.1109/TIT.2010.2050958).
-
30)
-
25. Bletsas, A., Shin, H., Win, M.Z.: ‘Cooperative communications with outage-optimal opportunistic relaying’, IEEE Trans. Wirel. Commun., 2007, 6, (9), pp. 3450–3460 (doi: 10.1109/TWC.2007.06020050).
-
31)
-
1. Anghel, P., Kaveh, M.: ‘Exact symbol error probability of a cooperative network in a Rayleigh-fading environment’, IEEE Trans. Wirel. Commun., 2004, 3, (5), pp. 1416–1421 (doi: 10.1109/TWC.2004.833431).
-
32)
-
5. Zheng, L., Tse, D.N.: ‘Diversity and multiplexing: a fundamental tradeoff in multiple-antenna channels’, IEEE Trans. Inf. Theory, 2003, 49, (5), pp. 1073–1096 (doi: 10.1109/TIT.2003.810646).
-
33)
-
36. Sun, L., Ren, P., Du, Q., et al: ‘Security-aware relaying scheme for cooperative networks with untrusted relay nodes’, IEEE Commun. Lett., 2014, 19, (3), pp. 463–466 (doi: 10.1109/LCOMM.2014.2385095).
-
34)
-
1. Mukherjee, A., Fakoorian, S.A.A., Huang, J., et al: ‘Principles of physical layer security in multiuser wireless networks: a survey’, IEEE Commun. Surv. Tutor., 2014, 16, (3), pp. 1550–1573, (doi: 10.1109/SURV.2014.012314.00178).
-
35)
-
16. Sun, L., Zhang, T., Li, Y., Niu, H.: ‘Performance study of two-hop amplify-and-forward systems with untrustworthy relay nodes’, IEEE Trans. Veh. Technol., 2012, 61, (8), pp. 3801–3807 (doi: 10.1109/TVT.2012.2207438).
-
36)
-
25. Wang, H.-M., Liu, F., Xia, X.-G.: ‘Joint source-relay precoding and power allocation for secure amplify-and-forward MIMO relay networks’, IEEE Trans. Inf. Forensics Sec., 2014, 9, (8), pp. 1240–1250 (doi: 10.1109/TIFS.2014.2327480).
-
37)
-
32. Huang, J., Mukherjee, A., Swindlehurst, A.L.: ‘Outage performance for amplify-and-forward channels with an unauthenticated relay’. Proc. of 2012 IEEE Int. Communication Conf., pp. 893–897.
-
38)
-
29. He, X., Yener, A.: ‘Two-hop secure communication using an untrusted relay: a case for cooperative jamming’. Proc. of IEEE Globecom, New Orleans, LA, December 2008, pp. 1–5.
-
39)
-
19. Zhou, N.R., Chen, X., Li, C.S., Xue, Z.: ‘Secrecy rate of two-hop AF relaying networks with an untrusted relay’, Wirel. Pers. Commun., 2014, 75, (1), pp. 119–129 (doi: 10.1007/s11277-013-1351-1).
-
40)
-
24. Wang, C., Wang, H.-M., Xia, X.-G.: ‘Hybrid opportunistic relaying and jamming with power allocation for secure cooperative networks’, IEEE Trans. Wirel. Commun., 2015, 14, (2), pp. 589–605 (doi: 10.1109/TWC.2014.2354635).
-
41)
-
7. Oggier, F., Hassibi, B.: ‘The secrecy capacity of the MIMO wiretap channel’, IEEE Trans. Inf. Theory, 2011, 57, (8), pp. 4961–4972 (doi: 10.1109/TIT.2011.2158487).
-
42)
-
16. Liu, T., Shamai (Shitz), S.: ‘A note on the secrecy capacity of the multiple-antenna wiretap channel’, IEEE Trans. Inf. Theory, 2009, 55, (6), pp. 2547–2553 (doi: 10.1109/TIT.2009.2018322).
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-net.2015.0035
Related content
content/journals/10.1049/iet-net.2015.0035
pub_keyword,iet_inspecKeyword,pub_concept
6
6