© The Institution of Engineering and Technology
The authors investigate secure resource allocation for an orthogonal frequency division multiple access two-way relay network, which has several pairs of mobile users (MUs) and one energy harvesting (EH) relay. In this network, the relay is untrusted and each MU pair may also overhear the other MU pairs’ confidential information. In particular, to forward information for each MU, the relay adopts power splitting technique to harvest energy from radio frequency signals emitted by each MU. For this scenario, which has hardly been considered, the joint problem of subcarrier allocation, power control, and power splitting ratio selection is formulated, with the aim to maximise the total secrecy rate of all MUs. A suboptimal algorithm with low complexity and satisfactory performance is proposed to solve the formulated non-convex problem.
References
-
-
1)
-
14. Kuhestani, A., Mohammadi, A., Masoudi, M.: ‘Joint optimal power allocation and relay selection to establish secure transmission in uplink transmission of untrusted relays network’, IET Netw., 2016, 5, (2), pp. 30–36.
-
2)
-
15. Kuhestani, A., Mohammadi, A.: ‘Destination-based cooperative jamming in untrusted amplify-and-forward relay networks: resource allocation and performance study’, IET Commun., 2016, 10, (1), pp. 17–23.
-
3)
-
2. Yang, N., Wang, L., Geraci, G., et al: ‘Safeguarding 5G wireless communication networks using physical layer security’, IEEE Commun. Mag., 2015, 53, (4), pp. 20–27.
-
4)
-
18. Xu, H.B., Sun, L., Ren, P.Y., et al: ‘Securing two-way cooperative systems with an untrusted relay: a constellation-rotation aided approach’, IEEE Commun. Lett., 2015, 19, (12), pp. 2270–2273.
-
5)
-
11. Saini, R., Mishra, D., De, S.: ‘Utility regions for DF relay in OFDMA-based secure communication with untrusted users’, IEEE Commun. Lett., 2017, 21, (11), pp. 2512–2515.
-
6)
-
5. Zou, Y., Champagne, B., Zhu, W., et al: ‘Relay-selection improves the security-reliability trade-off in cognitive radio systems’, IEEE Trans. Commun., 2015, 63, (1), pp. 215–228.
-
7)
-
9. Wang, X., Tao, M., Mo, J., et al: ‘Power and subcarrier allocation for physical-layer security in OFDMA-based broadband wireless networks’, IEEE Trans. Inf. Forensics Security, 2011, 6, (3), pp. 693–702.
-
8)
-
20. Gupta, V., Kalamkar, S.S., Banerjee, A.: ‘On secure communication using RF energy harvesting two-way untrusted relay’. IEEE Proc. Globecom, Singapore, 2017.
-
9)
-
25. Zheng, G., Ho, Z., Jorswieck, E.A., et al: ‘Information and energy cooperation in cognitive radio networks’, IEEE Trans. Signal Process., 2014, 62, (9), pp. 2290–2303.
-
10)
-
13. Jiang, W.H., Gong, Y., Xiao, Q., et al: ‘Secrecy rate maximization for untrusted relay networks with nonorthogonal cooperative transmission protocols’, IEEE Trans. Veh. Technol., 2018, 67, (7), pp. 6325–6339.
-
11)
-
8. Saini, R., Jindal, A., De, S.: ‘Jammer-assisted resource allocation in secure OFDMA with untrusted users’, IEEE Trans. Inf. Forensics Security, 2016, 11, (5), pp. 1055–1070.
-
12)
-
22. Sidhu, G.A.S., Gao, F.F., Chen, W., et al: ‘A joint resource allocation scheme for multiuser two-way relay networks’, IEEE Trans. Commun., 2011, 59, (11), pp. 2970–2975.
-
13)
-
19. Zhang, J.Z., Tao, X.F., Wu, H.C., et al: ‘Secure transmission in SWIPT-powered two-way untrusted relay networks’, IEEE. Access., 2018, 6, pp. 10508–10519.
-
14)
-
16. Kuhestani, A., Mohammadi, A., Yeoh, P.L.: ‘Optimal power allocation and secrecy sum rate in two-way untrusted relaying networks with an external jammer’, IEEE Trans. Wireless Commun., 2018, 66, (6), pp. 2671–2684.
-
15)
-
1. Jiang, C., Wang, X., Wang, J., et al: ‘Security in space information networks’, IEEE Commun. Mag., 2015, 53, (8), pp. 82–88.
-
16)
-
24. Mishra, D., De, S., Chiasserini, C.-F.: ‘Joint optimization schemes for cooperative wireless information and power transfer over Rician channels’, IEEE Trans. Commun., 2016, 64, (2), pp. 554–571.
-
17)
-
4. Zou, Y., Zhu, J., Wang, X., et al: ‘Improving physical-layer security in wireless communications using diversity techniques’, IEEE Netw.2015, 29, (1), pp. 42–48.
-
18)
-
6. Ng, D.W.K., Lo, E.S., Schober, R.: ‘Wireless information and power transfer: energy efficiency optimization in OFDMA systems’, IEEE Trans. Wireless Commun., 2013, 12, (2), pp. 6352–6370.
-
19)
-
23. Wang, F., Guo, S.T., Yang, Y.Y., et al: ‘Relay selection and power allocation for cooperative communication networks with energy harvesting’, IEEE Syst. J., 2018, 12, (1), pp. 735–746.
-
20)
-
17. Wang, D., Bai, B., Chen, W., et al: ‘Secure green communication via untrusted two-way relaying: a physical layer approach’, IEEE Trans. Commun., 2016, 64, (5), pp. 1861–1874.
-
21)
-
3. Zhang, H.J., Xing, H., Cheng, J.L., et al: ‘Secure resource allocation for OFDMA two-way relay wireless sensor networks without and with cooperative jamming’, IEEE Trans. Ind. Informat, 2016, 12, (5), pp. 1714–1725.
-
22)
-
21. Li, Q.Z., Zhang, Q., Qin, J.Y., et al: ‘Secure relay beamforming for SWIPT in amplify-and-forward two-way relay networks’, IEEE Trans. Veh. Technol., 2016, 19, (12), pp. 9006–9019.
-
23)
-
10. Saini, R., Mishra, D., De, S.: ‘OFDMA-based DF secure cooperative communication with untrusted users’, IEEE Commun. Lett., 2016, 20, (4), pp. 716–719.
-
24)
-
7. Wu, Y.L., Liu, K.J.R.: ‘An information secrecy game in cognitive radio networks’, IEEE Trans. Inf. Forensics Security, 2011, 6, (3), pp. 831–842.
-
25)
-
12. Saini, R., Mishra, D., De, S.: ‘Novel subcarrier pairing strategy for DF relayed secure OFDMA with untrusted users’. IEEE Proc. Globecom, Singapore, 2017.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-net.2019.0002
Related content
content/journals/10.1049/iet-net.2019.0002
pub_keyword,iet_inspecKeyword,pub_concept
6
6