access icon free Secure resource allocation for green two-way relay networks with mutually untrusted relay and mobile users

The authors investigate secure resource allocation for an orthogonal frequency division multiple access two-way relay network, which has several pairs of mobile users (MUs) and one energy harvesting (EH) relay. In this network, the relay is untrusted and each MU pair may also overhear the other MU pairs’ confidential information. In particular, to forward information for each MU, the relay adopts power splitting technique to harvest energy from radio frequency signals emitted by each MU. For this scenario, which has hardly been considered, the joint problem of subcarrier allocation, power control, and power splitting ratio selection is formulated, with the aim to maximise the total secrecy rate of all MUs. A suboptimal algorithm with low complexity and satisfactory performance is proposed to solve the formulated non-convex problem.

Inspec keywords: concave programming; frequency division multiple access; OFDM modulation; energy harvesting; power control; telecommunication control; resource allocation; relay networks (telecommunication); telecommunication power management; telecommunication security

Other keywords: power control; secure resource allocation; radio frequency signals; green two-way relay networks; suboptimal algorithm; subcarrier allocation; power splitting ratio selection; MU pair confidential information; energy harvesting relay; mutually untrusted relay; orthogonal frequency division multiple access two-way relay network; power splitting technique; nonconvex problem; mobile users

Subjects: Power and energy control; Control applications in radio and radar; Optimisation techniques; Energy harvesting; Telecommunication systems (energy utilisation); Energy harvesting; Optimisation techniques; Radio links and equipment; Modulation and coding methods; Multiple access communication

References

    1. 1)
      • 14. Kuhestani, A., Mohammadi, A., Masoudi, M.: ‘Joint optimal power allocation and relay selection to establish secure transmission in uplink transmission of untrusted relays network’, IET Netw., 2016, 5, (2), pp. 3036.
    2. 2)
      • 15. Kuhestani, A., Mohammadi, A.: ‘Destination-based cooperative jamming in untrusted amplify-and-forward relay networks: resource allocation and performance study’, IET Commun., 2016, 10, (1), pp. 1723.
    3. 3)
      • 2. Yang, N., Wang, L., Geraci, G., et al: ‘Safeguarding 5G wireless communication networks using physical layer security’, IEEE Commun. Mag., 2015, 53, (4), pp. 2027.
    4. 4)
      • 18. Xu, H.B., Sun, L., Ren, P.Y., et al: ‘Securing two-way cooperative systems with an untrusted relay: a constellation-rotation aided approach’, IEEE Commun. Lett., 2015, 19, (12), pp. 22702273.
    5. 5)
      • 11. Saini, R., Mishra, D., De, S.: ‘Utility regions for DF relay in OFDMA-based secure communication with untrusted users’, IEEE Commun. Lett., 2017, 21, (11), pp. 25122515.
    6. 6)
      • 5. Zou, Y., Champagne, B., Zhu, W., et al: ‘Relay-selection improves the security-reliability trade-off in cognitive radio systems’, IEEE Trans. Commun., 2015, 63, (1), pp. 215228.
    7. 7)
      • 9. Wang, X., Tao, M., Mo, J., et al: ‘Power and subcarrier allocation for physical-layer security in OFDMA-based broadband wireless networks’, IEEE Trans. Inf. Forensics Security, 2011, 6, (3), pp. 693702.
    8. 8)
      • 20. Gupta, V., Kalamkar, S.S., Banerjee, A.: ‘On secure communication using RF energy harvesting two-way untrusted relay’. IEEE Proc. Globecom, Singapore, 2017.
    9. 9)
      • 25. Zheng, G., Ho, Z., Jorswieck, E.A., et al: ‘Information and energy cooperation in cognitive radio networks’, IEEE Trans. Signal Process., 2014, 62, (9), pp. 22902303.
    10. 10)
      • 13. Jiang, W.H., Gong, Y., Xiao, Q., et al: ‘Secrecy rate maximization for untrusted relay networks with nonorthogonal cooperative transmission protocols’, IEEE Trans. Veh. Technol., 2018, 67, (7), pp. 63256339.
    11. 11)
      • 8. Saini, R., Jindal, A., De, S.: ‘Jammer-assisted resource allocation in secure OFDMA with untrusted users’, IEEE Trans. Inf. Forensics Security, 2016, 11, (5), pp. 10551070.
    12. 12)
      • 22. Sidhu, G.A.S., Gao, F.F., Chen, W., et al: ‘A joint resource allocation scheme for multiuser two-way relay networks’, IEEE Trans. Commun., 2011, 59, (11), pp. 29702975.
    13. 13)
      • 19. Zhang, J.Z., Tao, X.F., Wu, H.C., et al: ‘Secure transmission in SWIPT-powered two-way untrusted relay networks’, IEEE. Access., 2018, 6, pp. 1050810519.
    14. 14)
      • 16. Kuhestani, A., Mohammadi, A., Yeoh, P.L.: ‘Optimal power allocation and secrecy sum rate in two-way untrusted relaying networks with an external jammer’, IEEE Trans. Wireless Commun., 2018, 66, (6), pp. 26712684.
    15. 15)
      • 1. Jiang, C., Wang, X., Wang, J., et al: ‘Security in space information networks’, IEEE Commun. Mag., 2015, 53, (8), pp. 8288.
    16. 16)
      • 24. Mishra, D., De, S., Chiasserini, C.-F.: ‘Joint optimization schemes for cooperative wireless information and power transfer over Rician channels’, IEEE Trans. Commun., 2016, 64, (2), pp. 554571.
    17. 17)
      • 4. Zou, Y., Zhu, J., Wang, X., et al: ‘Improving physical-layer security in wireless communications using diversity techniques’, IEEE Netw.2015, 29, (1), pp. 4248.
    18. 18)
      • 6. Ng, D.W.K., Lo, E.S., Schober, R.: ‘Wireless information and power transfer: energy efficiency optimization in OFDMA systems’, IEEE Trans. Wireless Commun., 2013, 12, (2), pp. 63526370.
    19. 19)
      • 23. Wang, F., Guo, S.T., Yang, Y.Y., et al: ‘Relay selection and power allocation for cooperative communication networks with energy harvesting’, IEEE Syst. J., 2018, 12, (1), pp. 735746.
    20. 20)
      • 17. Wang, D., Bai, B., Chen, W., et al: ‘Secure green communication via untrusted two-way relaying: a physical layer approach’, IEEE Trans. Commun., 2016, 64, (5), pp. 18611874.
    21. 21)
      • 3. Zhang, H.J., Xing, H., Cheng, J.L., et al: ‘Secure resource allocation for OFDMA two-way relay wireless sensor networks without and with cooperative jamming’, IEEE Trans. Ind. Informat, 2016, 12, (5), pp. 17141725.
    22. 22)
      • 21. Li, Q.Z., Zhang, Q., Qin, J.Y., et al: ‘Secure relay beamforming for SWIPT in amplify-and-forward two-way relay networks’, IEEE Trans. Veh. Technol., 2016, 19, (12), pp. 90069019.
    23. 23)
      • 10. Saini, R., Mishra, D., De, S.: ‘OFDMA-based DF secure cooperative communication with untrusted users’, IEEE Commun. Lett., 2016, 20, (4), pp. 716719.
    24. 24)
      • 7. Wu, Y.L., Liu, K.J.R.: ‘An information secrecy game in cognitive radio networks’, IEEE Trans. Inf. Forensics Security, 2011, 6, (3), pp. 831842.
    25. 25)
      • 12. Saini, R., Mishra, D., De, S.: ‘Novel subcarrier pairing strategy for DF relayed secure OFDMA with untrusted users’. IEEE Proc. Globecom, Singapore, 2017.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-net.2019.0002
Loading

Related content

content/journals/10.1049/iet-net.2019.0002
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading