On Cooperative Relaying Schemes for Wireless Physical Layer Security

被引:316
|
作者
Li, Jiangyuan [1 ]
Petropulu, Athina P. [1 ]
Weber, Steven [2 ]
机构
[1] Rutgers State Univ, Dept Elect & Comp Engn, New Brunswick, NJ 08854 USA
[2] Drexel Univ, Philadelphia, PA 19104 USA
基金
美国国家科学基金会;
关键词
Node cooperation; physical layer based security; secrecy rate; semi-definite programming; COMMUNICATION; CHANNELS;
D O I
10.1109/TSP.2011.2159598
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We consider a cooperative wireless network in the presence of one or more eavesdroppers, and exploit node cooperation for achieving physical (PHY) layer based security. Two different cooperation schemes are considered. In the first scheme, cooperating nodes retransmit a weighted version of the source signal in a decode-and-forward (DF) fashion. In the second scheme, referred to as cooperative jamming (CJ), while the source is transmitting, cooperating nodes transmit weighted noise to confound the eavesdropper. We investigate two objectives: i) maximization of the achievable secrecy rate subject to a total power constraint and ii) minimization of the total power transmit power under a secrecy rate constraint. For the first design objective, we obtain the exact solution for the DF scheme for the case of a single or multiple eavasdroppers, while for the CJ scheme with a single eavesdropper we reduce the multivariate problem to a problem of one variable. For the second design objective, existing work introduces additional constraints in order to reduce the degree of difficulty, thus resulting in suboptimal solutions. Our work raises those constraints, and obtains either an analytical solution for the DF scheme with a single eavesdropper, or reduces the multivariate problem to a problem of one variable for the CJ scheme with a single eavesdropper. Numerical results are presented to illustrate the proposed results and compare them to existing work.
引用
下载
收藏
页码:4985 / 4997
页数:13
相关论文
共 50 条
  • [1] Research on Physical Layer Security Schemes based on Cooperative Wireless Communication
    Song Wenbo
    2015 SEVENTH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION (ICMTMA 2015), 2015, : 888 - 891
  • [2] Cooperative Relaying Protocol for Improving Physical Layer Security in Wireless Decode-and-Forward Relaying Networks
    Lee, Jong-Ho
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 83 (04) : 3033 - 3044
  • [3] Cooperative Relaying Protocol for Improving Physical Layer Security in Wireless Decode-and-Forward Relaying Networks
    Jong-Ho Lee
    Wireless Personal Communications, 2015, 83 : 3033 - 3044
  • [4] Physical Layer Security for Cooperative Relaying in Broadcast Networks
    Chen, Liang
    2011 - MILCOM 2011 MILITARY COMMUNICATIONS CONFERENCE, 2011, : 91 - 96
  • [5] Security at Physical Layer in NOMA Relaying Networks With Cooperative Jamming
    Chen, Bingcai
    Li, Rui
    Ning, Qian
    Lin, Kai
    Han, Chaoqi
    Leung, Victor C. M.
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2022, 71 (04) : 3883 - 3888
  • [6] COOPERATIVE JAMMING FOR WIRELESS PHYSICAL LAYER SECURITY
    Dong, Lun
    Han, Zhu
    Petropulu, Athina P.
    Poor, H. Vincent
    2009 IEEE/SP 15TH WORKSHOP ON STATISTICAL SIGNAL PROCESSING, VOLS 1 AND 2, 2009, : 417 - +
  • [7] A Comprehensive Survey on Cooperative Relaying and Jamming Strategies for Physical Layer Security
    Jameel, Furqan
    Wyne, Shurjeel
    Kaddoum, Georges
    Trung Q Duong
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (03): : 2734 - 2771
  • [8] Jamming and Physical Layer Security for Cooperative Wireless Communication
    Rohokale, Vandana
    Prasad, Neeli
    Prasad, Ramjee
    INTERNET OF THINGS AND M2M COMMUNICATIONS, 2013, : 161 - 181
  • [9] Improving Physical Layer Security of Cooperative NOMA System with Wireless-Powered Full-Duplex Relaying
    Ren, Yuan
    Tan, Yixuan
    Makhanbet, Meruyert
    Zhang, Xuewei
    INFORMATION, 2021, 12 (07)
  • [10] New Bandwidth Efficient Relaying Schemes in Cooperative Cognitive Two-Way Relay Networks With Physical Layer Security
    Abd El-Malek, Ahmed Hassan
    Salhab, Anas M.
    Zummo, Salam A.
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2017, 66 (06) : 5372 - 5386