Hybrid Opportunistic Relaying and Jamming With Power Allocation for Secure Cooperative Networks

被引:133
|
作者
Wang, Chao [1 ]
Wang, Hui-Ming [1 ,2 ]
Xia, Xiang-Gen [3 ,4 ]
机构
[1] Xi An Jiao Tong Univ, Sch Elect & Informat Engn, Xian 710049, Peoples R China
[2] Southeast Univ, Natl Mobile Commun Res Lab, Nanjing 210096, Jiangsu, Peoples R China
[3] Xidian Univ, Inst Elect, Xian 710071, Peoples R China
[4] Univ Delaware, Dept Elect & Comp Engn, Newark, DE 19716 USA
基金
美国国家科学基金会;
关键词
Decode and forward; opportunistic relaying; extreme order statistics; ergodic secrecy rate; power allocation; sequential parametric convex approximation; outdated CSIs; PHYSICAL-LAYER SECURITY; MISO WIRETAP CHANNELS; ARTIFICIAL NOISE; ACHIEVABLE RATE; OUTDATED CSI; SELECTION; SECRECY; AMPLIFY; TRANSMISSION;
D O I
10.1109/TWC.2014.2354635
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper studies the cooperative transmission for securing a decode-and-forward (DF) two-hop network where multiple cooperative nodes coexist with a potential eavesdropper. Under the more practical assumption that only the channel distribution information (CDI) of the eavesdropper is known, we propose an opportunistic relaying with artificial jamming secrecy scheme, where a "best" cooperative node is chosen among a collection of N possible candidates to forward the confidential signal and the others send jamming signals to confuse the eavesdroppers. We first investigate the ergodic secrecy rate (ESR) maximization problem by optimizing the power allocation between the confidential signal and jamming signals. In particular, we exploit the limiting distribution technique of extreme order statistics to build an asymptotic closed-form expression of the achievable ESR and the power allocation is optimized to maximize the ESR lower bound. Although the optimization problems are non-convex, we propose a sequential parametric convex approximation (SPCA) algorithm to locate the Karush-Kuhn-Tucker (KKT) solutions. Furthermore, taking the time variance of the legitimate links' CSIs into consideration, we address the impacts of the outdated CSIs to the proposed secrecy scheme, and derive an asymptotic ESR. Finally, we generalize the analysis to the scenario with multiple eavesdroppers, and give the asymptotic analytical results of the achievable ESR. Simulation results confirm our analytical results.
引用
收藏
页码:589 / 605
页数:17
相关论文
共 50 条
  • [1] On the Jamming Power Allocation for Secure Amplify-and-Forward Relaying via Cooperative Jamming
    Park, Ki-Hong
    Wang, Tian
    Alouini, Mohamed-Slim
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2013, 31 (09) : 1741 - 1750
  • [2] Hybrid Cooperative Relaying and Jamming for Secure Two-Way Relay Networks
    Wang, Hui-Ming
    Luo, Miao
    Yin, Qinye
    2012 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2012, : 4846 - 4850
  • [3] Optimal Power Allocation for Multiuser Secure Communication in Cooperative Relaying Networks
    Duong, Trung Q.
    Hoang, Tiep M.
    Kundu, Chinmoy
    Elkashlan, Maged
    Nallanathan, Arumugam
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2016, 5 (05) : 516 - 519
  • [4] Cooperative networks power allocation scheme for two-way opportunistic relaying
    Zheng, Zhiqing
    Journal of Networks, 2014, 9 (08) : 2153 - 2160
  • [5] Hybrid Destination-Based Jamming and Opportunistic Scheduling with Optimal Power Allocation to Secure Multiuser Untrusted Relay Networks
    Ding, Fan
    Zhou, Yongming
    INFORMATION, 2018, 9 (04)
  • [6] Power allocation for cooperative relaying in wireless networks
    Deng, XM
    Haimovich, AM
    IEEE COMMUNICATIONS LETTERS, 2005, 9 (11) : 994 - 996
  • [7] Optimal Cooperative Relaying and Jamming for Secure Communication
    Alotaibi, Esa R.
    Hamdi, Khairi A.
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2015, 4 (06) : 689 - 692
  • [8] Secure Analysis in UAV-Based mmWave Relaying Networks with Cooperative Jamming
    Pang, Xiaowei
    Liu, Mingqian
    Zhao, Nan
    Chen, Yunfei
    Li, Yonghui
    Yu, F. Richard
    IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2021), 2021,
  • [9] Secure two-user AF relaying networks using cooperative jamming
    Mallat, Walid
    Alouane, Wided Hadj
    Boujemaa, Hatem
    Touati, Farid
    2018 14TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2018, : 741 - 746
  • [10] Power allocation and cooperative jamming for enhancing physical layer security in opportunistic relay networks in the presence of interference
    Abd El-Malek, Ahmed H.
    Salhab, Anas M.
    Zummo, Salam A.
    Alouini, Mohamed-Slim
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2017, 28 (11):