Hybrid Opportunistic Relaying and Jamming With Power Allocation for Secure Cooperative Networks

被引:133
|
作者
Wang, Chao [1 ]
Wang, Hui-Ming [1 ,2 ]
Xia, Xiang-Gen [3 ,4 ]
机构
[1] Xi An Jiao Tong Univ, Sch Elect & Informat Engn, Xian 710049, Peoples R China
[2] Southeast Univ, Natl Mobile Commun Res Lab, Nanjing 210096, Jiangsu, Peoples R China
[3] Xidian Univ, Inst Elect, Xian 710071, Peoples R China
[4] Univ Delaware, Dept Elect & Comp Engn, Newark, DE 19716 USA
基金
美国国家科学基金会;
关键词
Decode and forward; opportunistic relaying; extreme order statistics; ergodic secrecy rate; power allocation; sequential parametric convex approximation; outdated CSIs; PHYSICAL-LAYER SECURITY; MISO WIRETAP CHANNELS; ARTIFICIAL NOISE; ACHIEVABLE RATE; OUTDATED CSI; SELECTION; SECRECY; AMPLIFY; TRANSMISSION;
D O I
10.1109/TWC.2014.2354635
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper studies the cooperative transmission for securing a decode-and-forward (DF) two-hop network where multiple cooperative nodes coexist with a potential eavesdropper. Under the more practical assumption that only the channel distribution information (CDI) of the eavesdropper is known, we propose an opportunistic relaying with artificial jamming secrecy scheme, where a "best" cooperative node is chosen among a collection of N possible candidates to forward the confidential signal and the others send jamming signals to confuse the eavesdroppers. We first investigate the ergodic secrecy rate (ESR) maximization problem by optimizing the power allocation between the confidential signal and jamming signals. In particular, we exploit the limiting distribution technique of extreme order statistics to build an asymptotic closed-form expression of the achievable ESR and the power allocation is optimized to maximize the ESR lower bound. Although the optimization problems are non-convex, we propose a sequential parametric convex approximation (SPCA) algorithm to locate the Karush-Kuhn-Tucker (KKT) solutions. Furthermore, taking the time variance of the legitimate links' CSIs into consideration, we address the impacts of the outdated CSIs to the proposed secrecy scheme, and derive an asymptotic ESR. Finally, we generalize the analysis to the scenario with multiple eavesdroppers, and give the asymptotic analytical results of the achievable ESR. Simulation results confirm our analytical results.
引用
收藏
页码:589 / 605
页数:17
相关论文
共 50 条
  • [21] Opportunistic relay and power allocation optimization in cooperative OFDM networks
    Li, Funian
    Zhu, Guangxi
    Wang, Desheng
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2010, 38 (09): : 14 - 17
  • [22] Secure Communications With Cooperative Jamming: Optimal Power Allocation and Secrecy Outage Analysis
    Cumanan, Kanapathippillai
    Alexandropoulos, George C.
    Ding, Zhiguo
    Karagiannidis, George K.
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2017, 66 (08) : 7495 - 7505
  • [23] Secure Transmission with Hybrid Relay Scheme: Relaying and Jamming
    Xiong, Qi
    Li, Kwok Hung
    Liang, Ying-Chang
    Gong, Yi
    UKSIM-AMSS SEVENTH EUROPEAN MODELLING SYMPOSIUM ON COMPUTER MODELLING AND SIMULATION (EMS 2013), 2013, : 220 - 224
  • [24] Hybrid Relaying and Jamming for Secure Two-Way Relay Networks with Passive Eavesdroppers
    Wang, Hui-Ming
    Xia, Xiang-Gen
    Yin, Qinye
    Mu, Pengcheng
    2013 IEEE 24TH INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2013, : 451 - 455
  • [25] Power Allocation for Three-Stage Cooperative Relaying in Wireless Networks
    Liu, Lingya
    Hua, Cunqing
    Chen, Cailian
    Guan, Xinping
    2013 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2013, : 1619 - +
  • [26] Cooperative Jamming and Power Allocation for Wireless Relay Networks in Presence of Eavesdropper
    Dong, Lun
    Yousefi'zadeh, Homayoun
    Jafarkhani, Hamid
    2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
  • [27] Cooperative jamming and power allocation for wireless relay networks in presence of eavesdropper
    Center for Pervasive Communications and Computing, University of California, Irvine, CA, United States
    IEEE Int Conf Commun, 2011,
  • [28] Outage performance and power allocation for decode-and-forward relaying and cooperative jamming for the wiretap channel
    School of Electrical Engineering, ACCESS Linnaeus Center, Royal Institute of Technology , SE-100 44 Stockholm, Sweden
    IEEE Int Conf Commun, 2011,
  • [29] Amplify-and-forward-based cooperative jamming strategy with power allocation for secure communication
    Li, An
    Xu, Yizhu
    Wang, Yuhao
    Sun, Lihua
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2015, 28 (10) : 1621 - 1627
  • [30] Relay Selection for Secure Cooperative Networks with Jamming
    Krikidis, Ioannis
    Thompson, John S.
    McLaughlin, Steve
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (10) : 5003 - 5011