On Cooperative Relaying Schemes for Wireless Physical Layer Security

被引:319
|
作者
Li, Jiangyuan [1 ]
Petropulu, Athina P. [1 ]
Weber, Steven [2 ]
机构
[1] Rutgers State Univ, Dept Elect & Comp Engn, New Brunswick, NJ 08854 USA
[2] Drexel Univ, Philadelphia, PA 19104 USA
基金
美国国家科学基金会;
关键词
Node cooperation; physical layer based security; secrecy rate; semi-definite programming; COMMUNICATION; CHANNELS;
D O I
10.1109/TSP.2011.2159598
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We consider a cooperative wireless network in the presence of one or more eavesdroppers, and exploit node cooperation for achieving physical (PHY) layer based security. Two different cooperation schemes are considered. In the first scheme, cooperating nodes retransmit a weighted version of the source signal in a decode-and-forward (DF) fashion. In the second scheme, referred to as cooperative jamming (CJ), while the source is transmitting, cooperating nodes transmit weighted noise to confound the eavesdropper. We investigate two objectives: i) maximization of the achievable secrecy rate subject to a total power constraint and ii) minimization of the total power transmit power under a secrecy rate constraint. For the first design objective, we obtain the exact solution for the DF scheme for the case of a single or multiple eavasdroppers, while for the CJ scheme with a single eavesdropper we reduce the multivariate problem to a problem of one variable. For the second design objective, existing work introduces additional constraints in order to reduce the degree of difficulty, thus resulting in suboptimal solutions. Our work raises those constraints, and obtains either an analytical solution for the DF scheme with a single eavesdropper, or reduces the multivariate problem to a problem of one variable for the CJ scheme with a single eavesdropper. Numerical results are presented to illustrate the proposed results and compare them to existing work.
引用
收藏
页码:4985 / 4997
页数:13
相关论文
共 50 条
  • [21] Cooperative Beamforming for Physical-Layer Security in Power-Constrained Wireless Sensor Networks with Partial Relay Selection
    Qian, Mujun
    Liu, Chen
    Zou, Yulong
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2016,
  • [22] Physical Layer Security Using Two-Path Successive Relaying
    Liau, Qian Yu
    Leow, Chee Yen
    Ding, Zhiguo
    SENSORS, 2016, 16 (06):
  • [23] Improving Physical Layer Security in Full-Duplex Relaying System
    Nirala, Rupali
    Chauhan, S. S.
    Verma, Gaurav
    2017 2ND IEEE INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ELECTRONICS, INFORMATION & COMMUNICATION TECHNOLOGY (RTEICT), 2017, : 997 - 1001
  • [24] Cooperative Communication in Physical Layer Security: Technologies and Challenges
    Pahuja, Sonika
    Jindal, Poonam
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 108 (02) : 811 - 837
  • [25] A Survey on Cooperative Jamming Applied to Physical Layer Security
    Atallah, Michael
    Kaddoum, Georges
    Kong, Long
    2015 IEEE INTERNATIONAL CONFERENCE ON UBIQUITOUS WIRELESS BROADBAND (ICUWB), 2015,
  • [26] Asymptotically Optimal Cooperative Jamming for Physical Layer Security
    Yang, Jun
    Salari, Soheil
    Kim, Il-Min
    Kim, Dong In
    Kim, Seokki
    Lim, Kwangae
    JOURNAL OF COMMUNICATIONS AND NETWORKS, 2016, 18 (01) : 84 - 94
  • [27] Cooperative Security at the Physical Layer [A summary of recent advances]
    Bassily, Raef
    Ekrem, Ersen
    He, Xiang
    Tekin, Ender
    Xie, Jianwei
    Bloch, Matthieu R.
    Ulukus, Sennur
    Yener, Aylin
    IEEE SIGNAL PROCESSING MAGAZINE, 2013, 30 (05) : 16 - 28
  • [28] JAMMING STRATEGIES FOR PHYSICAL LAYER SECURITY
    Huo, Yan
    Tian, Yuqi
    Ma, Liran
    Cheng, Xiuzhen
    Jing, Tao
    IEEE WIRELESS COMMUNICATIONS, 2018, 25 (01) : 148 - 153
  • [29] Physical Layer Security in MIMO Backscatter Wireless Systems
    Yang, Qian
    Wang, Hui-Ming
    Zhang, Yi
    Han, Zhu
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (11) : 7547 - 7560
  • [30] The Eigenvalue Decomposition Method for Wireless Physical Layer Security
    Pang, Hongwei
    Wang, Xueming
    Huang, Kaizhi
    Ji, Jiang
    PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 594 - 598