Maximized Secrecy Rate Based Power Allocation for Wireless Cooperative Network with Control Jamming

被引:0
作者
Gurrala, Kiran Kumar [1 ]
Das, Susmita [1 ]
机构
[1] NIT Rourkela, Dept Elect Engn, Rourkela, Odisha, India
来源
2015 IEEE 12TH MALAYSIA INTERNATIONAL CONFERENCE ON COMMUNICATIONS (MICC) | 2015年
关键词
Physical layer security; cooperative jamming; power allocation; DE algorithm; RELAY; SELECTION; SECURITY;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In this paper, we propose efficient power allocation techniques using both convex optimization (using Lagrange multiplier method) and a soft evolutionary approach (using Differential Evolution (DE) algorithm) to optimize both the relay and jammer powers in addition to an increase in the system performance in terms of secrecy rate. Here, we consider a cooperative wireless network with control jamming comprising of a source-destination pair with a set of relay nodes in the presence of single and multiple eavesdroppers. Optimal relay node is selected based on the SNR received at each relay, which transmits the data to the destination using decode and forward strategy. Amongst the remaining nodes, selection of jammer is done based on the SNR value of the relay to eavesdropper link. The proposed power allocation schemes are compared with equal power allocation policy for using the Monte-Carlo simulation study and these schemes are found to be superior in terms of average secrecy rate.
引用
收藏
页码:276 / 281
页数:6
相关论文
共 15 条
[1]   Wireless information-theoretic security [J].
Bloch, Matthieu ;
Barros, Joao ;
Rodrigues, Miguel R. D. ;
McLaughlin, Steven W. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) :2515-2534
[2]  
Boyd S., 2004, CONVEX OPTIMIZATION
[3]   Improving Wireless Physical Layer Security via Cooperating Relays [J].
Dong, Lun ;
Han, Zhu ;
Petropulu, Athina P. ;
Poor, H. Vincent .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2010, 58 (03) :1875-1888
[4]   Secure Wireless Communications via Cooperation [J].
Dong, Lun ;
Han, Zhu ;
Petropulu, Athina P. ;
Poor, H. Vincent .
2008 46TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, VOLS 1-3, 2008, :1132-+
[5]  
Dong LuYan Dong LuYan, 2011, Proceedings of the International Conference on pipelines and trenchless technology, Beijing, China, 26-29 October 2011, P1
[6]   A New Relay and Jammer Selection Schemes for Secure One-Way Cooperative Networks [J].
Ibrahim, Doaa H. ;
Hassan, Emad S. ;
El-Dolil, Sami A. .
WIRELESS PERSONAL COMMUNICATIONS, 2014, 75 (01) :665-685
[7]   Relay Selection for Secure Cooperative Networks with Jamming [J].
Krikidis, Ioannis ;
Thompson, John S. ;
McLaughlin, Steve .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (10) :5003-5011
[8]   The relay-eavesdropper channel: Cooperation for secrecy [J].
Lai, Lifeng ;
El Gamal, Hesham .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (09) :4005-4019
[9]  
LEUNGYANCHEONG SK, 1978, IEEE T INFORM THEORY, V24, P451, DOI 10.1109/TIT.1978.1055917
[10]   COMMUNICATION THEORY OF SECRECY SYSTEMS [J].
SHANNON, CE .
BELL SYSTEM TECHNICAL JOURNAL, 1949, 28 (04) :656-715