Secure Communications With Cooperative Jamming: Optimal Power Allocation and Secrecy Outage Analysis

被引:77
作者
Cumanan, Kanapathippillai [1 ]
Alexandropoulos, George C. [2 ]
Ding, Zhiguo [3 ]
Karagiannidis, George K. [4 ]
机构
[1] Univ York, Dept Elect, York YO10 5DD, N Yorkshire, England
[2] Huawei Technol France, France Res Ctr, Math & Algorithm Sci Lab, F-92100 Boulogne, France
[3] Univ Lancaster, Sch Comp & Commun, Lancaster LA1 4WA, England
[4] Aristotle Univ Thessaloniki, Thessaloniki 54124, Greece
基金
英国工程与自然科学研究理事会; 欧盟地平线“2020”;
关键词
Cooperative jamming; Convex optimization; physical layer security; secrecy outage analysis; RATE OPTIMIZATIONS; TRANSMISSION; SELECTION; CHANNEL;
D O I
10.1109/TVT.2017.2657629
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper studies the secrecy rate maximization problem of a secure wireless communication system in the presence of multiple eavesdroppers. The security of the communication link is enhanced through cooperative jamming with the help of multiple jammers. First, a feasibility condition is derived to achieve a positive secrecy rate at the destination. Then, we solve the original secrecy rate maximization problem, which is not convex in terms of power allocation at the jammers. To circumvent this non-convexity, the achievable secrecy rate is approximated for a given power allocation at the jammers, and the approximated problem is formulated into a geometric programming one. Based on this approximation, an iterative algorithm has been developed to obtain the optimal power allocation at the jammers. Next, we provide a bisection approach, based on 1-D search, to validate the optimality of the proposed algorithm. In addition, by assuming Rayleigh fading, the secrecy outage probability (SOP) of the proposed cooperative jamming scheme is analyzed. More specifically, a single-integral form expression for the SOP is derived for the most general case, as well as a closed-form expression for the special case of two cooperative jammers and one eavesdropper. Simulation results have been provided to validate the convergence and the optimality of the proposed algorithm, as well as the theoretical derivations of the presented SOP analysis.
引用
收藏
页码:7495 / 7505
页数:11
相关论文
共 32 条
[1]   Opportunistic Relay Selection for Secrecy Enhancement in Cooperative Networks [J].
Al-Qahtani, Fawaz S. ;
Zhong, Caijun ;
Alnuweiri, Hussein M. .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2015, 63 (05) :1756-1770
[2]   A Comparative Study of Relaying Schemes with Decode and Forward over Nakagami-m Fading Channels [J].
Alexandropoulos, George C. ;
Papadogiannis, Agisilaos ;
Sofotasios, Paschalis C. .
JOURNAL OF COMPUTER NETWORKS AND COMMUNICATIONS, 2011, 2011
[3]  
[Anonymous], IEEE T WIRELESS COMM
[4]  
[Anonymous], 2005, Digital communication over fading channels
[5]   Secrecy capacity of wireless channels [J].
Barros, Joao ;
Rodrigues, Miguel R. D. .
2006 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1-6, PROCEEDINGS, 2006, :356-+
[6]  
Boyd S, 2004, CONVEX OPTIMIZATION
[7]   Power control by geometric programming [J].
Chiang, Mung ;
Tan, Chee Wei ;
Palomar, Daniel P. ;
O'Neill, Daniel ;
Julian, David .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2007, 6 (07) :2640-2651
[8]   Robust Outage Secrecy Rate Optimizations for a MIMO Secrecy Channel [J].
Chu, Zheng ;
Cumanan, Kanapathippillai ;
Ding, Zhiguo ;
Johnston, Martin ;
Le Goff, Stephane .
IEEE WIRELESS COMMUNICATIONS LETTERS, 2015, 4 (01) :86-89
[9]   Secrecy Rate Optimizations for a MIMO Secrecy Channel With a Cooperative Jammer [J].
Chu, Zheng ;
Cumanan, Kanapathippillai ;
Ding, Zhiguo ;
Johnston, Martin ;
Le Goff, Stephane Y. .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2015, 64 (05) :1833-1847
[10]  
CSISZAR I, 1978, IEEE T INFORM THEORY, V24, P339, DOI 10.1109/TIT.1978.1055892