Improving the Physical Layer Security in Cooperative Networks with Multiple Eavesdroppers

被引:5
作者
Saeidi-Khabisi, Fatemeh-Sadat [1 ]
Vakili, Vahid Tabataba [1 ]
Abbasi-Moghadam, Dariush [2 ]
机构
[1] Iran Univ Sci & Technol, Fac Elect Engn, Dept Elect Engn, Tehran, Iran
[2] Shahid Bahonar Univ Kerman, Dept Elect Engn, Kerman, Iran
关键词
Physical layer security; Multi-eavesdropper networks; Cooperative jamming; Improving the rate at the eavesdropper; Increasing the number of relays; Power allocation; OPPORTUNISTIC RELAY SELECTION; BROADCAST CHANNELS; COMMUNICATION;
D O I
10.1007/s11277-017-3998-5
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Physical layer security is an efficient technique to realize security in wireless network without relying on conventional cryptographic techniques. In cooperative networks with secrecy constraints, joint relay and jammer selection is a promising approach for improving the security of wireless communications. We need to apply more techniques in order to achieve more effective security in contrast to the mentioned method. In this paper, we propose three techniques to increase the secrecy as follows: Firstly, we introduce a new criterion which decreases the rate at the eavesdroppers. Next, a new relay selection schemes are proposed, where two of the available relays are selected for data transmission. Therefore, the secrecy rate is increased considerably. Finally, we propose a sub-optimal power allocation solution for jammer nodes. Sub-optimal power of the jammer nodes vary according to the type of scenario, location of the eavesdroppers, and the destination. The sub-optimal power allocation to the jammer nodes causes more eavesdroppers confusion. As a result, the total secrecy rate is increased. Simulation and analytical results demonstrate the performance improvement of the proposed techniques.
引用
收藏
页码:3295 / 3320
页数:26
相关论文
共 24 条
  • [1] Relaying techniques for enhancing the physical layer secrecy in cooperative networks with multiple eavesdroppers
    Al-nahari, Azzam Y.
    Krikidis, Ioannis
    Ibrahim, Ahmed S.
    Dessouky, Moawad I.
    Abd El-Samie, Fathi E.
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2014, 25 (04): : 445 - 460
  • [2] [Anonymous], 2009, MILCOM 2009 2009 IEE
  • [3] Secrecy capacity of wireless channels
    Barros, Joao
    Rodrigues, Miguel R. D.
    [J]. 2006 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1-6, PROCEEDINGS, 2006, : 356 - +
  • [4] Deaf Cooperation and Relay Selection Strategies for Secure Communication in Multiple Relay Networks
    Bassily, Raef
    Ulukus, Sennur
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2013, 61 (06) : 1544 - 1554
  • [5] Outage analysis for co-operative communication with multiple amplify-and-forward relays
    Bletsas, A.
    Shin, H.
    Win, M. Z.
    [J]. ELECTRONICS LETTERS, 2007, 43 (06) : 353 - 355
  • [6] Wireless information-theoretic security
    Bloch, Matthieu
    Barros, Joao
    Rodrigues, Miguel R. D.
    McLaughlin, Steven W.
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) : 2515 - 2534
  • [7] Chunxiao Cai, 2011, Proceedings of the 2011 Third International Conference on Communications and Mobile Computing (CMC 2011), P158, DOI 10.1109/CMC.2011.91
  • [8] CSISZAR I, 1978, IEEE T INFORM THEORY, V24, P339, DOI 10.1109/TIT.1978.1055892
  • [9] IDENTITY-BASED KEY MANAGEMENT IN MOBILE AD HOC NETWORKS: TECHNIQUES AND APPLICATIONS
    Da Silva, Eduardo
    Dos Santos, Aldri L.
    Albini, Luiz Carlos P.
    Lima, Michele N.
    [J]. IEEE WIRELESS COMMUNICATIONS, 2008, 15 (05) : 46 - 52
  • [10] Combined Relay Selection and Cooperative Beamforming for Physical Layer Security
    Kim, Junsu
    Ikhlef, Aissa
    Schober, Robert
    [J]. JOURNAL OF COMMUNICATIONS AND NETWORKS, 2012, 14 (04) : 364 - 373