Secure Transmission in Cooperative Networks with Weak Eavesdroppers

被引:3
作者
Sunny, Albert [1 ]
Sarma, Siddhartha [1 ]
Kuri, Joy [1 ]
机构
[1] Indian Inst Sci, Dept Elect Syst Engn, Bangalore 560012, Karnataka, India
关键词
Analog network coding; cooperative networks; physical layer security; power allocation; weak adversaries; PHYSICAL-LAYER SECURITY; WIRELESS NETWORKS; CAPACITY; COMMUNICATION; CHANNEL;
D O I
10.1109/LSP.2015.2425043
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this letter, we propose a scheme to improve the secrecy rate of cooperative networks using Analog Network Coding (ANC). ANC mixes the signals in the air; the desired signal is then separated out, from the mixed signals, at the legitimate receiver using techniques like self interference subtraction and signal nulling, thereby achieving better secrecy rates. Assuming global channel state information, memoryless adversaries and the decode-and-forward strategy, we seek to maximize the average secrecy rate between the source and the destination, subject to an overall power budget. Then, exploiting the structure of the optimization problem, we compute its optimal solution. Finally, we use numerical evaluations to compare our scheme with the conventional approaches.
引用
收藏
页码:1693 / 1697
页数:5
相关论文
共 25 条
[1]   CAPACITY OF A CHANNEL WITH ARBITRARILY VARYING CHANNEL PROBABILITY FUNCTIONS AND BINARY OUTPUT ALPHABET [J].
AHLSWEDE, R ;
WOLFOWITZ, J .
ZEITSCHRIFT FUR WAHRSCHEINLICHKEITSTHEORIE UND VERWANDTE GEBIETE, 1970, 15 (03) :186-+
[2]  
[Anonymous], 2010, P 2010 IEEE GLOB TEL
[3]   Joint Relay and Jammer Selection for Secure Two-Way Relay Networks [J].
Chen, Jingchao ;
Zhang, Rongqing ;
Song, Lingyang ;
Han, Zhu ;
Jiao, Bingli .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (01) :310-320
[4]  
Chong E.K., 2013, An introduction to optimization, V76
[5]   THE CAPACITY OF THE ARBITRARILY VARYING CHANNEL REVISITED - POSITIVITY, CONSTRAINTS [J].
CSISZAR, I ;
NARAYAN, P .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1988, 34 (02) :181-193
[6]   Upper Bounds on the Capacity of Binary Channels With Causal Adversaries [J].
Dey, Bikash Kumar ;
Jaggi, Sidharth ;
Langberg, Michael ;
Sarwate, Anand D. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2013, 59 (06) :3753-3763
[7]   Improving Wireless Physical Layer Security via Cooperating Relays [J].
Dong, Lun ;
Han, Zhu ;
Petropulu, Athina P. ;
Poor, H. Vincent .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2010, 58 (03) :1875-1888
[8]   Secure Wireless Communications via Cooperation [J].
Dong, Lun ;
Han, Zhu ;
Petropulu, Athina P. ;
Poor, H. Vincent .
2008 46TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, VOLS 1-3, 2008, :1132-+
[9]  
Haviv I, 2011, IEEE INT SYMP INFO, P1392, DOI 10.1109/ISIT.2011.6033767
[10]   End-to-End Secure Multi-Hop Communication with Untrusted Relays [J].
He, Xiang ;
Yener, Aylin .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2013, 12 (01) :1-11