Cooperative jamming and power allocation with untrusty two-way relay nodes

被引:39
作者
Long, Hang [1 ]
Xiang, Wei [2 ]
Wang, Jing [3 ]
Zhang, Yueying [4 ]
Wang, Wenbo [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Minist Educ, Key Lab Universal Wireless Commun, Wireless Signal Proc & Networks Lab, Beijing 100876, Peoples R China
[2] Univ So Queensland, Fac Engn & Surveying, Toowoomba, Qld 4350, Australia
[3] China Nucl Power Engn Co Ltd, Beijing 100840, Peoples R China
[4] China Elect Technol Grp Corp, Res Inst 27, Zhengzhou 450046, Peoples R China
关键词
relay networks (telecommunication); cooperative communication; jamming; closed-form power allocation expressions; bi-directional secrecy communications; cooperative jamming scheme; two-way relaying system; PHYSICAL LAYER SECURITY; WIRE-TAP CHANNEL; ARTIFICIAL NOISE; SECRECY; NETWORKS; COMMUNICATION;
D O I
10.1049/iet-com.2013.0580
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This study investigates the security of the two-way relaying system with untrusty relay nodes. Cooperative jamming schemes are considered for bi-directional secrecy communications. The transmit power of each source node is divided into two parts corresponding to the user and jamming signals, respectively. Two different assumptions of the jamming signals are considered. When the jamming signals are a priori known at the two source nodes, closed-form power allocation expressions at two source nodes are derived. Under the assumption of unknown jamming signals, it is proven that the cooperative jamming is useless for the system secrecy capacity, because that all the power should be allocated to the user signals at each source node. Relay selection is also investigated based on the analysis of cooperative jamming. Simulation results are presented to compare the system secrecy capacities under the two jamming signal assumptions.
引用
收藏
页码:2290 / 2297
页数:8
相关论文
共 20 条
[1]   Wireless information-theoretic security [J].
Bloch, Matthieu ;
Barros, Joao ;
Rodrigues, Miguel R. D. ;
McLaughlin, Steven W. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) :2515-2534
[2]   Joint Relay and Jammer Selection for Secure Two-Way Relay Networks [J].
Chen, Jingchao ;
Zhang, Rongqing ;
Song, Lingyang ;
Han, Zhu ;
Jiao, Bingli .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (01) :310-320
[3]  
CSISZAR I, 1978, IEEE T INFORM THEORY, V24, P339, DOI 10.1109/TIT.1978.1055892
[4]   Improving Wireless Security for Bidirectional Communication Scenarios [J].
Ding, Zhiguo ;
Xu, Mai ;
Lu, Jianhua ;
Liu, Fei .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2012, 61 (06) :2842-2848
[5]   Improving Wireless Physical Layer Security via Cooperating Relays [J].
Dong, Lun ;
Han, Zhu ;
Petropulu, Athina P. ;
Poor, H. Vincent .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2010, 58 (03) :1875-1888
[6]   Artificial Noise Generation from Cooperative Relays for Everlasting Secrecy in Two-Hop Wireless Networks [J].
Goeckel, Dennis ;
Vasudevan, Sudarshan ;
Towsley, Don ;
Adams, Stephan ;
Ding, Z. ;
Leung, K. .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2011, 29 (10) :2067-2076
[7]   Guaranteeing secrecy using artificial noise [J].
Goel, Satashu ;
Negi, Rohit .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2008, 7 (06) :2180-2189
[8]   Relay Selection for Secure Cooperative Networks with Jamming [J].
Krikidis, Ioannis ;
Thompson, John S. ;
McLaughlin, Steve .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (10) :5003-5011
[9]   The relay-eavesdropper channel: Cooperation for secrecy [J].
Lai, Lifeng ;
El Gamal, Hesham .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (09) :4005-4019
[10]  
LEUNGYANCHEONG SK, 1978, IEEE T INFORM THEORY, V24, P451, DOI 10.1109/TIT.1978.1055917