Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Secrecy Transmission With a Helper: To Relay or to Jam

Published: 01 February 2015 Publication History

Abstract

In this paper, we consider the problem of secure communications for a four-node system consisting of one source, one destination, one eavesdropper, and one helper. We investigate the question of which role should the helper act to improve the secrecy, to jam, or to relay. Two transmission schemes are investigated: (1) direct transmission scheme (DTS) with jamming and (2) relay transmission scheme (RTS). We consider both the path-loss and fading-in channel models and define a notion of distance normalized signal-to-noise-ratio (DN-SNR) to account for propagation. The ergodic secrecy rate (ESR) is adopted as the performance metric and semi-closed-form expressions of ESR for the two schemes are derived. Additionally, optimal power allocations in both low and high DN-SNR regimes are characterized analytically. We give the performance comparison of the two schemes from the perspective of energy efficiency in the low DN-SNR regime, and characterize the secrecy degree of freedom in the high DN-SNR regime. In the high DN-SNR regime, DTS provides higher secrecy rate compared with RTS, while in the low DN-SNR regime, RTS outperforms DTS. Furthermore, we show that eavesdropper's position impacts greatly on security.

References

[1]
C. E. Shannon, “Communication theory of secrecy systems,” Bell Syst. Tech. J., vol. 28, no. 4, pp. 656–715, Oct. 1949.
[2]
A. D. Wyner, “The wire-tap channel,” Bell Syst. Tech. J., vol. 54, no. 1, pp. 1355–1387, 1975.
[3]
M. Bloch, J. Barros, M. R. D. Rodriques, and S. W. McLaughlin, “Wireless information-theoretic security,” IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515–2534, Jun. 2008.
[4]
L. Lai and H. El Gamal, “The relay–eavesdropper channel: Cooperation for secrecy,” IEEE Trans. Inf. Theory, vol. 54, no. 9, pp. 4005–4019, Sep. 2008.
[5]
J. Mo, M. Tao, and Y. Liu, “Relay placement for physical layer security: A secure connection perspective,” IEEE Commun. Lett., vol. 16, no. 6, pp. 878–881, Jun. 2012.
[6]
L. Dong, H. Yousefi’zadeh, and H. Jafarkhani, “Cooperative jamming and power allocation for wireless relay networks in presence of eavesdropper,” in Proc. IEEE Int. Commun. Conf. (ICC), Kyoto, Japan, Jun. 2011, pp. 1–5.
[7]
F. Gabry, R. Thobaben, and M. Skoglund, “Outage performances for amplify-and-forward, decode-and-forward and cooperative jamming strategies for the wiretap channel,” in Proc. IEEE Wireless Commun. Netw. Conf. (WCNC), Cancun, Mexico, Mar. 2011, pp. 1328–1333.
[8]
X. Tang, R. Liu, P. Spasojevic, and H. V. Poor, “Interference assisted secret communication,” IEEE Trans. Inf. Theory, vol. 57, no. 5, pp. 3153–3167, May 2011.
[9]
S. Goel and R. Negi, “Guaranteeing secrecy using artificial noise,” IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180–2189, Jun. 2008.
[10]
K.-H. Park, T. Wang, and M.-S. Alouini, “On the jamming power allocation for secure amplify-and-forward relaying via cooperative jamming,” IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 1741–1750, Sep. 2013.
[11]
L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, “Improving wireless physical layer security via cooperating relays,” IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875–1888, Mar. 2010.
[12]
H.-M. Wang, Q. Yin, and X.-G. Xia, “Distributed beamforming for physical-layer security of two-way relay networks,” IEEE Trans. Signal Process., vol. 60, no. 7, pp. 3532–3545, Jul. 2012.
[13]
I. Krikidis, J. S. Thompson, and S. Mclaughlin, “Relay selection for secure cooperative networks with jamming,” IEEE Trans. Wireless Commun., vol. 8, no. 10, pp. 5003–5011, Oct. 2009.
[14]
G. Zheng, L.-C. Choo, and K.-K. Wong, “Optimal cooperative jamming to enhance physical layer security using relays,” IEEE Trans. Signal Process., vol. 59, no. 3, pp. 1317–1322, Mar. 2011.
[15]
J. Huang and A. L. Swindlehurst, “Cooperative jamming for secure communications in MIMO relay networks,” IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4871–4884, Oct. 2011.
[16]
Z. Ding, K. K. Leung, D. L. Goeckel, and D. Towsley, “Opportunistic relaying for secrecy communications: Cooperative jamming vs. relay chatting,” IEEE Trans. Wireless Commun., vol. 10, no. 6, pp. 1725–1729, Jun. 2011.
[17]
H.-M. Wang, M. Luo, Q. Yin, and X.-G. Xia, “Hybrid cooperative beamforming and jamming for physical-layer security of two-way relay networks,” IEEE Trans. Inf. Forensics Security, vol. 8, no. 12, pp. 2007–2020, Dec. 2013.
[18]
H.-M. Wang, M. Luo, X.-G. Xia, and Q. Yin, “Joint cooperative beamforming and jamming to secure AF relay systems with individual power constraint and no eavesdropper’s CSI,” IEEE Signal Process. Lett., vol. 20, no. 1, pp. 39–42, Jan. 2013.
[19]
Y. Liu, J. Li, and A. P. Petropulu, “Destination assisted cooperative jamming for wireless physical-layer security,” IEEE Trans. Inf. Forensics Security, vol. 8, no. 4, pp. 682–694, Apr. 2013.
[20]
X. Zhou and M. R. McKay, “Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation,” IEEE Trans. Veh. Technol., vol. 59, no. 8, pp. 3831–3842, Oct. 2010.
[21]
H.-M. Wang, F. Liu, and X.-G. Xia, “Joint source-relay precoding and power allocation for secure amplify-and-forward MIMO relay networks,” IEEE Trans. Inf. Forensics Security, vol. 9, no. 8, pp. 1240–1250, Aug. 2014.
[22]
H. Deng, H.-M. Wang, W. Wang, and Q. Yin, “Secrecy transmission with a helper: To relay or not to relay,” in Proc. IEEE Int. Conf. Commun. Workshops (ICC), Sydney, Australia, Jun. 2014, pp. 825–830.
[23]
L. Tang, X. Gong, J. Wu, and J. Zhang, “Secure wireless communications via cooperative relaying and jamming,” in Proc. IEEE GLOBECOM Workshops (GC Wkshps), Houston, TX, USA, Dec. 2011, pp. 849–853.
[24]
C. Cai, Y. Cai, X. Zhou, W. Yang, and W. Yang, “When does relay transmission give a more secure connection in wireless ad hoc networks?” IEEE Trans. Inf. Forensics Security, vol. 9, no. 4, pp. 624–632, Apr. 2014.
[25]
N. Marina, R. Bose, and A. Hjørungnes, “Increasing the secrecy capacity by cooperation in wireless networks,” in Proc. IEEE 20th Int. Symp. Personal, Indoor Mobile Radio Commun. (PIMRC), Tokyo, Japan, Sep. 2009, pp. 1978–1982.
[26]
J. P. Vilela, M. Bloch, J. Barros, and S. W. McLaughlin, “Wireless secrecy regions with friendly jamming,” IEEE Trans. Inf. Forensics Security, vol. 6, no. 2, pp. 256–266, Jun. 2011.
[27]
N. Chang, C.-B. Chae, J. Ha, and J. Kang, “Secrecy rate for MISO Rayleigh fading channels with relative distance of eavesdropper,” IEEE Commun. Lett., vol. 16, no. 9, pp. 1408–1411, Sep. 2012.
[28]
T.-X. Zheng, H.-M. Wang, and Q. Yin, “On transmission secrecy outage of a multi-antenna system with randomly located eavesdroppers,” IEEE Commun. Lett., vol. 18, no. 8, pp. 1299–1302, Aug. 2014.
[29]
R. Zhang, L. Song, Z. Han, and B. Jiao, “Physical layer security for two-way untrusted relaying with friendly jammers,” IEEE Trans. Veh. Technol., vol. 61, no. 8, pp. 3693–3704, Oct. 2012.
[30]
P. K. Gopala, L. Lai, and H. El Gamal, “On the secrecy capacity of fading channels,” IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687–4698, Oct. 2008.
[31]
J. Li and A. P. Petropulu, “On ergodic secrecy rate for Gaussian MISO wiretap channels,” IEEE Trans. Wireless Commun., vol. 10, no. 4, pp. 1176–1187, Apr. 2011.
[32]
S.-C. Lin, T.-H. Chang, Y.-L. Liang, Y. P. Hong, and C.-Y. Chi, “On the impact of quantized channel feedback in guaranteeing secrecy with artificial noise: The noise leakage problem,” IEEE Trans. Wireless Commun., vol. 10, no. 3, pp. 901–915, Mar. 2011.
[33]
M. Pei, A. L. Swindlehurst, D. Ma, and J. Wei, “Adaptive limited feedback for MISO wiretap channels with cooperative jamming,” IEEE Trans. Signal Process., vol. 62, no. 4, pp. 993–1004, Feb. 2014.
[34]
Y. Liang, H. V. Poor, and S. Shamai, “Information theoretic security,” Found. Trends Commun. Inf. Theory, vol. 5, nos. 4–5, pp. 355–580, 2009.
[35]
M. Yuksel and E. Erkip, “Secure communication with a relay helping the wire-tapper,” in Proc. IEEE Inf. Theory Workshop, Lake Tahoe, CA, USA, Sep. 2007, pp. 595–600.
[36]
A. L. Moustakas and S. H. Simon, “Optimizing multiple-input single-output (MISO) communication systems with general Gaussian channels: Nontrivial covariance and nonzero mean,” IEEE Trans. Inf. Theory, vol. 49, no. 10, pp. 2770–2780, Oct. 2003.
[37]
J. Spanier and K. B. Oldham, “The exponential integral Ei $(x)$ and related functions,” in An Atlas of Functions. Washington, DC, USA: Hemisphere, 1987, ch. 37.
[38]
S. Verdu, “Spectral efficiency in the wideband regime,” IEEE Trans. Inf. Theory, vol. 48, no. 6, pp. 1319–1343, Jun. 2002.
[39]
M. C. Gursoy, “Secure communication in the low-SNR regime,” IEEE Trans. Commun., vol. 60, no. 4, pp. 1114–1123, Apr. 2012.
[40]
O. O. Koyluoglu, H. El Gamal, L. Lai, and H. V. Poor, “Interference alignment for secrecy,” IEEE Trans. Inf. Theory, vol. 57, no. 6, pp. 3323–3332, Jun. 2011.

Cited By

View all
  • (2024)Reinforcement learning-based secure joint relay and jammer selection in dual-hop wireless networksThe Journal of Supercomputing10.1007/s11227-023-05575-880:2(2660-2680)Online publication date: 1-Jan-2024
  • (2022)Virtual full-duplex buffer-aided relay selection schemes for secure cooperative wireless networksEURASIP Journal on Wireless Communications and Networking10.1186/s13638-022-02127-12022:1Online publication date: 12-May-2022
  • (2022)Cooperative communication design of physical layer security enhancement with social ties in random networksAd Hoc Networks10.1016/j.adhoc.2022.102822130:COnline publication date: 1-May-2022
  • Show More Cited By

Index Terms

  1. Secrecy Transmission With a Helper: To Relay or to Jam
            Index terms have been assigned to the content through auto-classification.

            Recommendations

            Comments

            Information & Contributors

            Information

            Published In

            cover image IEEE Transactions on Information Forensics and Security
            IEEE Transactions on Information Forensics and Security  Volume 10, Issue 2
            Feb. 2015
            217 pages

            Publisher

            IEEE Press

            Publication History

            Published: 01 February 2015

            Author Tags

            1. power allocation
            2. Physical layer security
            3. ergodic secrecy rate
            4. cooperative jamming

            Qualifiers

            • Research-article

            Contributors

            Other Metrics

            Bibliometrics & Citations

            Bibliometrics

            Article Metrics

            • Downloads (Last 12 months)0
            • Downloads (Last 6 weeks)0
            Reflects downloads up to 29 Jan 2025

            Other Metrics

            Citations

            Cited By

            View all
            • (2024)Reinforcement learning-based secure joint relay and jammer selection in dual-hop wireless networksThe Journal of Supercomputing10.1007/s11227-023-05575-880:2(2660-2680)Online publication date: 1-Jan-2024
            • (2022)Virtual full-duplex buffer-aided relay selection schemes for secure cooperative wireless networksEURASIP Journal on Wireless Communications and Networking10.1186/s13638-022-02127-12022:1Online publication date: 12-May-2022
            • (2022)Cooperative communication design of physical layer security enhancement with social ties in random networksAd Hoc Networks10.1016/j.adhoc.2022.102822130:COnline publication date: 1-May-2022
            • (2021)Machine learning-based physical layer security: techniques, open challenges, and applicationsWireless Networks10.1007/s11276-021-02781-127:8(5351-5383)Online publication date: 1-Nov-2021
            • (2019)Subcarrier pairing as channel gain tailoringPhysical Communication10.1016/j.phycom.2018.11.01532:C(217-230)Online publication date: 1-Feb-2019

            View Options

            View options

            Figures

            Tables

            Media

            Share

            Share

            Share this Publication link

            Share on social media