88 research outputs found
Secure Two-Way Transmission via Wireless-Powered Untrusted Relay and External Jammer
In this paper, we propose a two-way secure communication scheme where two
transceivers exchange confidential messages via a wireless powered untrusted
amplify-and-forward (AF) relay in the presence of an external jammer. We take
into account both friendly jamming (FJ) and Gaussian noise jamming (GNJ)
scenarios. Based on the time switching (TS) architecture at the relay, the data
transmission is done in three phases. In the first phase, both the
energy-starved nodes, the untrustworthy relay and the jammer, are charged by
non-information radio frequency (RF) signals from the sources. In the second
phase, the two sources send their information signals and concurrently, the
jammer transmits artificial noise to confuse the curious relay. Finally, the
third phase is dedicated to forward a scaled version of the received signal
from the relay to the sources. For the proposed secure transmission schemes, we
derive new closed-form lower-bound expressions for the ergodic secrecy sum rate
(ESSR) in the high signal-to-noise ratio (SNR) regime. We further analyze the
asymptotic ESSR to determine the key parameters; the high SNR slope and the
high SNR power offset of the jamming based scenarios. To highlight the
performance advantage of the proposed FJ, we also examine the scenario of
without jamming (WoJ). Finally, numerical examples and discussions are provided
to acquire some engineering insights, and to demonstrate the impacts of
different system parameters on the secrecy performance of the considered
communication scenarios. The numerical results illustrate that the proposed FJ
significantly outperforms the traditional one-way communication and the
Constellation rotation approach, as well as our proposed benchmarks, the
two-way WoJ and GNJ scenarios.Comment: 14 pages, 6 figures, Submitted to IEEE Transactions on Vehicular
Technolog
Joint Relay Selection and Power Allocation in Large-Scale MIMO Systems with Untrusted Relays and Passive Eavesdroppers
In this paper, a joint relay selection and power allocation (JRP) scheme is
proposed to enhance the physical layer security of a cooperative network, where
a multiple antennas source communicates with a single-antenna destination in
presence of untrusted relays and passive eavesdroppers (Eves). The objective is
to protect the data confidentially while concurrently relying on the untrusted
relays as potential Eves to improve both the security and reliability of the
network. To realize this objective, we consider cooperative jamming performed
by the destination while JRP scheme is implemented. With the aim of maximizing
the instantaneous secrecy rate, we derive a new closed-form solution for the
optimal power allocation and propose a simple relay selection criterion under
two scenarios of non-colluding Eves (NCE) and colluding Eves (CE). For the
proposed scheme, a new closed-form expression is derived for the ergodic
secrecy rate (ESR) and the secrecy outage probability as security metrics, and
a new closed-form expression is presented for the average symbol error rate
(SER) as a reliability measure over Rayleigh fading channels. We further
explicitly characterize the high signal-to-noise ratio slope and power offset
of the ESR to highlight the impacts of system parameters on the ESR. In
addition, we examine the diversity order of the proposed scheme to reveal the
achievable secrecy performance advantage. Finally, the secrecy and reliability
diversity-multiplexing tradeoff of the optimized network are provided.
Numerical results highlight that the ESR performance of the proposed JRP scheme
for NCE and CE cases is increased with respect to the number of untrustworthy
relays.Comment: 18 pages, 10 figures, IEEE Transactions on Information Forensics and
Security (In press
Physical layer security in 5G and beyond wireless networks enabling technologies
Information security has always been a critical concern for wireless communications due
to the broadcast nature of the open wireless medium. Commonly, security relies on cryptographic
encryption techniques at higher layers to ensure information security. However,
traditional cryptographic methods may be inadequate or inappropriate due to novel improvements
in the computational power of devices and optimization approaches. Therefore,
supplementary techniques are required to secure the transmission data. Physical layer
security (PLS) can improve the security of wireless communications by exploiting the characteristics
of wireless channels. Therefore, we study the PLS performance in the fifth generation
(5G) and beyond wireless networks enabling technologies in this thesis. The thesis
consists of three main parts.
In the first part, the PLS design and analysis for Device-to-Device (D2D) communication
is carried out for several scenarios. More specifically, in this part, we study the
underlay relay-aided D2D communications to improve the PLS of the cellular network. We
propose a cooperative scheme, whereby the D2D pair, in return for being allowed to share
the spectrum band of the cellular network, serves as a friendly jammer using full-duplex
(FD) and half-duplex (HD) transmissions and relay selection to degrade the wiretapped
signal at an eavesdropper. This part aims to show that spectrum sharing is advantageous
for both D2D communications and cellular networks concerning reliability and robustness
for the former and PLS enhancement for the latter. Closed-form expressions for the D2D
outage probability, the secrecy outage probability (SOP), and the probability of non-zero
secrecy capacity (PNSC) are derived to assess the proposed cooperative system model. The
results show enhancing the robustness and reliability of D2D communication while simultaneously
improving the cellular network’s PLS by generating jamming signals towards the
eavesdropper. Furthermore, intensive Monte-Carlo simulations and numerical results are
provided to verify the efficiency of the proposed schemes and validate the derived expressions’
accuracy.
In the second part, we consider a secure underlay cognitive radio (CR) network in the
presence of a primary passive eavesdropper. Herein, a secondary multi-antenna full-duplex
destination node acts as a jammer to the primary eavesdropper to improve the PLS of the
primary network. In return for this favor, the energy-constrained secondary source gets
access to the primary network to transmit its information so long as the interference to the
latter is below a certain level. As revealed in our analysis and simulation, the reliability and
robustness of the CR network are improved, while the security level of the primary network
is enhanced concurrently.
Finally, we investigate the PLS design and analysis of reconfigurable intelligent surface
(RIS)-aided wireless communication systems in an inband underlay D2D communication
and the CR network. An RIS is used to adjust its reflecting elements to enhance the data
transmission while improving the PLS concurrently. Furthermore, we investigate the design
of active elements in RIS to overcome the double-fading problem introduced in the RISaided
link in a wireless communications system. Towards this end, each active RIS element
amplifies the reflected incident signal rather than only reflecting it as done in passive RIS
modules. As revealed in our analysis and simulation, the use of active elements leads to a
drastic reduction in the size of RIS to achieve a given performance level. Furthermore, a
practical design for active RIS is proposed
Cooperative Secure Transmission by Exploiting Social Ties in Random Networks
Social awareness and social ties are becoming increasingly popular with
emerging mobile and handheld devices. Social trust degree describing the
strength of the social ties has drawn lots of research interests in many fields
in wireless communications, such as resource sharing, cooperative communication
and so on. In this paper, we propose a hybrid cooperative beamforming and
jamming scheme to secure communication based on the social trust degree under a
stochastic geometry framework. The friendly nodes are categorized into relays
and jammers according to their locations and social trust degrees with the
source node. We aim to analyze the involved connection outage probability (COP)
and secrecy outage probability (SOP) of the performance in the networks. To
achieve this target, we propose a double Gamma ratio (DGR) approach through
Gamma approximation. Based on this, the COP and SOP are tractably obtained in
closed-form. We further consider the SOP in the presence of Poisson Point
Process (PPP) distributed eavesdroppers and derive an upper bound. The
simulation results verify our theoretical findings, and validate that the
social trust degree has dramatic influences on the security performance in the
networks.Comment: 30 pages, 11 figures, to be published in IEEE Transactions on
Communication
Improving Physical Layer Security of Cellular Networks Using Full-Duplex Jamming Relay-Aided D2D Communications
This paper investigates the physical layer security and data transmission in cellular networks with inband underlay Device-to-Device (D2D) communications, where there is no direct link between D2D users. We propose to apply full-duplex (FD) transmission and dual antenna selection at the D2D relay node. The relay node can simultaneously act as a friendly jammer to improve the secrecy performance of the cellular network while enhancing the D2D communication data transmission. This is an appealing and practical scheme where spectrum sharing is beneficial for the D2D and cellular networks in terms of reliability enhancement and security provisioning, respectively. The practical scenario, where the eavesdropper is passive, is considered. The eavesdropper uses either selection combining or maximal ratio combining to combine the wiretapped signals of the cellular network. The secrecy performance of the cellular network is analyzed, and closed-form expressions for the secrecy outage probability and the probability of non-zero secrecy capacity are derived. We show that increasing the number of FD jamming antennas enhances the secrecy performance of the cellular network. A closed-form expression of the D2D outage probability is also provided. Simulation and numerical results are provided to verify the efficiency of the proposed scheme and to validate the accuracy of the derived expressions
- …