239 research outputs found
Secure Compute-and-Forward Transmission With Artificial Noise and Full-Duplex Devices
We consider a wiretap channel with an eavesdropper (Eve) and an honest but
curious relay (Ray). Ray and the destination (Bob) are full-duplex (FD)
devices. Since we aim at not revealing information on the secret message to the
relay, we consider the scaled compute-and-forward (SCF) where scaled lattice
coding is used in the transmission by both the source (Alice) and Bob in order
to allow Ray to decode only a linear combination of the two messages. At the
same time Ray transmits artificial noise (AN) to confuse Eve. When Ray relays
the decoded linear combination, Alice and Bob are transmitting AN against Eve.
This can be a 5G cellular communication scenario where a mobile terminal (MT)
aims at transmitting a secret message to a FD base station (BS), with the
assistance of a network FD relay. With respect to existing literature the
innovations of this paper are: a) Bob and Ray are FD devices; b) Alice, Ray and
Bob transmit also AN; and c) the channel to Eve is not known to Alice, Bob and
Ray. For this scenario we derive bounds on both the secrecy outage probability
under Rayleigh fading conditions of the channels to Eve, and the achievable
secrecy-outage rates.Comment: submitted to PIMR
Cooperative Secure Transmission by Exploiting Social Ties in Random Networks
Social awareness and social ties are becoming increasingly popular with
emerging mobile and handheld devices. Social trust degree describing the
strength of the social ties has drawn lots of research interests in many fields
in wireless communications, such as resource sharing, cooperative communication
and so on. In this paper, we propose a hybrid cooperative beamforming and
jamming scheme to secure communication based on the social trust degree under a
stochastic geometry framework. The friendly nodes are categorized into relays
and jammers according to their locations and social trust degrees with the
source node. We aim to analyze the involved connection outage probability (COP)
and secrecy outage probability (SOP) of the performance in the networks. To
achieve this target, we propose a double Gamma ratio (DGR) approach through
Gamma approximation. Based on this, the COP and SOP are tractably obtained in
closed-form. We further consider the SOP in the presence of Poisson Point
Process (PPP) distributed eavesdroppers and derive an upper bound. The
simulation results verify our theoretical findings, and validate that the
social trust degree has dramatic influences on the security performance in the
networks.Comment: 30 pages, 11 figures, to be published in IEEE Transactions on
Communication
Secure Beamforming for MIMO Two-Way Communications with an Untrusted Relay
This paper studies the secure beamforming design in a multiple-antenna
three-node system where two source nodes exchange messages with the help of an
untrusted relay node. The relay acts as both an essential signal forwarder and
a potential eavesdropper. Both two-phase and three-phase two-way relay
strategies are considered. Our goal is to jointly optimize the source and relay
beamformers for maximizing the secrecy sum rate of the two-way communications.
We first derive the optimal relay beamformer structures. Then, iterative
algorithms are proposed to find source and relay beamformers jointly based on
alternating optimization. Furthermore, we conduct asymptotic analysis on the
maximum secrecy sum-rate. Our analysis shows that when all transmit powers
approach infinity, the two-phase two-way relay scheme achieves the maximum
secrecy sum rate if the source beamformers are designed such that the received
signals at the relay align in the same direction. This reveals an important
advantage of signal alignment technique in against eavesdropping. It is also
shown that if the source powers approach zero the three-phase scheme performs
the best while the two-phase scheme is even worse than direct transmission.
Simulation results have verified the efficiency of the secure beamforming
algorithms as well as the analytical findings.Comment: 10 figures, Submitted to IEEE Transactions on Signal Processin
Security-reliability tradeoff analysis of artificial noise aided two-way opportunistic relay selection
In this paper, we investigate the physical-layer security of cooperative communications relying on multiple twoway relays using the decode-and-forward (DF) protocol in the presence of an eavesdropper, where the eavesdropper appears to tap the transmissions of both the source and of the relay. The design-tradeoff to be resolved is that the throughput is improved by invoking two-way relaying, but the secrecy of wireless transmissions may be degraded, since the eavesdropper may overhear the signals transmitted by both the source and relay nodes. We conceive an artificial noise aided two-way opportunistic relay selection (ANaTWORS) scheme for enhancing the security of the pair of source nodes communicating with the assistance of multiple two-way relays. Furthermore, we analyze both the outage probability and intercept probability of the proposed ANaTWORS scheme, where the security and reliability are characterized in terms of the intercept probability and the security outage probability. For comparison, we also provide the security-reliability tradeoff (SRT) analysis of both the traditional direct transmission and of the one-way relaying schemes. It is shown that the proposed ANaTWORS scheme outperforms both the conventional direct transmission and the one-way relay methods in terms of its SRTs. More specifically, in the low main-userto- eavesdropper ratio (MUER) region, the proposed ANaTWORS scheme is capable of guaranteeing secure transmissions, whereas no SRT gain is achieved by the conventional one-way relaying. In fact, the one-way relaying scheme may even be inferior to the traditional direct transmission scheme in terms of its SRT
A physical layer network coding based modify-and-forward with opportunistic secure cooperative transmission protocol
This paper investigates a new secure relaying scheme, namely physical layer network coding based modify-and-forward (PMF), in which a relay node linearly combines the decoded data sent by a source node with an encrypted key before conveying the mixed data to a destination node. We first derive the general expression for the generalized secrecy outage probability (GSOP) of the PMF scheme and then use it to analyse the GSOP performance of various relaying and direct transmission strategies. The GSOP performance comparison indicates that these transmission strategies offer different advantages depending on the channel conditions and target secrecy rates, and relaying is not always desirable in terms of secrecy. Subsequently, we develop an opportunistic secure transmission protocol for cooperative wireless relay networks and formulate an optimisation problem to determine secrecy rate thresholds (SRTs) to dynamically select the optimal transmission strategy for achieving the lowest GSOP. The conditions for the existence of the SRTs are derived for various channel scenarios
Joint Relay and Jammer Selection for Secure Two-Way Relay Networks
In this paper, we investigate joint relay and jammer selection in two-way
cooperative networks, consisting of two sources, a number of intermediate
nodes, and one eavesdropper, with the constraints of physical layer security.
Specifically, the proposed algorithms select two or three intermediate nodes to
enhance security against the malicious eavesdropper. The first selected node
operates in the conventional relay mode and assists the sources to deliver
their data to the corresponding destinations using an amplify-and-forward
protocol. The second and third nodes are used in different communication phases
as jammers in order to create intentional interference upon the eavesdropper
node. Firstly, we find that in a topology where the intermediate nodes are
randomly and sparsely distributed, the proposed schemes with cooperative
jamming outperform the conventional non-jamming schemes within a certain
transmitted power regime. We also find that, in the scenario in which the
intermediate nodes gather as a close cluster, the jamming schemes may be less
effective than their non-jamming counterparts. Therefore, we introduce a hybrid
scheme to switch between jamming and non-jamming modes. Simulation results
validate our theoretical analysis and show that the hybrid switching scheme
further improves the secrecy rate.Comment: 25 pages, 7 figures; IEEE Transactions on Information Forensics and
Security, 201
- …