Skip to main content
Erschienen in: Wireless Personal Communications 3/2017

03.02.2017

Improving the Physical Layer Security in Cooperative Networks with Multiple Eavesdroppers

verfasst von: Fatemeh-Sadat Saeidi-Khabisi, Vahid Tabataba Vakili, Dariush Abbasi-Moghadam

Erschienen in: Wireless Personal Communications | Ausgabe 3/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Physical layer security is an efficient technique to realize security in wireless network without relying on conventional cryptographic techniques. In cooperative networks with secrecy constraints, joint relay and jammer selection is a promising approach for improving the security of wireless communications. We need to apply more techniques in order to achieve more effective security in contrast to the mentioned method. In this paper, we propose three techniques to increase the secrecy as follows: Firstly, we introduce a new criterion which decreases the rate at the eavesdroppers. Next, a new relay selection schemes are proposed, where two of the available relays are selected for data transmission. Therefore, the secrecy rate is increased considerably. Finally, we propose a sub-optimal power allocation solution for jammer nodes. Sub-optimal power of the jammer nodes vary according to the type of scenario, location of the eavesdroppers, and the destination. The sub-optimal power allocation to the jammer nodes causes more eavesdroppers confusion. As a result, the total secrecy rate is increased. Simulation and analytical results demonstrate the performance improvement of the proposed techniques.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Silva, E., Dos Santos, A., Albini, L. C. P., & Lima, M. N. (2008). Identity-based key management in mobile ad hoc networks: techniques and applications. IEEE Wireless Communications, 15(5), 46–52.CrossRef Silva, E., Dos Santos, A., Albini, L. C. P., & Lima, M. N. (2008). Identity-based key management in mobile ad hoc networks: techniques and applications. IEEE Wireless Communications, 15(5), 46–52.CrossRef
2.
Zurück zum Zitat Barros, J., & Rodrigues, M. R. (2006). Secrecy capacity of wireless channels. In 2006 IEEE International Symposium on Information Theory (pp. 356–360). IEEE. Barros, J., & Rodrigues, M. R. (2006). Secrecy capacity of wireless channels. In 2006 IEEE International Symposium on Information Theory (pp. 356–360). IEEE.
3.
Zurück zum Zitat Bloch, M., Barros, J., Rodrigues, M. R., & McLaughlin, S. W. (2008). Wireless information-theoretic security. IEEE Transactions on Information Theory, 54(6), 2515–2534.MathSciNetCrossRefMATH Bloch, M., Barros, J., Rodrigues, M. R., & McLaughlin, S. W. (2008). Wireless information-theoretic security. IEEE Transactions on Information Theory, 54(6), 2515–2534.MathSciNetCrossRefMATH
4.
Zurück zum Zitat Liu, R., Maric, I., Spasojevic, P., & Yates, R. D. (2008). Discrete memoryless interference and broadcast channels with confidential messages: Secrecy rate regions. IEEE Transactions on Information Theory, 54(6), 2493–2507.MathSciNetCrossRefMATH Liu, R., Maric, I., Spasojevic, P., & Yates, R. D. (2008). Discrete memoryless interference and broadcast channels with confidential messages: Secrecy rate regions. IEEE Transactions on Information Theory, 54(6), 2493–2507.MathSciNetCrossRefMATH
5.
Zurück zum Zitat Csiszár, I., & Korner, J. (1978). Broadcast channels with confidential messages. IEEE Transactions on Information Theory, 24(3), 339–348.MathSciNetCrossRefMATH Csiszár, I., & Korner, J. (1978). Broadcast channels with confidential messages. IEEE Transactions on Information Theory, 24(3), 339–348.MathSciNetCrossRefMATH
7.
Zurück zum Zitat Vicario, J. L., Bel, A., Lopez-Salcedo, J. A., & Seco, G. (2009). Opportunistic relay selection with outdated CSI: Outage probability and diversity analysis. IEEE Transactions on Wireless Communications, 8(6), 2872–2876.CrossRef Vicario, J. L., Bel, A., Lopez-Salcedo, J. A., & Seco, G. (2009). Opportunistic relay selection with outdated CSI: Outage probability and diversity analysis. IEEE Transactions on Wireless Communications, 8(6), 2872–2876.CrossRef
8.
Zurück zum Zitat Zhang, W., Duan, D., & Yang, L. (2009). Relay selection from a battery energy efficiency perspective. In Military Communications Conference, MILCOM 2009, IEEE (pp. 1–7). IEEE. Zhang, W., Duan, D., & Yang, L. (2009). Relay selection from a battery energy efficiency perspective. In Military Communications Conference, MILCOM 2009, IEEE (pp. 1–7). IEEE.
9.
Zurück zum Zitat Seyfi, M., Muhaidat, S., & Liang, J. (2011). Performance analysis of relay selection with feedback delay and channel estimation errors. IEEE Signal Processing Letters, 18(1), 67–70.CrossRefMATH Seyfi, M., Muhaidat, S., & Liang, J. (2011). Performance analysis of relay selection with feedback delay and channel estimation errors. IEEE Signal Processing Letters, 18(1), 67–70.CrossRefMATH
10.
Zurück zum Zitat Krikidis, I., Thompson, J., McLaughlin, S., & Goertz, N. (2008). Amplify-and-forward with partial relay selection. IEEE Communications Letters, 12(4), 235–237.CrossRef Krikidis, I., Thompson, J., McLaughlin, S., & Goertz, N. (2008). Amplify-and-forward with partial relay selection. IEEE Communications Letters, 12(4), 235–237.CrossRef
11.
Zurück zum Zitat Bletsas, A., Shin, H., & Win, M. Z. (2007). Outage analysis for co-operative communication with multiple amplify-and-forward relays. Electronics Letters, 43(6), 353–355.CrossRef Bletsas, A., Shin, H., & Win, M. Z. (2007). Outage analysis for co-operative communication with multiple amplify-and-forward relays. Electronics Letters, 43(6), 353–355.CrossRef
12.
Zurück zum Zitat Kim, J., Ikhlef, A., & Schober, R. (2012). Combined relay selection and cooperative beamforming for physical layer security. Journal of Communications and Networks, 14(4), 364–373.CrossRef Kim, J., Ikhlef, A., & Schober, R. (2012). Combined relay selection and cooperative beamforming for physical layer security. Journal of Communications and Networks, 14(4), 364–373.CrossRef
13.
Zurück zum Zitat Liu, Y., & Petropulu, A. P. (2012). Relay selection and scaling law in destination assisted physical layer secrecy systems. In Statistical Signal Processing Workshop (SSP), IEEE (pp. 381–384). IEEE. Liu, Y., & Petropulu, A. P. (2012). Relay selection and scaling law in destination assisted physical layer secrecy systems. In Statistical Signal Processing Workshop (SSP), IEEE (pp. 381–384). IEEE.
14.
Zurück zum Zitat Wang, L., Ke, T., Song, M., Wei, Y., & Teng, Y. (2011). Research on secrecy capacity oriented relay selection for mobile cooperative networks. In 2011 IEEE International Conference on Cloud Computing and Intelligence Systems (CCIS) (pp. 443–447). IEEE. Wang, L., Ke, T., Song, M., Wei, Y., & Teng, Y. (2011). Research on secrecy capacity oriented relay selection for mobile cooperative networks. In 2011 IEEE International Conference on Cloud Computing and Intelligence Systems (CCIS) (pp. 443–447). IEEE.
15.
Zurück zum Zitat Cai, C., Cai, Y., & Yang, W. (2011). Secrecy rates for relay selection in OFDMA networks. In CMC (pp. 158–160). Cai, C., Cai, Y., & Yang, W. (2011). Secrecy rates for relay selection in OFDMA networks. In CMC (pp. 158–160).
16.
Zurück zum Zitat Yan, S., Mugen, P., Wenbo, W., Dong, L., & Manzoor, A. (2012). Relay self-selection for secure cooperative in amplify-and-forward netowrks. In Proceedings of the 7th International Conference on Communications and Networking in China (CHINACOM’12) (pp. 581–585). Yan, S., Mugen, P., Wenbo, W., Dong, L., & Manzoor, A. (2012). Relay self-selection for secure cooperative in amplify-and-forward netowrks. In Proceedings of the 7th International Conference on Communications and Networking in China (CHINACOM’12) (pp. 581–585).
17.
Zurück zum Zitat Sakran, H., Shokair, M., Nasr, O., El-Rabaie, S., & El-Azm, A. A. (2012). Proposed relay selection scheme for physical layer security in cognitive radio networks. IET Communications, 6(16), 2676–2687.MathSciNetCrossRef Sakran, H., Shokair, M., Nasr, O., El-Rabaie, S., & El-Azm, A. A. (2012). Proposed relay selection scheme for physical layer security in cognitive radio networks. IET Communications, 6(16), 2676–2687.MathSciNetCrossRef
18.
Zurück zum Zitat Luo, S., Godrich, H., Petropulu, A., & Poor, H. V. (2011). A knapsack problem formulation for relay selection in secure cooperative wireless communication. In 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (pp. 2512–2515). IEEE. Luo, S., Godrich, H., Petropulu, A., & Poor, H. V. (2011). A knapsack problem formulation for relay selection in secure cooperative wireless communication. In 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (pp. 2512–2515). IEEE.
19.
Zurück zum Zitat Bassily, R., & Ulukus, S. (2013). Deaf cooperation and relay selection strategies for secure communication in multiple relay networks. IEEE Transactions on Signal Processing, 61(6), 1544–1554.MathSciNetCrossRef Bassily, R., & Ulukus, S. (2013). Deaf cooperation and relay selection strategies for secure communication in multiple relay networks. IEEE Transactions on Signal Processing, 61(6), 1544–1554.MathSciNetCrossRef
20.
Zurück zum Zitat Krikidis, I., Thompson, J. S., & McLaughlin, S. (2009). Relay selection for secure cooperative networks with jamming. IEEE Transactions on Wireless Communications, 8(10), 5003–5011.CrossRef Krikidis, I., Thompson, J. S., & McLaughlin, S. (2009). Relay selection for secure cooperative networks with jamming. IEEE Transactions on Wireless Communications, 8(10), 5003–5011.CrossRef
21.
Zurück zum Zitat Krikidis, I. (2010). Opportunistic relay selection for cooperative networks with secrecy constraints. IET Communications, 4(15), 1787–1791.CrossRef Krikidis, I. (2010). Opportunistic relay selection for cooperative networks with secrecy constraints. IET Communications, 4(15), 1787–1791.CrossRef
22.
Zurück zum Zitat Al-nahari, A. Y., Krikidis, I., Ibrahim, A. S., Dessouky, M. I., & Abd El-Samie, F. E. (2014). Relaying techniques for enhancing the physical layer secrecy in cooperative networks with multiple eavesdroppers. Transactions on Emerging Telecommunications Technologies, 25(4), 445–460.CrossRef Al-nahari, A. Y., Krikidis, I., Ibrahim, A. S., Dessouky, M. I., & Abd El-Samie, F. E. (2014). Relaying techniques for enhancing the physical layer secrecy in cooperative networks with multiple eavesdroppers. Transactions on Emerging Telecommunications Technologies, 25(4), 445–460.CrossRef
23.
Zurück zum Zitat Li, J., Petropulu, A. P., & Weber, S. (2010). Optimal cooperative relaying schemes for improving wireless physical layer security. arXiv preprint arXiv:1001.1389. Li, J., Petropulu, A. P., & Weber, S. (2010). Optimal cooperative relaying schemes for improving wireless physical layer security. arXiv preprint arXiv:​1001.​1389.
24.
Zurück zum Zitat Lai, L., & El Gamal, H. (2008). The relay–eavesdropper channel: Cooperation for secrecy. IEEE Transactions on Information Theory, 54(9), 4005–4019.MathSciNetCrossRefMATH Lai, L., & El Gamal, H. (2008). The relay–eavesdropper channel: Cooperation for secrecy. IEEE Transactions on Information Theory, 54(9), 4005–4019.MathSciNetCrossRefMATH
Metadaten
Titel
Improving the Physical Layer Security in Cooperative Networks with Multiple Eavesdroppers
verfasst von
Fatemeh-Sadat Saeidi-Khabisi
Vahid Tabataba Vakili
Dariush Abbasi-Moghadam
Publikationsdatum
03.02.2017
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 3/2017
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-017-3998-5

Weitere Artikel der Ausgabe 3/2017

Wireless Personal Communications 3/2017 Zur Ausgabe

Neuer Inhalt