Improving the Physical Layer Security in Cooperative Networks with Multiple Eavesdroppers
Physical layer security is an efficient technique to realize security in wireless network without relying on conventional cryptographic techniques. In cooperative networks with secrecy constraints, joint relay and jammer selection is a promising approach for improving the security of wireless communications. We need to apply more techniques in order to achieve more effective security in contrast to the mentioned method. In this paper, we propose three techniques to increase the secrecy as follows: Firstly, we introduce a new criterion which decreases the rate at the eavesdroppers. Next, a new relay selection schemes are proposed, where two of the available relays are selected for data transmission. Therefore, the secrecy rate is increased considerably. Finally, we propose a sub-optimal power allocation solution for jammer nodes. Sub-optimal power of the jammer nodes vary according to the type of scenario, location of the eavesdroppers, and the destination. The sub-optimal power allocation to the jammer nodes causes more eavesdroppers confusion. As a result, the total secrecy rate is increased. Simulation and analytical results demonstrate the performance improvement of the proposed techniques.
KeywordsPhysical layer security Multi-eavesdropper networks Cooperative jamming Improving the rate at the eavesdropper Increasing the number of relays Power allocation
- 2.Barros, J., & Rodrigues, M. R. (2006). Secrecy capacity of wireless channels. In 2006 IEEE International Symposium on Information Theory (pp. 356–360). IEEE.Google Scholar
- 8.Zhang, W., Duan, D., & Yang, L. (2009). Relay selection from a battery energy efficiency perspective. In Military Communications Conference, MILCOM 2009, IEEE (pp. 1–7). IEEE.Google Scholar
- 13.Liu, Y., & Petropulu, A. P. (2012). Relay selection and scaling law in destination assisted physical layer secrecy systems. In Statistical Signal Processing Workshop (SSP), IEEE (pp. 381–384). IEEE.Google Scholar
- 14.Wang, L., Ke, T., Song, M., Wei, Y., & Teng, Y. (2011). Research on secrecy capacity oriented relay selection for mobile cooperative networks. In 2011 IEEE International Conference on Cloud Computing and Intelligence Systems (CCIS) (pp. 443–447). IEEE.Google Scholar
- 15.Cai, C., Cai, Y., & Yang, W. (2011). Secrecy rates for relay selection in OFDMA networks. In CMC (pp. 158–160).Google Scholar
- 16.Yan, S., Mugen, P., Wenbo, W., Dong, L., & Manzoor, A. (2012). Relay self-selection for secure cooperative in amplify-and-forward netowrks. In Proceedings of the 7th International Conference on Communications and Networking in China (CHINACOM’12) (pp. 581–585).Google Scholar
- 18.Luo, S., Godrich, H., Petropulu, A., & Poor, H. V. (2011). A knapsack problem formulation for relay selection in secure cooperative wireless communication. In 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (pp. 2512–2515). IEEE.Google Scholar
- 22.Al-nahari, A. Y., Krikidis, I., Ibrahim, A. S., Dessouky, M. I., & Abd El-Samie, F. E. (2014). Relaying techniques for enhancing the physical layer secrecy in cooperative networks with multiple eavesdroppers. Transactions on Emerging Telecommunications Technologies, 25(4), 445–460.CrossRefGoogle Scholar
- 23.Li, J., Petropulu, A. P., & Weber, S. (2010). Optimal cooperative relaying schemes for improving wireless physical layer security. arXiv preprint arXiv:1001.1389.