Advertisement

Secure Cooperative Systems with Jamming and Unreliable Backhaul over Nakagami-m Fading Channels

  • Michael Stewart
  • Long D. NguyenEmail author
  • Cheng Yin
  • Emiliano Garcia-Palacios
  • Sang Q. Nguyen
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 257)

Abstract

In this paper, the secrecy performance of cooperative networks with jamming signals of eavesdroppers are studied under the impacts of unreliable backhaul networks. By proposing a two-phase transmitter/relay selection scheme, the desired signal-to-noise ratio (SNR) of relays is maximized by selected the best transmitter, meanwhile, the jamming signal-to-interference-plus-noise ratio (SINR) of the eavesdroppers is minimized by selected the best relay. The secrecy outage probability is derived in closed-form expressions by following some useful lemmas and theorems. Furthermore, the analysis of asymptotic secrecy outage probability is also performed to explicitly reveal the impacts of unreliable backhaul links on the secrecy performance. By the impact of imperfect backhaul links, the diversity gain is limited as shown in our results.

Keywords

Cooperative networks Physical layer security Secrecy performance Unreliable backhaul 

Notes

Acknowledgement

This work was supported by the Newton Prize 2017 and by a Research Environment Links grant, ID 339568416, under the Newton Programme Vietnam partnership. The grant is funded by the UK Department of Business, Energy and Industrial Strategy (BEIS) and delivered by the British Council. For further information, please visit www.newtonfund.ac.uk/

References

  1. 1.
    Bao, V.N.Q., Linh-Trung, N., Debbah, M.: Relay selection schemes for dual-hop networks under security constraints with multiple eavesdroppers. IEEE Trans. Wirel. Commun. 12(12), 6076–6085 (2013)CrossRefGoogle Scholar
  2. 2.
    Bloch, M., Barros, J., Rodrigues, M.R., McLaughlin, S.W.: Wireless information-theoretic security. IEEE Trans. Inf. Forensics Secur. 54(6), 2515–2534 (2008)MathSciNetCrossRefGoogle Scholar
  3. 3.
    Dong, L., Han, Z., Petropulu, A.P., Poor, H.V.: Improving wireless physical layer security via cooperating relays. IEEE Trans. Signal Process. 58(3), 1875–1888 (2010)MathSciNetCrossRefGoogle Scholar
  4. 4.
    Hoang, T.M., Duong, T.Q., Vo, N.S., Kundu, C.: Physical layer security in cooperative energy harvesting networks with a friendly jammer. IEEE Wirel. Commun. Lett. 6(2), 174–177 (2017)CrossRefGoogle Scholar
  5. 5.
    Khan, T.A., Orlik, P., Kim, K.J., Heath, R.W.: Performance analysis of cooperative wireless networks with unreliable backhaul links. IEEE Commun. Lett. 19(8), 1386–1389 (2015)CrossRefGoogle Scholar
  6. 6.
    Kim, K.J., Duong, T.Q., Elkashlan, M., Yeoh, P.L., Poor, H.V., Lee, M.H.: Spectrum sharing single-carrier in the presence of multiple licensed receivers. IEEE Trans. Wirel. Commun. 12(10), 5223–5235 (2013)CrossRefGoogle Scholar
  7. 7.
    Kim, K.J., Duong, T.Q., Tran, X.N.: Performance analysis of cognitive spectrum-sharing single-carrier systems with relay selection. IEEE Trans. Signal Process. 60(12), 6435–6449 (2012)MathSciNetCrossRefGoogle Scholar
  8. 8.
    Krikidis, I., Thompson, J.S., Mclaughlin, S.: Relay selection for secure cooperative networks with jamming. IEEE Trans. Wirel. Commun. 8(10), 5003–5011 (2009)CrossRefGoogle Scholar
  9. 9.
    Liu, W., Zhou, X., Durrani, S., Popovski, P.: Secure communication with a wireless-powered friendly jammer. IEEE Trans. Wirel. Commun. 15(1), 401–415 (2016)CrossRefGoogle Scholar
  10. 10.
    Nguyen, H.T., Zhang, J., Yang, N., Duong, T.Q., Hwang, W.J.: Secure cooperative single carrier systems under unreliable backhaul and dense networks impact. IEEE Access 5, 18310–18324 (2017)CrossRefGoogle Scholar
  11. 11.
    Nguyen, H.T., Duong, T.Q., Hwang, W.J.: Multiuser relay networks over unreliable backhaul links under spectrum sharing environment. IEEE Commun. Lett. 21, 1–4 (2017). Accepted and appeared on IEEE XplorerCrossRefGoogle Scholar
  12. 12.
    Nguyen, H.T., Ha, D.B., Nguyen, S.Q., Hwang, W.J.: Cognitive heterogeneous networks with unreliable backhaul connections. J. Mobile Netw. Appl. (MONET) (2017)Google Scholar
  13. 13.
    Pantisano, F., Bennis, M., Saad, W., Debbah, M., Latva-Aho, M.: On the impact of heterogeneous backhauls on coordinated multipoint transmission in femtocell networks. In: Proceedings of IEEE International Conference on Communications, Ottawa, Canada, pp. 5064–5069, June 2012Google Scholar
  14. 14.
    Rodriguez, L.J., Tran, N.H., Duong, T.Q., Le-Ngoc, T., Elkashlan, M., Shetty, S.: Physical layer security in wireless cooperative relay networks: state of the art and beyond. IEEE Commun. Mag. 53(12), 32–39 (2015)CrossRefGoogle Scholar
  15. 15.
    Shafie, A.E., Duong, T.Q., Al-Dhahir, N.: QoS-aware enhanced-security for TDMA transmissions from buffered source nodes. IEEE Trans. Wirel. Commun. 16(2), 1051–1065 (2017)CrossRefGoogle Scholar
  16. 16.
    Simeone, O., Somekh, O., Erkip, E., Poor, H.V., Shitz, S.S.: Robust communication via decentralized processing with unreliable backhaul links. IEEE Trans. Inf. Theory 57(7), 4187–4201 (2011)MathSciNetCrossRefGoogle Scholar
  17. 17.
    Wang, L., Kim, K.J., Duong, T.Q., Elkashlan, M., Poor, H.V.: Security enhancement of cooperative single carrier systems. IEEE Trans. Inf. Forensics Secur. 10(1), 90–103 (2015)CrossRefGoogle Scholar
  18. 18.
    Yang, J., Kim, I.M., Kim, D.I.: Optimal cooperative jamming for multiuser broadcast channel with multiple eavesdroppers. IEEE Trans. Wirel. Commun. 12(6), 2840–2852 (2013)MathSciNetCrossRefGoogle Scholar
  19. 19.
    Yang, N., Suraweera, H.A., Collings, I.B., Yuen, C.: Physical layer security of TAS/MRC with antenna correlation. IEEE Trans. Inf. Forensics Secur. 8(1), 254–259 (2013)CrossRefGoogle Scholar
  20. 20.
    Yin, C., Nguyen, H.T., Kundu, C., Kaleem, Z., Garcia-Palacios, E., Duong, T.Q.: Secure energy harvesting relay networks with unreliable backhaul connections. IEEE Access 6, 12074–12084 (2018)CrossRefGoogle Scholar

Copyright information

© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2019

Authors and Affiliations

  • Michael Stewart
    • 1
  • Long D. Nguyen
    • 1
    Email author
  • Cheng Yin
    • 1
  • Emiliano Garcia-Palacios
    • 1
  • Sang Q. Nguyen
    • 2
  1. 1.School of Electronics, Electrical Engineering and Computer ScienceQueen’s University BelfastBelfastUK
  2. 2.Faculty of Information TechnologyDuy Tan UniversityDa NangVietnam

Personalised recommendations