Combating Malicious Eavesdropper in Wireless Full-Duplex Relay Networks: Cooperative Jamming and Power Allocation

  • Ronghua Luo
  • Jun Lei
  • Guobing Hu
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 848)


In this paper, the physical layer security in decode-and-forward wireless full-duplex relay network was investigated. In this scenario, an eavesdropper was present. For improving the physical layer security, the source and relay not only transmitted message signal but also transmitted jamming signal to interference with the untrusted eavesdropper, which needed not external friendly jammers. How to allocate the power to transmit message signal and jamming signal was a problem. Furthermore, the constrained optimization problem was formulated and the optimal power allocation solution was derived. Compared with other cooperative jamming schemes, our proposed scheme will effectively improve physical layer security of the legitimate user. And simulation results verify the properties.


Physical layer security Decode-and-forward Full-duplex Power allocation Cooperative jamming 



This work was supported by the Natural Science Foundation of Jiangsu Province (Grants No. BK20161104), The Scientific Research Fund Project of JIT (2016 incentive program, jit-2016-jlxm-24), the Doctoral Scientific Research Foundation of JIT (jit-b-201409, jit-b-201408, jit-b-201633) and Incubation Project of Science Foundation of JIT (jit-fhxm-201605).


  1. 1.
    Liang, Y., Poor, H.V., Shamai, S.P.: Information Theoretic Security. Now Publishers Inc., Delft (2009)zbMATHGoogle Scholar
  2. 2.
    Wyner, A.D.G.: The wire-tap channel. Bell Syst. Tech. J. 54, 1355–1387 (1975)MathSciNetCrossRefGoogle Scholar
  3. 3.
    Csiszar, I., Korner, J.L.: Broadcast channels with confidential messages. IEEE Trans. Inf. Theor. 24, 339–348 (1978)MathSciNetCrossRefGoogle Scholar
  4. 4.
    Zou, Y., Wang, X., Shen, W., Hanzo, L.L.: Security versus reliability analysis of opportunistic relaying. IEEE Trans. Veh. Technol. 63, 2653–2661 (2014)CrossRefGoogle Scholar
  5. 5.
    Deng, H., Wang, H., Guo, W., Wang, W.L.: Secrecy transmission with a helper: to relay or to jam. IEEE Trans. Inf. Forensics Secur. 10, 4005–4019 (2015)Google Scholar
  6. 6.
    Lv, L., Chen, J., Yang, L., Kuo, Y.: Improving physical layer security in untrusted relay networks: cooperative jamming and power allocation. IET Commun. 11, 393–399 (2017)CrossRefGoogle Scholar
  7. 7.
    Krikidis, I., Suraweera, H.A., Yuen, L.: Full-duplex relay selection for amplify-and-forward cooperative networks. IEEE Trans. Wirel. Commun. 11, 4381–4393 (2012)CrossRefGoogle Scholar
  8. 8.
    Zhang, Z., Long, K., Vasilakos, A.V., Hanzo, C.: Full-duplex wireless communications: challenges, solutions and future research directions. Proc. IEEE 104, 1369–1409 (2016)CrossRefGoogle Scholar
  9. 9.
    Zhou, W., Gao, R., Ji, X., Bao. Z.: A cooperative jamming protocol for full-duplex relaying with full-duplex receiver. In: 8th International Conference on Wireless Communications & Signal Processing, WCSP 2016, Yangzhou, China, 13–15 October 2016, pp. 1–5. IEEE Press (2016)Google Scholar
  10. 10.
    Bi, Y., Chen, H.G.: Accumulate and jam: towards secure communication via a wireless-powered full-duplex jammer. IEEE J. Sel. Top. Signal Process. 10, 1538–1550 (2016)CrossRefGoogle Scholar
  11. 11.
    Mobini, Z., Mohammadali, M., Tellambura, C.: Security enhancement of wireless networks with wireless-powered full-duplex relay and friendly jammer nodes. In: IEEE International Conference on Communications Workshops, ICC Workshops, Paris, France, 21–25 May 2017, pp. 1329–1334. IEEE Press (2017)Google Scholar
  12. 12.
    Kuhestani, A., Mohammadi, A.L.: Destination-based cooperative jamming in untrusted amplify-and-forward relay networks: resource allocation and performance study. IET Commun. 10, 17–23 (2016)CrossRefGoogle Scholar
  13. 13.
    Dong, L., Yousefi’zadeh, H., Jafarkhani, H.: Cooperative jamming and power allocation for wireless relay networks in presence of eavesdropper. In: Proceedings of the IEEE ICC, Kyoto, Japan, 5–9 June 2011, pp. 1–5. IEEE Press (2011)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  1. 1.School of Networks and Telecommunications EngineeringJinling Institute of TechnologyNanjingChina
  2. 2.Nanjing Panda Handa Technology Company LimitedNanjingChina
  3. 3.School of Electronical and Information EngineeringJinling Institute of TechnologyNanjingChina

Personalised recommendations