Abstract
This chapter investigates the physical-layer security for a cooperative wireless network, where a source node transmits to its destination with the aid of multiple intermediate nodes in the face of an eavesdropper. We propose a joint relay and jammer selection scheme for protecting the source-destination transmission against the eavesdropper. To be specific, among the multiple intermediate nodes, one node is first selected to act as the relay for assisting the transmission from the source to destination and meanwhile, another node is chosen as the jammer that is employed to transmit an artificial noise for interfering with the eavesdropper. Also, we consider the conventional pure relay selection and pure jammer selection as benchmark schemes. In the pure relay selection scheme, an intermediate node is selected as the relay to assist the source-destination transmission. By contrast, the pure jammer selection allows an intermediate node to act the jammer for confusing the eavesdropper. We derive the closed-form intercept probability expressions for the proposed joint relay and jammer selection as well as the conventional pure relay selection and pure jammer selection schemes. Numerical results demonstrate that the joint relay and jammer selection outperforms the pure relay selection and pure jammer selection methods in terms of the intercept probability, showing the security benefit of employing the proposed scheme to protect the wireless communications against eavesdropping.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
S. Goel and R. Negi, “Guaranteeing secrecy using artificial noise,” IEEE Trans. Wirel. Commun., vol. 7, no. 6, pp. 2180–2189, Jul. 2008.
D. Goeckel, et al., “Artificial noise generation from cooperative relays for everlasting secrecy in two-hop wireless networks,” IEEE J Sel. Areas Commun., vol. 29, no. 10, pp. 2067–2076, Oct. 2011.
A. Khisti and D. Zhang, “Artificial-noise alignment for secure multicast using multiple antennas,” IEEE Commun. Lett., vol. 17, no. 8, pp. 1568–1571, Aug. 2013.
X. Zhou and M. McKay, “Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation,” IEEE Trans. Veh. Tech., vol. 59, no. 8, pp. 3831–3842, Aug. 2010.
N. Romero-Zurita, M. Ghogho, and D. McLernon, “Outage probability based power distribution between data and artificial noise for physical layer security,” IEEE Signal Process. Lett., vol. 19, no. 2, pp. 71–74, Feb. 2012.
Y. Yang, et al., “Transmitter beamforming and artificial noise with delayed feedback: Secrecy rate and power allocation,” J. Commun. and Net., vol. 14, no. 4, pp. 374–384, Aug. 2012.
I. Krikidis, J. S. Thompson, and S. McLaughlin, “Relay selection for secure cooperative networks with jamming,” IEEE Trans. Wireless Commun., vol. 8, no. 10, pp. 5003–5011, Oct. 2009.
J. Chen, et al., “Joint relay and jammer selection for secure two-way relay networks,” in Proc. 2011 IEEE Intern. Commun., Kyoto Japan, Jun. 2011.
J. Chen, et al., “Joint relay and jammer selection for secure two-way relay networks,” IEEE Trans. Inf. Foren. Sec., vol. 7, no. 1, pp. 310–320, Feb. 2012.
R. Zhang, et al., “Physical layer security for two-way untrusted relaying with friendly jammers,” IEEE Trans. Veh. Tech., vol. 61, no. 8, pp. 3693–3704, Aug. 2012.
O. Edfors, et al., “OFDM channel estimation by singular value decomposition,” IEEE Trans. Commun., vol. 46, no. 7, pp. 931–939, Jul. 1998.
S. Coleri, et al., “Channel estimation techniques based on pilot arrangement in OFDM systems,” IEEE Trans. Broadcasting, vol. 48, no. 3, pp. 223–229, Mar. 2002.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Zou, Y., Zhu, J. (2016). Joint Relay and Jammer Selection for Wireless Physical-Layer Security. In: Physical-Layer Security for Cooperative Relay Networks . Wireless Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-31174-6_3
Download citation
DOI: https://doi.org/10.1007/978-3-319-31174-6_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-31173-9
Online ISBN: 978-3-319-31174-6
eBook Packages: Computer ScienceComputer Science (R0)