Skip to main content

Joint Relay and Jammer Selection for Wireless Physical-Layer Security

  • Chapter
  • First Online:
Physical-Layer Security for Cooperative Relay Networks

Part of the book series: Wireless Networks ((WN))

Abstract

This chapter investigates the physical-layer security for a cooperative wireless network, where a source node transmits to its destination with the aid of multiple intermediate nodes in the face of an eavesdropper. We propose a joint relay and jammer selection scheme for protecting the source-destination transmission against the eavesdropper. To be specific, among the multiple intermediate nodes, one node is first selected to act as the relay for assisting the transmission from the source to destination and meanwhile, another node is chosen as the jammer that is employed to transmit an artificial noise for interfering with the eavesdropper. Also, we consider the conventional pure relay selection and pure jammer selection as benchmark schemes. In the pure relay selection scheme, an intermediate node is selected as the relay to assist the source-destination transmission. By contrast, the pure jammer selection allows an intermediate node to act the jammer for confusing the eavesdropper. We derive the closed-form intercept probability expressions for the proposed joint relay and jammer selection as well as the conventional pure relay selection and pure jammer selection schemes. Numerical results demonstrate that the joint relay and jammer selection outperforms the pure relay selection and pure jammer selection methods in terms of the intercept probability, showing the security benefit of employing the proposed scheme to protect the wireless communications against eavesdropping.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. S. Goel and R. Negi, “Guaranteeing secrecy using artificial noise,” IEEE Trans. Wirel. Commun., vol. 7, no. 6, pp. 2180–2189, Jul. 2008.

    Google Scholar 

  2. D. Goeckel, et al., “Artificial noise generation from cooperative relays for everlasting secrecy in two-hop wireless networks,” IEEE J Sel. Areas Commun., vol. 29, no. 10, pp. 2067–2076, Oct. 2011.

    Google Scholar 

  3. A. Khisti and D. Zhang, “Artificial-noise alignment for secure multicast using multiple antennas,” IEEE Commun. Lett., vol. 17, no. 8, pp. 1568–1571, Aug. 2013.

    Google Scholar 

  4. X. Zhou and M. McKay, “Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation,” IEEE Trans. Veh. Tech., vol. 59, no. 8, pp. 3831–3842, Aug. 2010.

    Google Scholar 

  5. N. Romero-Zurita, M. Ghogho, and D. McLernon, “Outage probability based power distribution between data and artificial noise for physical layer security,” IEEE Signal Process. Lett., vol. 19, no. 2, pp. 71–74, Feb. 2012.

    Google Scholar 

  6. Y. Yang, et al., “Transmitter beamforming and artificial noise with delayed feedback: Secrecy rate and power allocation,” J. Commun. and Net., vol. 14, no. 4, pp. 374–384, Aug. 2012.

    Google Scholar 

  7. I. Krikidis, J. S. Thompson, and S. McLaughlin, “Relay selection for secure cooperative networks with jamming,” IEEE Trans. Wireless Commun., vol. 8, no. 10, pp. 5003–5011, Oct. 2009.

    Google Scholar 

  8. J. Chen, et al., “Joint relay and jammer selection for secure two-way relay networks,” in Proc. 2011 IEEE Intern. Commun., Kyoto Japan, Jun. 2011.

    Google Scholar 

  9. J. Chen, et al., “Joint relay and jammer selection for secure two-way relay networks,” IEEE Trans. Inf. Foren. Sec., vol. 7, no. 1, pp. 310–320, Feb. 2012.

    Google Scholar 

  10. R. Zhang, et al., “Physical layer security for two-way untrusted relaying with friendly jammers,” IEEE Trans. Veh. Tech., vol. 61, no. 8, pp. 3693–3704, Aug. 2012.

    Google Scholar 

  11. O. Edfors, et al., “OFDM channel estimation by singular value decomposition,” IEEE Trans. Commun., vol. 46, no. 7, pp. 931–939, Jul. 1998.

    Google Scholar 

  12. S. Coleri, et al., “Channel estimation techniques based on pilot arrangement in OFDM systems,” IEEE Trans. Broadcasting, vol. 48, no. 3, pp. 223–229, Mar. 2002.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Zou, Y., Zhu, J. (2016). Joint Relay and Jammer Selection for Wireless Physical-Layer Security. In: Physical-Layer Security for Cooperative Relay Networks . Wireless Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-31174-6_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-31174-6_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-31173-9

  • Online ISBN: 978-3-319-31174-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics