|Table of Contents|

Secure performance analysis of opportunistic relay and cooperativejamming technique under adaptive eavesdropping and jamming(PDF)

《南京理工大学学报》(自然科学版)[ISSN:1005-9830/CN:32-1397/N]

Issue:
2019年01期
Page:
29-
Research Field:
Publishing date:

Info

Title:
Secure performance analysis of opportunistic relay and cooperativejamming technique under adaptive eavesdropping and jamming
Author(s):
Jia Lijun12He Yucheng12Zhou Lin12
1.School of Information Science and Engineering,Huaqiao University,Xiamen 361021,China; 2.State Key Laboratory of Integrated Services Networks,Xidian University,Xi’an 710071,China
Keywords:
physical layer security adaptive eavesdropper opportunistic relay cooperative jamming ergodic achievable secrecy rate half-duplex cooperative communication
PACS:
TN92
DOI:
10.14177/j.cnki.32-1397n.2019.43.01.004
Abstract:
A multi-relay cooperative communication model is considered,where there exists a half-duplex adaptive eavesdropper that performs either passive eavesdropping or active jamming. To improve the performance in ergodic achievable secrecy rate(EASR),one cooperative relay is selected to assist the source node to transmit information,and the remaining relays are used to send artificial jamming to confuse the eavesdropper. Under the assumption that only the statistical channel state information of the eavesdropper is known,the asymptotic closed-form expression for the EASR is derived,and Monte-Carlo simulations are conducted to validate the derivations. Simulation results show that the asymptotic analysis results coincide well with the simulation results even when the number of relays are relatively small,and meanwhile,the combined opportunistic relaying and cooperative jamming technique can significantly improve the secure transmission performance of the system.

References:

[1] Dong Lun,Han Zhu,Petropulu A P,et al. Improving wireless physical layer security via cooperating relays[J]. IEEE Transactions on Signal Processing,2010,58(3):1875-1888.
[2]Su Yinjie,Jiang Lingge,He Chen. Joint relay selection and power allocation for full-duplex DF co-operative networks with outdated CSI[J]. IEEE Communications Letters,2016,20(3):510-513.
[3]Al-Qahtani F S,Zhong Caijun,Alnuweiri H M. Opportunistic relay selection for secrecy enhancement in cooperative networks[J]. IEEE Transactions on Communications,2015,63(5):1756-1770.
[4]Krikidis I,Thompson J S,Mclaughlin S. Relay selection for secure cooperative networks with jamming[J]. IEEE Transactions on Wireless Communications,2009,8(10):5003-5011.
[5]Goel S,Negi R. Guaranteeing secrecy using artificial noise[J]. IEEE Transactions on Wireless Communications,2008,7(6):2180-2189.
[6]Guo Haiyan,Yang Zhen,Zhang Linghua,et al. Power-constrained secrecy rate maximization for joint relay and jammer selection assisted wireless networks[J]. IEEE Transactions on Communications,2017,65(5):2180-2193.
[7]赵睿,贺玉成,周林,等. 基于人工噪声预编码的多天线中继安全性能分析[J]. 电子与信息学报,2016,38(10):2575-2581.
Zhao Rui,He Yucheng,Zhou Lin,et al. Secrecy performance analysis of multiple-antenna relay systems with artificial noise precoding[J]. Journal of Electronics and Information Technology,2016,38(10):2575-2581.
[8]钱振宇,束锋,王进,等. MIMO双向中继系统中一种交替迭代结构[J]. 南京理工大学学报,2015,39(5):596-601.
Qian Zhenyu,Su Feng,Wang Jin,et al. Alternating iterative structure for MIMO two-way relay system[J]. Journal of Nanjing University of Science and Technology,2015,39(5):596-601.
[9]Wang Wei,Teh K C,Li K H,et al. On the impact of adaptive eavesdroppers in multi-antenna cellular networks[J]. IEEE Transactions on Information Forensics and Security,2018,13(2):269-279.

[10]Yang Long,Chen Jian,Jiang Hai,et al. Optimal relay selection for secure cooperative communications with an adaptive eavesdropper[J]. IEEE Transactions on Wireless Communications,2017,16(1):26-42.
[11]Gao H,Smith P J,Clark M V. Theoretical reliability of MMSE linear diversity combining in rayleigh-fading additive interference channels[J]. IEEE Transactions on Communications,1998,46(5):666-672.

Memo

Memo:
-
Last Update: 2019-02-28