DOI QR코드

DOI QR Code

A Distributed Implementation Algorithm for Physical Layer Security Based on Untrusted Relay Cooperation and Artificial Noise

  • Li, Xiangyu (Department of Wireless Communication, National Digital Switching System Engineering & Technological Research Center) ;
  • Wang, Xueming (Department of Wireless Communication, National Digital Switching System Engineering & Technological Research Center) ;
  • Xu, Xiangyang (Department of Wireless Communication, National Digital Switching System Engineering & Technological Research Center) ;
  • Jin, Liang (Department of Wireless Communication, National Digital Switching System Engineering & Technological Research Center)
  • Received : 2013.02.27
  • Accepted : 2013.06.03
  • Published : 2014.02.01

Abstract

In this letter, we consider a cooperation system with multiple untrusted relays (URs). To keep the transmitted information confidential, we obtain joint channel characteristics (JCCs) through combining the channels from the source to the destination. Then, in the null space of the JCCs, jammers construct artificial noise to confuse URs when the source node broadcasts its data. Through a distributed implementation algorithm, the weight of each node can be obtained from its own channel state information. Simulation results show that high-level security of the system can be achieved when internal and external eavesdroppers coexist.

Keywords

References

  1. L. Dong et al., "Improving Wireless Physical Layer Security via Cooperating Relays," IEEE Trans. Signal Process., vol. 58, no. 3, Mar. 2010, pp. 1875-1888. https://doi.org/10.1109/TSP.2009.2038412
  2. G. Zheng, L. Choo, and K. Wong, "Optimal Cooperative Jamming to Enhance Physical Layer Security Using Relays," IEEE Trans. Signal Process., vol. 59, no. 3, Mar. 2011, pp. 1317- 1322. https://doi.org/10.1109/TSP.2010.2092774
  3. Y. Oohama, "Capacity Theorems for Relay Channels with Confidential Messages," Proc. ISIT, 2007, pp. 926-930.
  4. X. He and A. Yener, "Two-Hop Secure Communication Using an Untrusted Relay: A Case for Cooperative Jamming," Proc. GLOBECOM, 2008, pp. 1-5.
  5. X. He and A. Yener, "Two-Hop Secure Communication Using an Untrusted Relay," EURASIP J. Wireless Commun. Netw., 2009.
  6. J. Chen et al., "Joint Relay and Jammer Selection for Secure Two- Way Relay Networks," Proc. ICC, 2011, pp. 1-5.
  7. R. Zhang et al., "Physical Layer Security for Two-Way Untrusted Relaying with Friendly Jammers," IEEE Trans. Veh. Technol., vol. 61, no. 8, Aug. 2012, pp. 3693-3704. https://doi.org/10.1109/TVT.2012.2209692
  8. H. Wang et al., "Joint Cooperative Beamforming and Jamming to Secure AF Relay Systems with Individual Power Constraint and No Eavesdropper's CSI," IEEE Signal Process. Lett., vol. 20, no. 1, Jan. 2013, pp. 39-42. https://doi.org/10.1109/LSP.2012.2227725
  9. S. Goel and R. Negi, "Guaranteeing Secrecy Using Artificial Noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, June 2008, pp. 2180-2189. https://doi.org/10.1109/TWC.2008.060848
  10. Y. Liang et al., "Compound Wiretap Channels," EURASIP J. Wireless Commun. Netw., 2009.

Cited by

  1. MLDS: Multi-Layer Defense System for Preventing Advanced Persistent Threats vol.6, pp.4, 2014, https://doi.org/10.3390/sym6040997
  2. Overview of 5G security technology vol.61, pp.8, 2014, https://doi.org/10.1007/s11432-017-9426-4
  3. Research on 5G Security Technology for Industrial Internet vol.1966, pp.1, 2021, https://doi.org/10.1088/1742-6596/1966/1/012044