Browse > Article
http://dx.doi.org/10.4218/etrij.14.0213.0090

A Distributed Implementation Algorithm for Physical Layer Security Based on Untrusted Relay Cooperation and Artificial Noise  

Li, Xiangyu (Department of Wireless Communication, National Digital Switching System Engineering & Technological Research Center)
Wang, Xueming (Department of Wireless Communication, National Digital Switching System Engineering & Technological Research Center)
Xu, Xiangyang (Department of Wireless Communication, National Digital Switching System Engineering & Technological Research Center)
Jin, Liang (Department of Wireless Communication, National Digital Switching System Engineering & Technological Research Center)
Publication Information
ETRI Journal / v.36, no.1, 2014 , pp. 183-186 More about this Journal
Abstract
In this letter, we consider a cooperation system with multiple untrusted relays (URs). To keep the transmitted information confidential, we obtain joint channel characteristics (JCCs) through combining the channels from the source to the destination. Then, in the null space of the JCCs, jammers construct artificial noise to confuse URs when the source node broadcasts its data. Through a distributed implementation algorithm, the weight of each node can be obtained from its own channel state information. Simulation results show that high-level security of the system can be achieved when internal and external eavesdroppers coexist.
Keywords
Physical layer security; untrusted relay; artificial noise; joint channel characteristics; secrecy rate;
Citations & Related Records
연도 인용수 순위
  • Reference
1 L. Dong et al., "Improving Wireless Physical Layer Security via Cooperating Relays," IEEE Trans. Signal Process., vol. 58, no. 3, Mar. 2010, pp. 1875-1888.   DOI   ScienceOn
2 G. Zheng, L. Choo, and K. Wong, "Optimal Cooperative Jamming to Enhance Physical Layer Security Using Relays," IEEE Trans. Signal Process., vol. 59, no. 3, Mar. 2011, pp. 1317- 1322.   DOI   ScienceOn
3 Y. Oohama, "Capacity Theorems for Relay Channels with Confidential Messages," Proc. ISIT, 2007, pp. 926-930.
4 X. He and A. Yener, "Two-Hop Secure Communication Using an Untrusted Relay: A Case for Cooperative Jamming," Proc. GLOBECOM, 2008, pp. 1-5.
5 X. He and A. Yener, "Two-Hop Secure Communication Using an Untrusted Relay," EURASIP J. Wireless Commun. Netw., 2009.
6 J. Chen et al., "Joint Relay and Jammer Selection for Secure Two- Way Relay Networks," Proc. ICC, 2011, pp. 1-5.
7 R. Zhang et al., "Physical Layer Security for Two-Way Untrusted Relaying with Friendly Jammers," IEEE Trans. Veh. Technol., vol. 61, no. 8, Aug. 2012, pp. 3693-3704.   DOI
8 H. Wang et al., "Joint Cooperative Beamforming and Jamming to Secure AF Relay Systems with Individual Power Constraint and No Eavesdropper's CSI," IEEE Signal Process. Lett., vol. 20, no. 1, Jan. 2013, pp. 39-42.   DOI
9 S. Goel and R. Negi, "Guaranteeing Secrecy Using Artificial Noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, June 2008, pp. 2180-2189.   DOI   ScienceOn
10 Y. Liang et al., "Compound Wiretap Channels," EURASIP J. Wireless Commun. Netw., 2009.