Performance Study of Untrusted Relay Network Utilizing Cooperative Jammer

Document Type : Research Article

Authors

1 Ph.D. Student, Electrical Engineering Department, Amirkabir University of Technology

2 Professor, Electrical Engineering Department, Amirkabir University of Technology

3 Assistant Professor, Electrical Engineering Department, Amirkabir University of Technology

Abstract

Abstract—In this paper, the problem of secure transmission in two-hop amplify-and-forward (AF) systems with an untrusted relay is investigated. To prevent the untrusted relay from intercepting the source message and to achieve positive secrecy rate, the destination-based cooperative jamming (DBCJ) technique is used. In this method the destination sends an intended jamming signal to the relay. This jamming signal helps protecting the source message from being captured reliably at the untrusted relay, while the destination cancels itself intended jamming signal. The optimal power allocation (OPA) technique is considered for the presented system. It is observed that the objective function is a quasiconcave function at high signal-to-noise-ratio (SNR) regimes. Based on this OPA technique, we study the ergodic secrecy rate (ESR) and the secrecy outage probability (SOP) of the system when the source and relay are equipped with a single antenna while the destination is equipped with largescale antenna arrays (LSA). Using the achieved closed-form expressions, one can evaluate the performance of the secure system easily and fast and also, they provide significant insight for system design. Finally, simulation results indicate the accuracy of the derived expressions.

Keywords

Main Subjects


[1] Laneman, J. N.; Tse, D. N. C. and Wornell, G. W.; “Cooperative Diversity in Wireless Networks: Efficient Protocols and Outage Behavior,” IEEE Trans. Inf. Theory, Vol. 50, No. 12, pp. 3062–3080, 2004.
[2] Bloch, M.; Barros, J.; Rodriques, M. R. D. and McLaughlin, S. W.; “Wireless Information-Theoretic Security,” IEEE Trans. Inf. Theory, Vol. 54, No. 6, pp. 2515–2534, 2008.
[3] Wyner, A. D.; “The Wire-Tap Channel,” Bell Syst. Tech. J., Vol. 54, No. 8, pp. 1355–1387, 1975.
[4] Huang, J.; Mukherjee, A. and Swindlehurst, A. L.; “Secure Communication via an Untrusted Non- Regenerative Relay in Fading Channels,” IEEE Trans. Signal Process., Vol. 61, No. 10, pp. 2536– 2550, 2013.
[5] He, X. and Yener, A.; “Two-Hop Secure Communication Using an Untrusted Relay: A Case for Cooperative Jamming,” in Proc. IEEE Globecom, New Orleans, LA, p. 15, 2008.
[6] He, X. and Yener, A.; “Two-Hop Secure Communication Using an Untrusted Relay,” EURASIP J. Wireless Commun. Netw., p. 13, 2009.
[7] Huang, J.; Mukherjee, A. and Swindlehurst, A. L.; “Outage Performance for Amplify and Forward Channels with an Unauthenticated Relay,” in Proc. IEEE Int. Commun. Conf., pp. 893–897, 2012.
[8] Sun, L.; Zhang, T.; Li, Y. and Niu, H.; “Performance Study of Two-Hop Amplify and Forward Systems with Untrustworthy Relay Nodes,” IEEE Trans. Veh. Technol., Vol. 61, No. 8, pp. 3801–3807, 2012.
[9] Wang, J.; Elkashlan, M.; Huang, J.; Tran, N. H. and Duong, T. Q.; “Secure Transmission with Optimal Power Allocation in Untrusted Relay Networks,” IEEE Wireless Commun. Lett., Vol. 3, No. 3, pp. 289– 292, 2014.
[10] Geraci, G.; Couillet, R.; Yuan, J.; Debbah, M. and Collings, I. B.; “Large System Analysis of Linear Precoding in MISO Broadcast Channels with Confidential Messages,” IEEE J. Sel. Areas Commun., Vol. 31, No. 9, pp. 1660–1671, 2013.
[11] Anghel, P. A. and Kaveh, M.; “Exact Symbol Error Probability of a Cooperative Network in a Rayleigh-Fading Environment,” IEEE Trans. Wireless Commun., Vol. 3, No. 5, pp. 1416–1421, 2004.
[12] Papoulis, A.; “Probability, Random Variables, and Stochastic Processes,” McGraw-Hill, New York, 1984.
[13] Boyd, S. and Vandenberghe. L.; “Convex Optimization,” Cambridge University Press, 2004.
[14] Gradshteyn, I. S. and Ryzhik, I. M.; “Table of Integrals, Series and Products,” Academic, New York, 7th Edition, 2007.