Search Results: 1 - 10 of 100 matches for " "
All listed articles are free for downloading (OA Articles)
Page 1 /100
Display every page Item
Beamforming for Secure Communication via Untrusted Relay Nodes Using Artificial Noise  [PDF]
Siddhartha Sarma
Mathematics , 2014,
Abstract: A two-phase beamforming solution for secure communication using untrusted relay nodes is presented. To thwart eavesdropping attempts of relay nodes, we deliberately introduce artificial noise in the source message. After pointing out the incongruity in evaluating secrecy rate in our model for certain scenarios, we provide an SNR based frame work for secure communication. We intend to bring down the SNR at each of the untrusted relay nodes below a certain predefined threshold, whereas, using beamforming we want to boost the SNR at the destination. With this motive optimal scaling vector is evaluated for beamforming phase which not only nullifies the artificial noise transmitted initially, but also maximizes the SNR at the destination. We discuss both the total and individual power constraint scenarios and provide analytical solution for both of them.
Secure Communication Via a Wireless Energy Harvesting Untrusted Relay  [PDF]
Sanket S. Kalamkar,Adrish Banerjee
Computer Science , 2015,
Abstract: The broadcast nature of the wireless medium allows unintended users to eavesdrop the confidential information transmission. In this regard, we investigate the problem of secure communication between a source and a destination via a wireless energy harvesting untrusted node which acts as a helper to relay the information; however, the source and destination nodes wish to keep the information confidential from the relay node. To realize the positive secrecy rate, we use destination-assisted jamming. Being an energy-starved node, the untrusted relay harvests energy from the received radio frequency signals, which include the source's information signal and the destination's jamming signal. Thus, we utilize the jamming signal efficiently by leveraging it as a useful energy source. At the relay, to enable energy harvesting and information processing, we adopt power splitting (PS) and time switching (TS) policies. To evaluate the secrecy performance of this proposed scenario, we derive analytical expressions for two important metrics, viz., the secrecy outage probability and the ergodic secrecy rate. The numerical analysis reveals the design insights into the effects of different system parameters like power splitting ratio, energy harvesting time, target secrecy rate, transmit signal-to-noise ratio (SNR), relay location, and energy conversion efficiency factor, on the secrecy performance. Specifically, the PS policy achieves better optimal secrecy outage probability and optimal ergodic secrecy rate than that of the TS policy at higher target secrecy rate and transmit SNR, respectively.
Secure Communication Via an Untrusted Non-Regenerative Relay in Fading Channels  [PDF]
Jing Huang,Amitav Mukherjee,A. Lee Swindlehurst
Mathematics , 2013, DOI: 10.1109/TSP.2013.2247600
Abstract: We investigate a relay network where the source can potentially utilize an untrusted non-regenerative relay to augment its direct transmission of a confidential message to the destination. Since the relay is untrusted, it is desirable to protect the confidential data from it while simultaneously making use of it to increase the reliability of the transmission. We first examine the secrecy outage probability (SOP) of the network assuming a single antenna relay, and calculate the exact SOP for three different schemes: direct transmission without using the relay, conventional non-regenerative relaying, and cooperative jamming by the destination. Subsequently, we conduct an asymptotic analysis of the SOPs to determine the optimal policies in different operating regimes. We then generalize to the multi-antenna relay case and investigate the impact of the number of relay antennas on the secrecy performance. Finally, we study a scenario where the relay has only a single RF chain which necessitates an antenna selection scheme, and we show that unlike the case where all antennas are used, under certain conditions the cooperative jamming scheme with antenna selection provides a diversity advantage for the receiver. Numerical results are presented to verify the theoretical predictions of the preferred transmission policies.
Secure Transmission on the Two-hop Relay Channel with Scaled Compute-and-Forward  [PDF]
Zhijie Ren,Jasper Goseling,Jos H. Weber,Michael Gastpar
Mathematics , 2015,
Abstract: In this paper, we consider communication on a two-hop channel, in which a source wants to send information reliably and securely to the destination via a relay. We consider both the untrusted relay case and the external eavesdropper case. In the untrusted relay case, the relay behaves as an eavesdropper and there is a cooperative node which sends a jamming signal to confuse the relay when the it is receiving from the source. We propose two secure transmission schemes using the scaled compute-and-forward technique. One of the schemes is based on a random binning code and the other one is based on a lattice chain code. It is proved that in either the high Signal-to-Noise-Ratio (SNR) scenario and/or the restricted relay power scenario, if the destination is used as the jammer, both schemes outperform all existing schemes and achieve the upper bound. In particular, if the SNR is large and the source, the relay, and the cooperative jammer have identical power and channels, both schemes achieve the upper bound for secrecy rate, which is merely $1/2$ bit per channel use lower than the channel capacity without secrecy constraints. We also prove that one of our schemes achieves a positive secrecy rate in the external eavesdropper case in which the relay is trusted and there exists an external eavesdropper.
Optimum Relay Scheme in a Secure Two-Hop Amplify and Forward Cooperative Communication System  [PDF]
Ghadamali Bagherikaram,Konstantinos N. Plataniotis
Mathematics , 2011,
Abstract: A MIMO secure two-hop wireless communication system is considered in this paper. In this model, there are no direct links between the source-destination and the source-eavesdropper. The problem is maximizing the secrecy capacity of the system over all possible amplify and forward (AF) relay strategies, such that the power consumption at the source node and the relay node is limited. When all the nodes are equipped with single antenna, this non-convex optimization problem is fully characterized. When all the nodes (except the intended receiver) are equipped with multiple antennas, the optimization problem is characterized based on the generalized eigenvalues-eigenvectors of the channel gain matrices.
Exploring Relay Cooperation Scheme for Load-Balance Control in Two-hop Secure Communication System  [PDF]
Yulong Shen,Xiaohong Jiang,Jianfeng Ma
Computer Science , 2012,
Abstract: This work considers load-balance control among the relays under the secure transmission protocol via relay cooperation in two-hop wireless networks without the information of both eavesdropper channels and locations. The available two-hop secure transmission protocols in physical layer secrecy framework cannot provide a flexible load-balance control, which may significantly limit their application scopes. This paper proposes a secure transmission protocol in case that the path-loss is identical between all pairs of nodes, in which the relay is randomly selected from the first $k$ preferable assistant relays. This protocol enables load-balance among relays to be flexibly controlled by a proper setting of the parameter $k$, and covers the available works as special cases, like ones with the optimal relay selection ($k=1$) and ones with the random relay selection ($k = n$, i.e. the number of system nodes). The theoretic analysis is further provided to determine the maximum number of eavesdroppers one network can tolerate by applying the proposed protocol to ensure a desired performance in terms of the secrecy outage probability and transmission outage probability.
Secure Beamforming for MIMO Two-Way Communications with an Untrusted Relay  [PDF]
Jianhua Mo,Meixia Tao,Yuan Liu,Rui Wang
Computer Science , 2013, DOI: 10.1109/TSP.2014.2307276
Abstract: This paper studies the secure beamforming design in a multiple-antenna three-node system where two source nodes exchange messages with the help of an untrusted relay node. The relay acts as both an essential signal forwarder and a potential eavesdropper. Both two-phase and three-phase two-way relay strategies are considered. Our goal is to jointly optimize the source and relay beamformers for maximizing the secrecy sum rate of the two-way communications. We first derive the optimal relay beamformer structures. Then, iterative algorithms are proposed to find source and relay beamformers jointly based on alternating optimization. Furthermore, we conduct asymptotic analysis on the maximum secrecy sum-rate. Our analysis shows that when all transmit powers approach infinity, the two-phase two-way relay scheme achieves the maximum secrecy sum rate if the source beamformers are designed such that the received signals at the relay align in the same direction. This reveals an important advantage of signal alignment technique in against eavesdropping. It is also shown that if the source powers approach zero the three-phase scheme performs the best while the two-phase scheme is even worse than direct transmission. Simulation results have verified the efficiency of the secure beamforming algorithms as well as the analytical findings.
Optimal Power Allocation for A Massive MIMO Relay Aided Secure Communication  [PDF]
Jian Chen,Xiaoming Chen,Wolfgang Gerstacker
Mathematics , 2015,
Abstract: In this paper, we address the problem of optimal power allocation at the relay in two-hop secure communications under practical conditions. To guarantee secure communication during the long-distance transmission, the massive MIMO (M-MIMO) relaying techniques are explored to significantly enhance wireless security. The focus of this paper is on the analysis and design of optimal power assignment for a decode-and-forward (DF) M-MIMO relay, so as to maximize the secrecy outage capacity and minimize the interception probability, respectively. Our study reveals the condition for a nonnegative the secrecy outage capacity, obtains closed-form expressions for optimal power, and presents the asymptotic characteristics of secrecy performance. Finally, simulation results validate the effectiveness of the proposed schemes.
Secure Communication over Parallel Relay Channel  [PDF]
Zohaib Hassan Awan,Abdellatif Zaidi,Luc Vandendorpe
Mathematics , 2010,
Abstract: We investigate the problem of secure communication over parallel relay channel in the presence of a passive eavesdropper. We consider a four terminal relay-eavesdropper channel which consists of multiple relay-eavesdropper channels as subchannels. For the discrete memoryless model, we establish outer and inner bounds on the rate-equivocation region. The inner bound allows mode selection at the relay. For each subchannel, secure transmission is obtained through one of two coding schemes at the relay: decoding-and-forwarding the source message or confusing the eavesdropper through noise injection. For the Gaussian memoryless channel, we establish lower and upper bounds on the perfect secrecy rate. Furthermore, we study a special case in which the relay does not hear the source and show that under certain conditions the lower and upper bounds coincide. The results established for the parallel Gaussian relay-eavesdropper channel are then applied to study the fading relay-eavesdropper channel. Analytical results are illustrated through some numerical examples.
Imbalanced Beamforming by a Multi-antenna Source for Secure Utilization of an Untrusted Relay  [PDF]
Amitav Mukherjee
Mathematics , 2013,
Abstract: We investigate a relay network where a multiantenna source can potentially utilize an unauthenticated (untrusted) relay to augment its direct transmission of a confidential message to the destination. Since the relay is untrusted, it is desirable to protect the confidential data from it while simultaneously making use of it to increase the reliability of the transmission. We present a low-complexity scheme denoted as imbalanced beamforming based on linear beamforming and constellation mapping that ensures perfect physical-layer security even while utilizing the untrusted relay. Furthermore, the security of the scheme holds even if the relay adopts the conventional decodeand- forward protocol, unlike prior work. Simulation results show that the proposed imbalanced signaling maintains a constant BER of 0.5 at the eavesdropper at any SNR and number of source antennas, while maintaining or improving the detection performance of the destination compared to not utilizing the relay or existing security methods.
Page 1 /100
Display every page Item

Copyright © 2008-2017 Open Access Library. All rights reserved.