Conference PaperPDF Available

Optimal Relay Selection with a Full-Duplex Active Eavesdropper in Cooperative Wireless Networks

Authors:

Figures

Content may be subject to copyright.
Optimal Relay Selection with a Full-duplex Active
Eavesdropper in Cooperative Wireless Networks
He Zhou, Dongxuan He, Hua Wang, and Dewei Yang
Beijing Institute of Technology, China
Abstract—In this paper, we investigate the physical layer
security of a dual-hop cooperative network in the presence
of a full-duplex active eavesdropper, which can overhear the
confidential signals and transmit jamming signals simultaneously.
We utilize the optimal relay selection scheme to improve the
secrecy performance, where the relay maximizing the secrecy
capacity will be selected to forward the information. To evaluate
the secrecy performance of our system, we derive a compact
closed-form expression of the secrecy outage probability. Besides,
we also analyze the asymptotic performance related to the
position of the nodes. Finally, we verify our analysis through the
numerical results, and demonstrate that there exists a secrecy
protection region where the secrecy outage probability is below
a target probability.
I. INTRODUCTION
Due to the broadcast nature of wireless medium, communi-
cations in wireless networks are vulnerable to be attacked by
eavesdroppers, leading to severe threat to information security.
Thus, as an alternative to the conventional cryptography-based
methods at the upper layers, physical layer security (PLS),
which is based on information-theoretic security, is becoming
an effective way to combat the illegal interception [1].
To improve the security of the wireless networks, coopera-
tive transmission has been regarded as an effective method
to improve the security of the system. With the help of
the external node, the difference of the channel capacity
between legitimate link and wiretap link can be increased, thus
improving the secrecy performance of the wireless networks.
Among all the external node aided schemes, relay selection
[3]-[9] has been regarded as a promising method due to its
lower complexity and high diversity gain [2,3]. In [4], optimal
relay selection schemes without power constraints and direct
links had been proposed in terms of decreasing the intercept
probability. In [5] and [6], the authors considered the situation
that the decode-and-forward (DF) relays were not always able
to decode the messages, and the secrecy outage probability
(SOP) had been explored, where multiple eavesdroppers can
overhear the messages from both source and relays with
maximal ratio combining (MRC) [5] or selection combining
(SC) [6] technique.
In addition, the relay selection scheme has also been
combined with other techniques [7]-[9]. In [7], the joint
relay selection and cooperative jamming scheme was studied
to maximize the secrecy rate, where the source cooperated
with the destination in the first phase and the selected relay
cooperated with the source in the second phase to confound
the eavesdropper. The authors of [8] used the idea of nodes
cooperation by hybrid cooperative beamforming and jamming
scheme in order to protect the data transmissions during
the two phases. Moreover, [9] proposed to select a pair of
opportunistic relays, where one was selected as a relay to
forward the information and the other worked as a friendly
jammer.
On the other hand, full-duplex has been regarded as a novel
technique [10,11], which can double the spectral efficiency by
transmitting and receiving simultaneously. [10] studied a full-
duplex receiver scheme where an optimal jamming covariance
matrix that maximized the secrecy rate was designed. The
impact of full-duplex relay on the secrecy performance was
analyzed in [11], and a full-duplex relay jamming scheme was
proposed to improve the secrecy.
The aforementioned works all considered the passive eaves-
droppers, where the eavesdroppers only try to overhear the
confidential information. However, there exist some active
eavesdroppers in practice who can eavesdrop and jam simul-
taneously, which are called full-duplex eavesdroppers in some
works [12]-[14]. And the secure transmission without external
nodes against the active eavesdropper has been explored. For
example, [12] studied how to utilize the artificial noise to en-
hance the security in the presence of an active eavesdropper. In
[13], the authors proposed to use a Game-Theoretic framework
and derived the optimal transmission and jamming strategy to
obtain equilibrium for the game. Besides, [14] considered the
secrecy issue under an active eavesdropper in the multiple-
input-multiple-output (MIMO) system.
Motivated by these studies, in this paper, we explore the
secrecy transmission in the cooperative networks in the pres-
ence of a full-duplex active eavesdropper. Here, the optimal
relay that leads to the maximum secrecy capacity is selected to
forward the information in our system. To evaluate the secrecy
performance, the expression of secrecy outage probability is
derived, as well as the asymptotic performance. We also utilize
the numerical simulation to validate our analysis.
The remainder of this paper is organized as follows. In
Section II, we describe the system model of the multi-relay
cooperative network. In Section III, we provide the secrecy
outage probability and the asymptotic analysis. In Section IV,
we give the numerical results. Finally, Section V concludes
the paper.
II. SY ST EM MO DE L
As shown in Fig. 1, we consider a cooperative wireless
network consisting of one source S, one destination D, and
978-1-7281-1217-6/19/$31.00 ©2019 IEEE
Fig. 1: System model of a multi-relay cooperative network
under a full-duplex active eavesdropper.
Ntrusted DF relays Rn(n= 1,2, . . . ,N) in the presence of
an active eavesdropper E. We assume that the eavesdropper
is a full-duplex node, which can perform eavesdropping and
jamming simultaneously, and the source, destination, and
relays all work in half-duplex mode with single antenna. We
also assume that there is no direct link between Sand Ddue
to the deep fading and path-loss. Besides, we assume that all
the relays are close together and have the same distance to
other nodes.
It is assumed that all the channels in the system expe-
rience identical and independent distributed (i.i.d) Rayleigh
fading together with a large-scale fading and the CSIs of
all links are available. We denote hijdα/2
ij as the channel
between the arbitrarily two nodes iand j, where hij ,dij
(i(S, Rn, E), j (Rn, D, E )) and αare the small-scale
fading corresponding to a complex Gaussian random variable
with zero mean and unit variance, the distance from node
ito node jand the path-loss exponent, respectively. Due
to the full-duplex characteristics, the eavesdropper remains
a residual self-interference to itself, which can be modeled
as link between the two antennas of E, denoted by hEE
CN (0,1). Moreover, ρ(0,1) is a linear coefficient after
self-interference cancellation.
The transmission can be divided into two phases. The relays
receive signal from the source in the first phase and then
forward the received signal to the destination in the second
phase. We assume the eavesdropper keeps eavesdropping and
jamming during the two phases. Here, we define the transmit
power of the source, the relays, and the eavesdropper as PS,
PR, and PE, respectively. As such, we express the received
signal at node Rnand Ein the first phase as
yRn=PShSRndα/2
SRnxs+PEhERndα/2
ERnxe+nRn,(1)
yE,1=PShS E dα/2
SE xs+ρPEhE E dα/2
EE xe+nE,1,(2)
where xsand xeare the information signal from the source and
jamming signal from the eavesdropper, respectively. Here, we
assume that E|xs|2= 1 and E|xe|2= 1.nRnand nE,1
are AWGN at Rnand Ein the first phase, respectively.
In the second phase, one relay is selected from the N
relays to forward the information signal. To this end, we can
formulate the received signal at node Dand Ein the second
phase as
yD=PRhRnDdα/2
RnDxs+PEhED dα/2
ED xe+nD,(3)
yE,2=PRhRnEdα/2
RnExs+ρPEhEE dα/2
EE xe+nE,2,
(4)
where nDand nE,2are AWGN at Dand Ein the second
phase, respectively.
It is assumed that the noise received at any node has
the same variance N0. Consequently, from (1) and (2), the
corresponding signal-to-interference-plus-noise ratio (SINR) at
node Rand Ecan respectively be expressed as
γSRn=γS|hSRn|2dα
SRn
γE|hERn|2dα
ERn+ 1 ,(5)
γSE =γS|hS E |2dα
SE
ργE|hEE |2dα
EE + 1 ,(6)
where γS=PS/N0and γE=PE/N0.
Similarly, according to (3) and (4), the obtained SINR
at node Dand Ein the second phase can respectively be
expressed as
γRnD=γR|hRnD|2dα
RnD
γE|hED |2dα
ED + 1 ,(7)
γRnE=γR|hRnE|2dα
RnE
ργE|hEE |2dα
EE + 1 ,(8)
where γR=PR/N0.
In this work, we assume that the eavesdropper adopts the
MRC [5] to decode the received signal. To this end, when the
n-th relay is selected, the secrecy capacity can be formulated
as
CS(n) = [CD(n)CE(n)]+,(9)
where CD(n) = 1
2log (1 + min (γSRn, γRnD)),CE(n) =
1
2log (1 + γSE +γRnE)are capacities of the legitimate link
and the wiretap link when the n-th relay is selected to forward
the information, respectively. And [·]+=max(·,0).
III. SEC RE CY PERFORMANCE ANA LYSIS
In this section, we quantify the system secrecy performance
in terms of the secrecy outage probability (SOP). First, we
derive the analytical expression of SOP in closed-form. Then,
the asymptotic approximations will be derived, revealing the
influence of node relative position intuitively. Specifically, we
assume the relay that maximizes the secrecy capacity will be
selected in the considered system. As such, we can express
the relay selection scheme as
n= arg max
n=1,...,N CS(n).(10)
A. Secrecy Outage Probability Analysis
Once CS(n)< Rs, where Rsis a target secrecy transmis-
sion rate, the information can not be confidentially transmitted
to D. As such, we define the secrecy outage probability as
the probability that CS(n)is below Rs[15], which can be
formulated as
Pout = Pr [CS(n)< RS]
= Pr arg max
n=1,...,N 1
2log 1+min(γSRnRnD)
1+γSE +γRnE< RS.
(11)
For Nindependent relays are deployed in this system, we
can further express the SOP as
Pout =
N
n=1
Pr 1 + Z1
1 + Z2
< γth
=
N
n=1
(1Pr [Z2< T (1 + Z1)1])
=
N
n=1
1
0
FZ2[T(1+x)1]fZ1(x)dx

P
,(12)
where rth = 22RS,T= 1th,Z1=min(γS Rn, γRnD)and
Z2=γSE +γRnE.
Since the channel is Rayleigh channel, we know that |hij|2
(as well as |hij |2dα
ij ) follows exponential distribution. For the
convenience of expression, we define σ2
ij =dα
ij . As such, the
cumulative distribution function (CDF) and probability density
function (PDF) of |hij |2dα
ij can be respectively expressed as
F|hij |2dα
ij (x) = 1 exp(x
σ2
ij
),(13)
f|hij |2dα
ij (x) = 1
σ2
ij
exp(x
σ2
ij
).(14)
According to the above analysis, we can further obtain the
PDF of variable Z1as
fZ1(x)= a1a2
a2a1a3x+a1a3+ 1
(x+a1)2a3x+a2a3+ 1
(x+a2)2e
a3x,
(15)
where a1=γSσ2
SRn
γEσ2
ERn
,a2=γRσ2
RnD
γEσ2
ED
and a3=1
γSσ2
SRn
+1
γRσ2
RnD
.
Proof: see Appendix.
Meanwhile, from (6) and (8), the CDF of variable Z2can
be expressed as
FZ2(x) = Pr ω3+ω4
ω5
< x
= Pr (ω3< 5ω4)(16)
=
15
0
Fω3(5ω4)fω4(ω4)fω5(ω5)45,
where ω3=γS|hSE |2dα
SE ,ω4=γR|hRnE|2dα
RnEand ω5=
ργE|hEE |2dα
EE + 1.
Substituting (13) and (14) into (16), we can re-express the
CDF of Z2as
FZ2(x) = 1 (b1b2)exp(b3x)
x+b1
b4
exp(b6x)
x+b5
,(17)
with
b1=γRσ2
RE
ργEσ2
EE
, b2=γSγRσ2
SE σ2
RE
ργEσ2
EE (γSσ2
SE γRσ2
RE )
b3=1
γRσ2
RE
, b4=(γSσ2
SE )2
ργEσ2
EE (γSσ2
SE γRσ2
RE )
b5=γSσ2
SE
ργEσ2
EE
, b6=1
γSσ2
SE
(18)
With the aid of the exponential integral function Ei(·)[16,
eq.(3.352.4),(3.353.3)], we can obtain the expression of Pin
(12) by substituting (15) and (17) into the P, which is now
shown on the top of the next page. And the parameters in (19)
can be expressed as follows
c1= (T1 + b1)/T , c2= (T1 + b5)/T
c3=a3+b3T , c4=a3+b6T
d1=(b1b2) exp(b3(T1))
T(c1a1), d2=(b1b2) exp(b3(T1))
T(c1a2)
d3=b4exp(b6(T1))
T(c2a1), d4=b4exp(b6(T1))
T(c2a2)
(20)
Utilizing the above analysis, we can obtain a compact
expression of the SOP as
Pout =
N
n=1
(1 P).(21)
B. Asymptotic Analysis
In this subsection, we give out the asymptotic analysis
of SOP, allowing us to observe the behavior of this metric
intuitively.
Here, two asymptotic expressions, both of which are ac-
cording to the distance relation, are discussing. Specifically,
we first consider that either the destination or the source is
closely located to the relays, and then we consider that the
eavesdropper is close to the transmitters (either the source or
the relays).
In the first case, we first assume the SNR of RnDlink
is so high that σ2
RnD , due to the short distance between
the relays and the destination. To this end, we can rewrite
(21) as (22), which is shown on the top of the next page. To
be noticed, this assumption implies the lower bound for the
secrecy performance with fixed average SNR σ2
SRn. Next, we
assume that σ2
SRn for the situation that the distance
between Sand Rnis sufficiently short. As such, we set
γSσ2
SRn=γRσ2
RnDand a1=a2in (22), which is observed
tends to a constant value. The above analysis demonstrates
that the quality of the SRnlink and that of the RnD
link have the similar impact on the secrecy performance.
In the second case, we first assume γEσ2
SE for the
situation that the eavesdropper locates close to the source,
causing the power of the received signal at the eavesdropper to
P= 1 + a1a2
a2a1{−d1a31
c1a1exp(c1c3)Ei(c1c3)+(b3T+1
c1a1) exp(a1c3)Ei(a1c3) + 1
a1
+d2a31
c1a2exp(c1c3)Ei(c1c3)+(b3T+1
c1a2) exp(a2c3)Ei(a2c3) + 1
a2
d3a31
c2a1exp(c2c4)Ei(c2c4)+(b6T+1
c2a1) exp(a1c4)Ei(a1c4) + 1
a1
+d4a31
c2a2exp(c2c4)Ei(c2c4)+(b6T+1
c2a2) exp(a2c4)Ei(a2c4) + 1
a2}.
(19)
Pout
N
n=1
{a1{d1 1
γSσ2
SRn
1
c1a1exp(c1c3)Ei(c1c3)+(b3T+1
c1a1) exp(a1c3)Ei(a1c3) + 1
a1
+d3 1
γSσ2
SRn
1
c2a1exp(c2c4)Ei(c2c4)+(b6T+1
c2a1) exp(a1c4)Ei(a1c4) + 1
a1}.
(22)
0.6 1 1.5 2 2.5 3 3.5
dRnD
10-4
10-3
10-2
10-1
100
Pout
S = 5dB
10dB
15dB
Simulation
Analytical curve
Asymptotic curve
Fig. 2: Pout versus dRnDfor different values of γSwith γR=
20 dB, γE= 5 dB, S(0, 0), Rn(0.5, 0), and E(-0.8, -1).
be sufficiently high. Under this assumption, the SOP will be 1
without doubt. The similar conclusion can be drawn once the
eavesdropper locates close to the relays. The above analysis
indicates that it is crucial to establish a secrecy protection
region to ensure the secure transmission.
IV. NUM ER IC AL RE SU LTS
In this section, we provide numerical results to validate our
analysis. Specifically, we first detail the impact of the distance
from the relays to the destination and the distance form the
eavesdropper to the legitimate nodes, respectively. And then,
we show the impact of the distribution of the eavesdropper
on the secrecy outage probability. Throughout this section, we
consider that Rs= 0.1bits/s/Hz, N= 3, and ρ= 0.01.
And we utilize the relative distance to represent the position
relation, where the distance from the source to the relays is 1.
First, we show how the distance between Rnand Dinflu-
ences the secrecy outage probability in Fig. 2. We can see that
the simulation points match with the analytical curve, which
validates our derivation of the expression of the secrecy outage
probability. We also observe that Pout increases as the increase
of dRnD. When the distance tends to zero, Pout tends to a con-
stant value which is determined by the quality of the channel
between the source and the relays. And Pout tends to 1 when
the distance is sufficiently large, this is because the relays can
0 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 1.8 2
x
E
10-3
10-2
10-1
100
Pout
N = 3
5
7
Analytical curve
Optimal eavesdropping position
Fig. 3: Pout versus xEfor different values of Nwith γS= 10
dB, γR= 20 dB, γE= 5 dB, S(0, 0), Rn(0.7, 0), and D
(1.2, 0.5).
not forward the information to the destination successfully.
Specifically, the short distance region corresponds to the high
SNR regime, where σ2
RnD . Here, we can see that
the analytical curve and the asymptotic curve overlap, which
demonstrates the effectiveness of our asymptotic analysis. In
addition, we can find that Pout decreases drastically in the
high SNR regime with the increase of γS, while it degrades
slightly in the low SNR regime. This can be explained by the
fact that the increasing transmit power enhances the wiretap
link more than the legitimate link due to the large distance
between Rnand D.
Then, we plot Pout versus xEfor different values of Nin
Fig. 3. To be noticed, the position of the eavesdropper here
refers to the x-coordinate of the eavesdropper, where the y-
coordinate of the eavesdropper always keeps to be 1. It is
observed that we can improve the secrecy performance by
increasing the number of the relays in this system. We can
also see that Pout first increases and then decreases, and there
exists an optimal eavesdropping position for the eavesdropper.
To this end, we can evaluate the worst secrecy performance
of our system by finding the optimal eavesdropping position.
Finally, we draw Fig. 4 to show how the Pout will be
influenced by the position of the eavesdropper. We can see
from this figure that once the eavesdropper is close to the
Fig. 4: Pout versus the position of Ewith γS= 10 dB, γR=
20 dB, γE= 5 dB, S(0, 0), Rn(0.7, 0), and D(1.2, 0.5).
legitimate nodes (including the source, the relays, and the
destination), the secrecy outage probability will be sufficiently
high. This demonstrates that there exists a secrecy protection
region where Pout is below a target outage probability, and
we can ensure the security by keeping the eavesdropper out
of this region in our system. Besides, the positions of the
legitimate nodes also influence the shape and scale of the
secrecy protection region. As such, it will be significant to
further design the deployment of the legitimate nodes, which
will be investigated in the later works.
V. CONCLUSION
In this paper, we analyzed the secure transmission in the
presence of a full-duplex active eavesdropper. To enhance the
security, we considered the optimal relay selection scheme,
where the relay corresponding to the maximum secrecy capac-
ity is selected to forward the signal, is adopted in this system.
To evaluate the secrecy performance, we derived the closed-
form expression of the secrecy outage probability, as well as
the asymptotic performance. Through our analysis, we found
that there exists a secrecy protection region, where the secrecy
performance will be ensured once we keep the eavesdropper
out of this region. The simulation results validated our analysis
and further demonstrated the existence of the secrecy protec-
tion region.
APP EN DI X
Since Z1=min (γSRn, γRnD), the CDF of Z1can be given
by FZ1(x) = 1 Pr(γS Rnx)·Pr(γRnDx)
= 1 (1 FγS Rn(x))(1 FγRnD(x)).(23)
To derive the CDF of Z1, we first rewrite the CDF of γSRn
by substituting (5) as
FγSRn(x) = Pr( γS|hSRn|2dα
SRn
γE|hERn|2dα
ERn+ 1 < x)
= Pr(ω1< x(ω2+ 1))
=
0
Fω1[x(ω2+ 1)] fω2(ω2)2,(24)
where ω1=γS|hSRn|2dα
SRnand ω2=γE|hERn|2dα
ERn.
By substituting the CDF and PDF into (24) with (13) and
(14), (24) can be calculated as
FγSRn(x) = 1 γSσ2
SRn
γSσ2
SRn+γEσ2
ERnxexp(x
γSσ2
SRn
).
(25)
Similarly, the CDF of γRnDcan be obtained in the same
way. Next, we can derive the CDF of Z1as
FZ1(x) = 1 a1a2
(x+a1)(x+a2)exp(a3x).(26)
Then, employing the derivative of FZ1(x)in (26) with
respect to x, we obtain the PDF of Z1as shown in (15).
ACKNOWLEDGEMENT
This work was supported by the National Natural Sci-
ence Foundation of China under Grant No. 61471037, No.
61771048, and No. 61201181.
REF ER EN CE S
[1] A. D. Wyner, “The wire-tap channel,” Bell Syst. Tech. J., vol. 54, no. 8,
pp. 1355–1367, Oct. 1975.
[2] J. N. Laneman, D. N. C. Tse, and G. W. Wornell, “Cooperative Diversity
in Wireless Networks: Efficient Protocols and Outage Behavior,” IEEE
Trans. Inf. Theory, vol. 50, no. 12, pp. 3062–3080, Dec. 2004.
[3] H. M. Wang and X. G. Xia, “Enhancing wireless secrecy via cooper-
ation: signal design and optimization,” IEEE Commun. Mag., vol. 53,
no. 12, pp. 47–53, Dec. 2015.
[4] Y. Zou, X. Wang, and W. Shen, “Optimal relay selection for physical-
layer security in cooperative wireless networks, IEEE J. Sel. Areas
Commun., vol. 31, no. 10, pp. 2099–2111, Oct. 2013.
[5] X. Lei, L. Fan, R. Q. Hu, and D. S. Michalopoulos, “Secure multiuser
communications in multiple decode-and-forward relay networks with
direct links,” in Proc. IEEE Globecom, Austin, USA, Dec. 2014, pp.
3180–3185.
[6] J. Ding, Q. Yang, and J. Yang, “Secrecy outage probability of minimum
relay selection in multiple eavesdroppers DF cognitive radio networks,
in Proc. IEEE VTC, Nanjing, China, May. 2016, pp. 1–5.
[7] Y. Liu, J. Li, and A. P. Petropulu, “Destination assisted cooperative
jamming for wireless physical-layer security, IEEE Trans. Inf. Forensics
Security, vol. 8, no. 4, pp. 682–694, Apr. 2013.
[8] H. M. Wang, F. Liu, and M. Yang, “Joint cooperative beamforming,
jamming, and power allocation to secure AF relay systems,” IEEE Trans.
Veh. Technol., vol. 64, no. 10, pp. 4893–4898, Oct. 2015.
[9] Y. Liu, L. Wang, T. T. Duy, M. Elkashlan, and T. Q. Duong, “Relay
Selection for Security Enhancement in Cognitive Relay Networks, IEEE
Commun. Lett., vol. 4, no. 1, pp. 46–49, Feb. 2015.
[10] G. Zheng, I. Krikidis, J. Li, A. P. Petropulu, and B. Ottersten, “Improving
physical layer secrecy using full-duplex jamming receivers, IEEE Trans.
Signal Process., vol. 61, no. 20, pp. 4962–4974, Oct. 2013.
[11] G. Chen, Y. Gong, P. Xiao, and J. Chambers, “Physical layer network
security in the full-duplex relay system,” IEEE Trans. Inf. Forensics and
Security, vol. 10, no. 3, pp. 574–583, Mar. 2015.
[12] C. Liu, J. Lee, and T. Q. S. Quek, “Secure Transmission in the Pres-
ence of Full-Duplex Active Eavesdropper,” in Proc. IEEE Globecom,
Singapore, Singapore, Dec. 2017.
[13] X. Tang, P. Ren, and Z. Han, “Power-Efficient Secure Transmission
Against Full-Duplex Active Eavesdropper: A Game-Theoretic Frame-
work,” IEEE Access, vol. 5, pp. 24632–24645, Oct. 2017.
[14] L. Li, A. P. Petropulu, and Z. Chen, “MIMO Secret Communications A-
gainst an Active Eavesdropper,” IEEE Trans. Inf. Forensics and Security,
vol. 12, no. 10, pp. 2387–2401, Oct. 2017.
[15] M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin,,
“Wireless information-theoretic security,” IEEE Trans. Inf. Theory, vol.
54, no. 6, pp. 2515–2534, Feb. 2008.
[16] I. S. Gradshteyn and I. M. Ryzhik, Tabel of Integrals, Series, and
Products, 7th ed. New York, NY, USA: Academic, 2007.
... In a high-density network, a node selection strategy becomes the common technique to secure the cooperative transmission. The authors in [30][31][32] implemented relay selection to overcome an active eavesdropper, but only in dual-hop transmissions. On the other hand, a multihop network with a larger number of nodes makes the node selection process more complex. ...
... Different from previous works in [34][35][36][37] that studied various strategies to improve multihop transmission performance without considering an active eavesdropper attack, we propose a cooperative multihop relaying network in confronting a passive and active eavesdropper using node selection schemes. Other works in [30][31][32] only studied the secrecy performance of a dual-hop transmission under active eavesdropping attacks, while with the higher number of node clusters, the end-to-end security is harder to be deployed in multicluster WSNs [10]. ...
Article
Full-text available
Multihop transmission is one of the important techniques to overcome the transmission coverage of each node in wireless sensor networks (WSNs). However, multihop transmission has a security issue due to the nature of a wireless medium. Additionally, the eavesdropper also attempts to interrupt the legitimate users’ transmission. Thus, in this paper, we study the secrecy performance of a multihop transmission under various eavesdropping attacks for WSNs. To improve the secrecy performance, we propose two node selection schemes in each cluster, namely, minimum node selection (MNS) and optimal node selection (ONS) schemes. To exploit the impact of the network parameters on the secrecy performance, we derive the closed-form expression of the secrecy outage probability (SOP) under different eavesdropping attacks. From the numerical results, the ONS scheme shows the most robust secrecy performance compared with the other schemes. However, the ONS scheme requires a lot of channel information to select the node in each cluster and transmit information. On the other side, the MNS scheme can reduce the amount of channel information compared with the ONS scheme, while the MNS scheme still provides secure transmission. In addition, the impact of the network parameters on the secrecy performance is also insightfully discussed in this paper. Moreover, we evaluate the trade-off of the proposed schemes between secrecy performance and computational complexity.
... However, there are also active eavesdroppers who can eavesdrop information in a more "smart" way. An active eavesdropper, which can perform both eavesdropping and malicious jamming simultaneously, brings an intractable challenging security problem [14][15][16][17][18][19][20][21][22][23][24]. ...
... A novel transmission outage constrained scheme for both reliability and security was proposed to evaluate the secrecy performance and to gain valuable design insights in [22]. An optimal relay selection scheme was developed to improve the security performance with an active eavesdropper in cooperative wireless networks in [23,24]. ...
Article
Full-text available
The security problem in wireless sensor networks faces severe challenges, due to the openness of the sensor network channel and the mobility and diversity of the terminals. When facing randomly located eavesdroppers, the situation is much more complex. This paper studies the security performance of a wireless sensor network where randomly located passive and active eavesdroppers are both considered. Compared to a passive eavesdropper, an active eavesdropper can perform both eavesdropping and malicious jamming simultaneously in a wireless sensor network. Based on beamforming and artificial noise (AN), we propose a practical way to defend against the eavesdropper by establishing a protecting region. An appropriate metric, the hybrid outage probability, which takes both the transmission outage probability and the secrecy outage probability into consideration, is utilized to evaluate the security performance. In addition, the concept of safe transmission range is defined to evaluate the security performance. Simulation results are provided to depict the insecure region and verify the harm of the active eavesdropper to the transmission in the wireless sensor network.
... In recent years, with the development of artificial intelligence, the application of deep learning models to communication systems has become a current research hotspot [9,10]. The literature [11][12][13] proposes a new channel estimation method that treats the channel matrix as a two-dimensional image and achieves channel estimation by image processing through neural networks. ...
Article
Full-text available
Multiple-input multiple-output (MIMO) systems suffer from high BER in the mining environment. In this paper, the mine MIMO depth receiver model is proposed. The model uses densely connected convolutional networks for feature extraction and constructs multiple binary classifiers to recover the original information. Compared with conventional MIMO receivers, the model has no error accumulation caused by processes such as decoding and demodulation. The experimental results show that the model has better performance than conventional decoding methods under different modulation codes and variations in the number of transmitting terminals. Furthermore, we demonstrate that the model can still achieve effective decoding and recover the original information with some data loss at the receiver.
Article
Full-text available
Information security is of paramount importance yet significant challenge for wireless communications. In this paper, we investigate the power-efficient transmissions with security concerns in the presence of a full-duplex (FD) active eavesdropper. With FD capability, the eavesdropper can launch jamming attacks while eavesdropping, which affects the legitimate transmissions such that the legitimate power allocation becomes more favorable for eavesdropping. However, the jamming attacks require additional power consumption and result in selfinterference at the eavesdropper itself. The legitimate user intends for a power-efficient manner to effectively guarantee the secure transmissions to defend against the simultaneous eavesdropping and jamming attacks. We formulate the problem within a Stackelberg game framework where the eavesdropper takes action first as the leader and the legitimate user acts as the follower. We analyze the security game model for both single-channel and multi-channel cases. Furthermore, by exploring the properties of the game equilibrium, we propose the optimal transmission strategy and jamming strategy for the legitimate transmission and eavesdropping, respectively. Finally, we provide extensive simulation results to corroborate our theoretical analysis and evaluate the security performance.
Article
Full-text available
This paper investigates the secrecy performance of full-duplex relay (FDR) networks. The resulting analysis shows that FDR networks have better secrecy performance than half duplex relay networks, if the self-interference can be well suppressed. We also propose a full duplex jamming relay network, in which the relay node transmits jamming signals while receiving the data from the source. While the full duplex jamming scheme has the same data rate as the half duplex scheme, the secrecy performance can be significantly improved, making it an attractive scheme when the network secrecy is a primary concern. A mathematic model is developed to analyze secrecy outage probabilities for the half duplex, the full duplex and full duplex jamming schemes, and the simulation results are also presented to verify the analysis.
Article
Full-text available
This letter proposes several relay selection policies for secure communication in cognitive decode-and-forward relay networks, where a pair of cognitive relays is opportunistically selected for security protection against eavesdropping. The first relay transmits the secrecy information to the destination, and the second relay, as a friendly jammer, transmits the jamming signal to confound the eavesdropper. We present new exact closed-form expressions for the secrecy outage probability. Our analysis and simulation results strongly support our conclusion that the proposed relay selection policies can enhance the performance of secure cognitive radio. We also confirm that the error floor phenomenon is created in the absence of jamming.
Article
This paper considers a scenario in which an Alice-Bob pair wishes to communicate in secret in the presence of an active Eve, who is capable of jamming as well as eavesdropping in Full-Duplex (FD) mode. As countermeasure, Bob also operates in FD mode, using a subset of its antennas to act as receiver, and the remaining antennas to act as jammer and transmit noise. With a goal to maximize the achievable secrecy degrees of freedom (S.D.o.F.) of the system, we provide the optimal transmit/receive antennas allocation at Bob, based on which we determine in closed form the maximum achievable S.D.o.F.. We further investigate the adverse scenario in which Eve knows Bob's transmission strategy and optimizes its transmit/receive antennas allocation in order to minimize the achievable S.D.o.F.. For that case we find the worst-case achievable S.D.o.F.. We also provide a method for constructing the precoding matrices of Alice and Bob, based on which the maximum S.D.o.F. can be achieved. Numerical results validate the theoretical findings and demonstrate the performance of the proposed method in realistic settings.
Article
Physical layer security, or information-theoretic security, has attracted considerable attention recently, due to its potential to enhance the transmission secrecy of wireless communications. Various secrecy signaling and coding schemes have been designed at the physical layer of wireless systems to guarantee confidentiality against information leakage to unauthorized receivers, among which the strategy based on the idea of node cooperation is promising. This article provides an overview of the recent research on enhancing wireless transmission secrecy via cooperation. We take a signal processing perspective and focus on the secrecy signal design and optimization techniques to increase secrecy performance. We also propose some future research directions on this topic.
Article
The idea of multi-user (nodes) cooperation is an efficient way to improve the physical-layer security of a wireless transmission in the presence of passive eavesdroppers. However, due to the half-duplex constraint of the practical transceivers, two phases are required for one round of data transmission, which grants the eavesdroppers two opportunities to wiretap the information. Therefore, protecting the data transmissions in both phases is critical. Towards this end, we propose a joint cooperative beamforming, jamming and power allocation scheme to enhance the security of an amplify-and-forward (AF) cooperative relay network in this correspondence. Different from the existing works assuming that the source node always uses its total power, we show that the secrecy rate is a quasi-concave function of the power of the source node so that allocating its total power may not be optimal. The beamformer design and power optimization problem can be solved by a bisection method together with a generalized eigenvalue decomposition, which has a semi-closed form and is computationally very convenient. Simulations show the joint scheme greatly improves the security.
Article
In this paper, we study a downlink multiuser network in which one base station sends its message to one of multiple users, assisted by one of multiple intermediate decode-and-forward (DF) relays. Multiple eavesdroppers exist at the receiver side, and they can overhear the message from the base station, which brings out the issue of information security. We consider moderate shadowing environments so that direct links from the base station to the users and eavesdroppers exist. Maximal ratio combing (MRC) technique is employed at the receivers to combine the signals from the relaying and direct links. We select the best user and relay pair by maximizing the received signal-to-noise ratio (SNR) at the user. We study the effects of the selection on the system secrecy performance by deriving the closed-form expression of secrecy outage probability. We also provide the asymptotic secrecy outage probability with high transmit power and high main-to-eavesdropper ratio (MER). From the asymptotic expression, we can find that the system can achieve the diversity of the total number of users and relays, irrespective of the number of eavesdroppers. Simulation and numerical results are finally demonstrated to verify the proposed studies.
Article
A wireless network with one source, one destination, one eavesdropper, and multiple decode-and-forward relays is considered. A two-slot cooperative relaying scheme is proposed that targets at maximizing the secrecy rate. In the first slot, the source transmits the information bearing signal, and at the same time, it cooperates with the destination in jamming the eavesdropper without creating interference at the relay. In the second slot, one optimally selected relay retransmits the decoded source signal, and at the same time, that particular relay cooperates with the source to jam the eavesdropper without creating interference at the destination. Optimal relay selection and also optimal power allocation among the first/second slot data signal and jamming noise are proposed. It is shown that the secrecy rate of the proposed scheme scales with the total system power P0 and the number of available relays K according to 1/2log2(1 + P0 /8logK) - 1.6 bits/channel use . Although the proposed power allocation and relay selection assume global CSI available, the performance under imperfect relay CSI is also investigated. Also, the performance under distributed relay selection with limited feedback is demonstrated.