ArticlePDF Available

Cooperative-Jamming-Aided Secrecy Enhancement in Wireless Networks With Passive Eavesdroppers

Authors:

Figures

Content may be subject to copyright.
2108 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 67, NO. 3, MARCH 2018
Cooperative-Jamming-Aided Secrecy Enhancement
in Wireless Networks With Passive Eavesdroppers
Lin Hu , Hong Wen , Bin Wu, Jie Tang, Fei Pan, and Run-Fa Liao
Abstract—This paper investigates cooperative security in wire-
less networks, where a source (Alice) intends to transmit a con-
fidential message to a legitimate destination (Bob), with the help
of a cooperative jammer (Charlie), coexisting with multiple pas-
sive eavesdroppers (Eves). In particular, by assuming knowledge
of Bob’s perfect channel state information (CSI) but only Eves’
statistical CSIs, secrecy beamforming with artificial noise (AN) is
utilized for secure transmission, and cooperative jamming (CJ) is
explored to further enhance secrecy. We first derive an accurate
closed-form expression for the secrecy outage probability (SOP),
and establish the condition under which positive secrecy rate is
achievable. Then, we provide a secure transmit design for max-
imizing the SOP constrained secrecy rate. Moreover, based on a
strict mathematical analysis, we characterize the impact of the
main channel quality and the number of Eves on transmit design
and secrecy performance. Specifically, optimal power allocation
ratio between the information-bearing signal and the AN signal
increases as the main channel quality improves, and decreases
with the number of Eves. Numerical results confirm that our de-
sign achieves performance improvement in terms of both secrecy
rate and secure energy efficiency, as compared to the approach
without CJ.
Index Terms—Artificial noise (AN), cooperative jamming (CJ),
physical layer security, secrecy rate, secrecy outage probability
(SOP), secure energy efficiency (EE).
I. INTRODUCTION
WIRELESS communication is particularly vulnerable
to eavesdropping due to the open nature of wireless
medium, and thus guarantying secrecy is one of the top issues in
wireless networks. By exploring physical properties of wireless
channel, physical layer security [1]–[3] can maintain confiden-
Manuscript received May 14, 2017; revised July 15, 2017; accepted Au-
gust 17, 2017. Date of publication August 25, 2017; date of current version
March 15, 2018. This work was supported in parts by the 863 High Technol-
ogy Plan under Grant 2015AA01A707 and the NSFC under Grants 61572114
and 61372085. This paper was presented at the IEEE Vehicular Technology
Conference, Toronto, Canada, September 2017. The review of this paper was
coordinated by Prof. X. Fang. (Corresponding author: Hong Wen.)
L. Hu, H. Wen, J. Tang, F. Pan, and R.-F. Liao are with the National Key
Laboratory of Science and Technology on Communications, University of
Electronic Science and Technology of China, Chengdu 611731, China (e-mail:
lin.hu.uestc@gmail.com; sunlike@uestc.edu.cn; cs.tan@163.com; panfeivivi@
hotmail.com; runfa.liao@std.uestc.edu.cn). (e-mail:,lin.hu.uestc@gmail.com;
sunlike@uestc.edu.cn; cs.tan@163.com; panfeivivi@hotmail.com;
runfa.liao@std.uestc.edu.cn).
B. Wu is with the Tianjin Key Laboratory of Advanced Networking (TANK),
School of Computer Science and Technology, Tianjin University, Tianjin
300350, China (e-mail: binw@tju.edu.cn). (e-mail:,binw@tju.edu.cn).
Color versions of one or more of the figures in this paper are available online
at http://ieeexplore.ieee.org.
Digital Object Identifier 10.1109/TVT.2017.2744660
tiality against eavesdroppers, and is identified as a significant
complement to cryptographic techniques.
The pioneering work on physical layer security can be traced
back to the wiretap channel model [4], which is then extended
to the Gaussian degraded wiretap channel [5] and the gen-
eral non-degraded wiretap channel [6]. Based on these works,
secrecy-enhancing techniques are extensively studied, e.g., se-
cure multi-antenna transmission in [7]–[9], and cooperative se-
curity in [10]–[19]. The key issue is to improve the secrecy
rate, defined as the nonnegative rate difference between the
main channel (from source to destination) and the eavesdropper
channel (from source to eavesdropper) [20]. When the eaves-
dropper’s channel state information (CSI) is unknown, secrecy
beamforming with artificial noise (AN) is proposed in [7]. In
particular, power allocation between the information-bearing
signal and the AN signal is examined in [9] for networks with
randomly distributed eavesdroppers.
For cooperative networks, several protocols are designed,
such as amplify-and-forward (AF), decode-and-forward (DF)
[14], and cooperative jamming (CJ) [15]–[17]. Specifically, the
secrecy rate maximization (SRM) problem under the secrecy
outage probability (SOP) constraint is investigated for single-
input single-output (SISO) [15], single-input multiple-output
(SIMO) [16], and multiple-input single-output (MISO) wiretap
channels [17]. In addition, combinations of relaying (AF or DF)
and CJ scheme are studied in [18], [19].
However, the works on cooperative security [14]–[16], [18]
and [19] assume that both source and relay nodes are equipped
with a single antenna, leading to a limited application scope.
Our work is different from these studies in that we focus on
multi-antenna secure transmission. Although the work in [17]
provides a CJ scheme for secrecy enhancement in multi-antenna
wireless systems, the number of transmit antennas is predeter-
mined, and only a single eavesdropper is considered. Rather
than fixing the number of transmit antennas to specific values,
we extend the investigation in [17] to more general antenna
configurations, and extend CJ scheme to the case with multiple
passive eavesdroppers.
Furthermore, recent studies on cooperative secure transmis-
sion are mainly concerning about secrecy rate performance.
However, a greedy pursuit for secrecy performance improve-
ment may lead to excessively high power consumption, and
increase system complexity by involving more nodes for co-
operation. Therefore, secure energy efficiency (EE) should be
considered for cooperative transmit design. To the best of our
knowledge, there are few works on secure EE for cooperative
0018-9545 © 2017 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications standards/publications/rights/index.html for more information.
HU et al.: COOPERATIVE-JAMMING-AIDED SECRECY ENHANCEMENT IN WIRELESS NETWORKS WITH PASSIVE EAVESDROPPERS 2109
Fig. 1. Cooperative jamming for secrecy enhancement in wireless networks.
networks. In particular, the problem of secure EE maximiza-
tion is investigated in [21]. However, the eavesdropper’s perfect
CSI is assumed to be available at transmitters, which is usually
impractical for general applications. To alleviate this strong as-
sumption, we propose a CJ scheme with only the statistical CSIs
of eavesdroppers, and evaluate both the secrecy rate and secure
EE performance.
Our contributions can be summarized as follows:
1) We present an accurate closed form expression for SOP,
and further establish the condition under which positive
secrecy rate can be achieved.
2) The explicit transmit design for the SOP constrained SRM
problem is obtained by optimizing power allocation and
rate parameters of the wiretap code. Moreover, we demon-
strate the impact of specific parameters (e.g., the number
of Eves and the main channel quality) on transmit designs,
through strict mathematical proofs.
3) We analyze the secure transmit strategy in the high signal-
to-noise ratio (SNR) regime. Specifically, based on the
asymptotic analysis, we obtain an accurate approximation
for explicit design solutions.
Notations: null(X)is the null space of X, and Π
Xis the
orthogonal complement projector of X.CN (µ,Q),Γ(k, μ),
and Exp(λ)denote the circularly symmetric complex Gaussian
distribution with mean µand covariance Q, gamma distribution
with shape kand scale μ, and exponential distribution with rate
parameter λ, respectively. ·is the 2norm. log(·)and ln(·)de-
note the base-2 and natural logarithms, respectively. Γ(α)is the
gamma function [22, 8.310.1], 1F1(α;γ;z)denotes the degener-
ate hypergeometric function [22, 9.210.1], and 2F1(α, β;γ;z)
denotes the Gauss hypergeometric function [22, 9.100]. The
symbols ,, and ⇐⇒ denote “defined as”, “implies”, and
the equivalence relation, respectively. The right limit of f(x)at
xis defined as f(x+)limρ0f(x+ρ).
II. SYSTEM MODEL AND PROBLEM FORMULATION
System model is shown in Fig. 1, where a source (Alice)
transmits a confidential message to a destination (Bob) with
AN-assisted secrecy beamforming, in the presence of passive
eavesdroppers (Eves). Besides, there is a cooperative jammer
(Charlie) which emits jamming signals to confuse Eves. Alice
and Charlie are equipped with Naand Ncantennas, respectively,
while Bob and each Eve are equipped with only a single antenna.
The set of Eves is defined as K{1,2, ..., K}. Channels from
Alice to Bob and the kth Eve, k∈K, are denoted by hba CNa
and he,k CNa, respectively, and those from Charlie to Bob
and the kth Eve are denoted by hbc CNcand ge,k CNc,
respectively. All channels are assumed to be independent under
slow flat fading conditions.1Bob’s perfect CSI is assumed to
be available, and he,k and ge,k,k∈K, are modeled as random
vectors with distributions CN(0,INa)and CN (0,INc), respec-
tively. These statistical distributions are assumed to be available
at both Alice and Charlie.
Given that Alice transmits signal saCNaand Charlie trans-
mits signal scCNc, then received signals at Bob and the kth
Eve can be expressed as
yb=hH
basa+hH
bcsc+nb,(1)
ye,k =hH
e,ksa+gH
e,ksc+ne,k ,k∈K,(2)
where nb,ne,k ∼CN(0,1)represent additive complex white
Gaussian noise (AWGN) at Bob and the kth Eve, respectively.
Note that the jamming signal scinterferes both Eves and Bob.
Therefore, secrecy is compromised if the transmission of scis
inappropriately designed. To utilize this interference in a posi-
tive way, a zero-forcing (ZF) constraint is imposed at Charlie,
and sccan be constructed as
sc=Pc/(Nc1)Wzc,(3)
where Pcis the transmit power of Charlie; Wis an orthonor-
mal basis for null hH
bc;zcCNc1denotes a Gaussian noise
vector with distribution CN(0,INc1).
For secure transmission from Alice to Bob, AN-assisted se-
crecy beamforming is developed. Let Pabe the transmit power
of Alice, and let φ(0,1]be the fraction of Paallocated to the
information-bearing signal. Then sais given by
sa=Paφvx+Pa(1φ)/(Na1)Vza.(4)
The first term on the right hand side of (4) represents the
information-bearing signal, where x∼CN(0,1)corresponds
to the data symbol for Bob; v=hba/hba is the secrecy
beamforming vector. The second term represents the AN sig-
nal, where zaCNa1is a Gaussian noise vector with dis-
tribution CN(0,INa1);Vdenotes an orthonormal basis for
null hH
ba. From (1)–(4), the signal-to-interference-plus-noise
ratios (SINRs) at Bob and the kth Eve, k∈K,aregivenby
γb=Paφhba2,(5)
γe,k =Paφ|hH
e,kv|2
1+Pa(1φ)
Na1hH
e,kV2+Pc
Nc1gH
e,kW2.(6)
Utilizing Wyner’s wiretap code [4], the confidential informa-
tion is encoded before transmission. Alice determines two rates,
namely, the overall codeword rate Rblog(1+γb), and the se-
crecy data rate Rs, with the rate redundancy Re=RbRsfor
1For slow fading channels, the SOP and SOP constrained secrecy rate are two
important indicators for secrecy performance [2], [8].
2110 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 67, NO. 3, MARCH 2018
anti-eavesdropping. According to the compound wiretap chan-
nel model with multiple Eves [23], as long as one Eve is able
to decode the secret message, i.e., log (1+ maxk∈K γe,k)>R
e,
perfect secrecy cannot be guaranteed and secrecy outage occurs.
According to [8], the SOP can be defined as
εPr maxk∈K γe,k >2RbRs1.(7)
Let εth be a maximum allowable SOP. Then the SOP constrained
SRM problem can be formally formulated as
max Rss.t. εεth;01.(8)
III. SECRECY RATE MAXIMIZATION
The SOP constrained SRM Problem in (8) is difficult to solve
directly. The main obstacle lies in the probabilistic SOP con-
straint (i.e., εεth). In this section, we divide the solution
process into three steps. First, we derive a closed form expres-
sion for SOP constraint. Then, we transfer problem (8) into
a tractable power allocation problem. Finally, we develop an
efficient numerical method to obtain the optimal solution.
A. Formulation of the Explicit SOP Constraint
To simplify the analysis, we define new variables as follows
XkPaφ|hH
e,kv|2,Y
kPa(1φ)
Na1hH
e,kV2,(9)
ZkPc
Nc1gH
e,kW2,ΥkYk+Zk2RbRs1,
(10)
where k∈K. Consequently, the SOP defined in (7) can be
represented as
ε=Prmax
k∈K
Xk
1
k
.(11)
Note that hek ∼CN(0,INa)and gek ∼CN(0,INc). Then, it
can be verified that XkExp(λ),YkΓ(α1,λ1), and Zk
Γ(α2,λ2), where α1Na1, α2Nc1, λ1/(Paφ),
λ1α1/(Pa(1φ)), and λ2α2/Pc.
According to [24, Th. 2 in ch. 2.7], the SINRs at Eves (i.e.,
γe,1
e,2, ..., γe,K ) are independent and identically distributed
(i.i.d.) random variables. Therefore, the SOP in (11) is given by
ε=1Pr max
k∈K
Xk
1
k
μ
=1Pr Xk
1
k
μK
.(12)
Proposition 1: A closed form expression for the SOP in (12)
can be expressed as
ε=11λ1
λ1+λμα1λ2
λ2+λμα21
eλμK
.(13)
Proof: Please refer to Appendix A.
From (7), it can be shown that εincreases with Rsfor any fixed
Rb, and we can conclude that the SOP constraint in problem (8)
holds with equality at the maximum secrecy rate, i.e., ε=εth.
Rearranging and simplifying (13) leads to
ln 1
1(1εth)1
K=w
Pa
+α1ln 1+(1φ)w
α1
+α2ln 1+w
d,(14)
where wμ/φ and dPaλ2.
B. Reformulation of the SRM Problem (8)
Let γBPahba2be the maximum SNR at Bob. Then the
objective function of (8) can be expressed as
Rs=Rblog(1+μ) = log 1+φγB
1+φw .(15)
Note that Rsdepends on both φand w. As given in (14), wcan
be taken as an implicit function of φ, denoted by w(φ). It can
be verified that w(φ)>0. Then, Rsin (15) can be taken as a
function of φ, denoted by Rs(φ). Hence, problem (8) can be
equivalently reformulated as
max Rs(φ) = log 1+φγB
1+φw(φ)s.t. (14); 01.
(16)
C. Power Allocation for SRM Problem (16)
By analyzing (14), we can obtain the following results.
Lemma 1: The function w(φ)determined by (14) is mono-
tonically increasing with φ.
Proof: Taking the derivative on both sides of (14) with re-
spect to φ, we can derive w(φ)as in (17) shown at the bottom
of this page. It is positive, and hence establishing the desired
result.
Corollary 1: The function (1φ)w(φ)determined by (14)
is monotonically decreasing with φ.
Proof: According to Lemma 1, both the first and third terms
on the right-hand side of (14) increase with φ. Hence, in order to
satisfy the SOP constraint in (14), (1φ)w(φ)must decrease
with φ, leading to the desired result.
w(φ)= Paα1w(φ)+dw(φ)
α1+(1φ)w(φ)w(φ)+d+Paα1(1φ)w(φ)+d+Paα2α1+(1φ)w(φ).(17)
w(φ)
w(φ)=Paα1
α1+(1φ)w(φ)+Paα1(1φ)+Paα2
α1+(1φ)w(φ)
w(φ)+d
.(18)
HU et al.: COOPERATIVE-JAMMING-AIDED SECRECY ENHANCEMENT IN WIRELESS NETWORKS WITH PASSIVE EAVESDROPPERS 2111
Corollary 2: The function w(φ)/w(φ)is monotonically in-
creasing with φ.
Proof: According to (17), w(φ)/w(φ)can be expressed as
in (18), shown at the bottom of the previous page. It can be shown
that the denominator strictly decreases with φ. This establishes
the desired result.
Proposition 2: The objective function of problem (16) is
strictly concave on φ.
Proof: According to (15), R
s(φ)can be calculated as
R
s(φ)= 1
ln(2)γB
1+φγB
w(φ)+φw(φ)
1+φw(φ)
=γBw(φ)φ(1+γBφ)w(φ)
(1+γBφ)1+φw(φ)ln(2)
=1
ln(2)
γBw(φ)
(1+φγB)1+φw(φ)
w(φ)
w(φ)
1+1
φw(φ)
.
(19)
Note that the first and second terms on the right-hand side of
(19) are monotonically decreasing and increasing functions of
φ, respectively. As a result, R
s(φ)<0, and hence by the second
order condition [25] we obtain Proposition 2.
Corollary 3: Rs(φ)in (16) is monotonically increasing with
φwhen R
s(1)0, and decreasing with φwhen R
s(0+)0.
Proof: By Proposition 2, it follows that when R
s(1)
0, R
s(φ)>R
s(1)0 for all φ(0,1). In contrast, when
R
s(0+)0, it follows that R
s(φ)<R
s(0+)0 for all φ
(0,1]. This completes the proof of Corollary 3.
With the above results, an efficient numerical method for
solving problem (16) can be developed, where three different
cases are characterized as follows.
1) Case 1: R
s(0+)0.
According to Corollary 3, it is optimal for Alice to
suspend secure transmission (i.e., Rs=0). Therefore,
a positive secrecy rate cannot be guaranteed in this
case.
2) Case 2: R
s(0+)>0 and R
s(1)<0.
From Proposition 2, it entails that there must ex-
ists an unique optimal solution φ(0,1)such that
R
s(φ)=0. Furthermore, it can be verified that R
s(φ)
>0 when φ(0
), and thus Rs(φ)>R
s(0+)
=0, i.e., a positive secrecy rate is achievable in this
case.
3) Case 3: R
s(1)0.
By Corollary 3, φ=1 is the optimal solution. Moreover,
it can be shown that Rs(1)>R
s(0+)=0, and hence a
positive secrecy rate can be guaranteed in this case.
Remark 1: For Case 1, the same solution can also be ob-
tained as follows. According to (19), we can conclude that
R
s(0+)=γBw(0+)
ln(2)0⇐⇒ γBw(0+).(20)
Then by Lemma 1, γBw(φ)for all φ(0,1]. Therefore, by
(15), it is optimal for Alice to suspend secure transmission.
Remark 2: From Cases 1–3, a positive secrecy rate is achiev-
able only when R
s(0+)>0. According to Remark 1, it is equiv-
alent to γB>w(0+), where w(0+)can be obtained by solving
the following equation:
ln 1
1(1εth)1
K=w(0+)
Pa
+α1ln 1+w(0+)
α1
+α2ln 1+Pcw(0+)
Paα2.(21)
In other words, the maximum SNR at Bob is larger than a thresh-
old associated with the SOP constraint. When other parameters
are fixed in (21), w(0+)decreases with Pc. Therefore, the jam-
ming signal transmitted by Charlie is helpful in achieving a
positive secrecy rate.
Remark 3: For Case 2, it is difficult to obtain an analytical
expression for φ, and numerical methods can be developed
by solving simultaneous equations composed of R
s(φ)=0
and (14). In the high SNR region (i.e., Pais large), φcan be
approximated as in (22) (see Appendix B for details).
φ1
1+α1
1(1εth)1
K1
α1
α1
.(22)
Remark 4: When Pcis much larger than Pa,φ=1isthe
optimal solution. In other words, all transmit power of Alice is
allocated to the information-bearing signal. A brief analysis is
given as follows. From (19), R
s(1)0 is equivalent to
γBw(1)+(1+γB)w(1).(23)
Then, substituting φ=1 into (14) and (17), we obtain that
ln 1
1(1εth)1
K=w(1)
Pa
+α2ln 1+w(1)
d,(24)
w(1)= Paα1w(1)(w(1)+d)
α1(w(1)+d)+Paα1α2
.(25)
Since d=α2Pa/Pc0asPc/Pa→∞, (24) entails w(1)
0, and (25) entails w(1)0. Therefore, the condition in (23)
can be satisfied, leading to φ=1.
Based on the above discussion, the following proposition
characterizes relationships between φand specific parameters,
including the number of Eves (denoted by K) and the main
channel quality (denoted by hba2).
Proposition 3: For problem (16), when the number of Eves
increases, more power should be allocated to the AN signal,
and the secrecy rate decreases. However, when the main chan-
nel quality improves, more power should be allocated to the
information-bearing signal, and the secrecy rate increases.
Proof: Please refer to Appendix C.
IV. NUMERICAL RESULTS
In this section, we verify the performance of the proposed
CJ scheme. System parameters are set as Na=Nb=4, εth =
0.1. Unless otherwise specified, we set hba=1. Besides, the
secrecy rate is measured by bits per channel use (bpcu), and the
2112 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 67, NO. 3, MARCH 2018
Fig. 2. Secrecy rate versus transmit power of Alice.
Fig. 3. Secure EE versus the total transmit power.
Fig. 4. Optimal power allocation ratio versus transmit power of Alice.
secure EE (defined as the ratio of secrecy rate to total power
consumption.) is measured by bits per joule.
Fig. 2 provides the secrecy rate performance. Obviously, se-
crecy rate performance is enhanced with the help of Charlie.
Specifically, a positive secrecy rate is guaranteed in low SNR
region. This is mainly due to the interference generated by
Fig. 5. The impact of Kon Rsand φ, with Pa=20 dB.
Fig. 6. The impact of the hba2on Rsand φ, with Pa=20 dB, K=16.
Charlie, which causes significant performance degradation at
Eves. Another reason is that our proposed CJ scheme consumes
more power than the approach without CJ. However, as shown
in Fig. 3, a higher secure EE performance can be achieved in
a wide range of total transmit power. Fig. 2 also shows that in-
creasing power consumption may cause secure EE performance
degradation. This reveals that there exists a trade-off between
secrecy rate and secure EE performance.
Fig. 4 presents the optimal power allocation ratio. It shows
that with the help of Charlie, more power should be allocated
to transmit the confidential message. In particular, full power
is used for information-bearing signal when Pcis much larger
than Pa, as shown in Remark 4. In this case, the interference
created by Charlie is strong enough to mask the transmission of
the confidential message. As a result, the secrecy beamforming
without AN is performed at Alice. However, as Pakeeps in-
creasing, the probability of information leakage increases, and
hence it is preferable to perform AN-assisted secrecy beam-
forming at Alice. In addition, when Pabecomes very large, the
optimal power allocation ratio φconverges to a constant value,
HU et al.: COOPERATIVE-JAMMING-AIDED SECRECY ENHANCEMENT IN WIRELESS NETWORKS WITH PASSIVE EAVESDROPPERS 2113
as discussed in Remark 3. It can also be shown that our proposed
approximation is quite accurate.
Figs. 5 and 6 describe the impact of the number of Eves and
the main channel quality on power allocation and secrecy rate.
It can be shown that more power is allocated to the AN sig-
nal as Kincreases. In contrast, more power is allocated to the
information-bearing signal as hba2increases. This is consis-
tent with the result presented in Proposition 3.
V. C ONCLUSION
In this paper, we investigated a cooperative jamming (CJ)
scheme for secrecy enhancement. Specifically, we provided an
explicit transmit design for secrecy rate maximization (SRM)
problem, subject to the secrecy outage probability (SOP) con-
straint. Moreover, for the high signal-to-noise ratio (SNR)
regime, an accurate approximation for design solution was ob-
tained based on asymptotic analysis. By deriving a closed form
expression for SOP, we established a condition under which
positive secrecy rate can be guaranteed. Through strict math-
ematical proofs, we clearly revealed the impacts of specific
parameters on the optimal power allocation, including the num-
ber of eavesdroppers and the main channel quality. Numerical
results confirmed that both the security performance and the
secure energy efficiency (EE) can be enhanced, compared with
the approach without CJ.
APPENDIX A
PROOF OF PROPOSITION 1
Proof: The proof consists of two steps. First, the probability
density function (PDF) of Υkis calculated. Then, we provide
the complementary cumulative distribution function (CCDF) of
γe,k, which can be utilized to derive a closed form expression
for the SOP.
1) First step: According to [22, 3.383.1] and [24], the PDF of
Υkcan be calculated as
fΥk(υ)=
−∞
fYk(υz)fZk(z)dz
=λα1
1λα2
2eλ1υ
Γ(α1)Γ(α2)υ
0
zα21(υz)α11e(λ1λ2)zdz
=λα1
1λα2
2υα1+α21
eλ1υΓ(α1+α2)1F1(α2;α1+α2;(λ1λ2)υ),
(26)
where υ>0. The last equation follows from α1
2>0.
2) Second step: From (26), the CCDF of γe,k is given by
¯
Fγe,k (τ)= Pr(γe,k )
=Pr(Xk+τΥk)
=
0
τ+τυ
λeλxdxfΥk(υ)
=λα1
1λα2
2eλτ
Γ(α1+α2)
0
υα1+α21
e(λ1+λτ)υ
×1F1α2;α1+α2;(λ1λ2)υdυ, (27)
where τ>0. By [22, 7.621.4], we can obtain a closed form for
(27), and three different cases are characterized as follows.
1) Case 1: λ1=λ2.
Since α1+α2>0, it follows that
¯
Fγe,k (τ)=λα1+α2
1eλτ
Γ(α1+α2)
0
υα1+α21
e(λ1+λτ)υ
=λα1+α2
1eλτ
(λ1+λτ)α1+α2.(28)
2) Case 2: λ1>λ2.
In this case, we can infer that
λ1+λτ>λ1λ2>0⇒|λ1+λτ|>|λ1λ2|.
(29)
Then, we can obtain that
¯
Fγe,k (τ)
=λα1
1λα2
2eλτ
(λ1+λτ)α1+α22F1α2
1+α2;α1+α2;λ1λ2
λ1+λτ
=λ1
λ1+λτα1λ2
λ2+λτα21
eλτ.(30)
3) Case 3: λ1<λ2.
In this case, we can infer that
λ2+λτ>λ2λ1>0⇒|λ2+λτ|>|λ2λ1|.
(31)
Thus, we can obtain that
¯
Fγe,k (τ)=λα1
1λα2
2eλτ
Γ(α1+α2)
0
e(λ1λ2)υ
e(λ1+λτ)υυα1+α21
×1F1α1;α1+α2;(λ2λ1)υ
=λα1
1λα2
2eλτ
(λ2+λτ)α1+α22F1
×α1
1+α2;α1+α2;λ2λ1
λ2+λτ
=λ1
λ1+λτα1λ2
λ2+λτα21
eλτ.(32)
By (28), (30), and (32), the CCDF of γe,k is written as
¯
Fγe,k (τ)=λ1
λ1+λτα1λ2
λ2+λτα21
eλτ.(33)
Then, the SOP in (12) can be rewritten as
ε=11¯
Fγe,k (μ)K.(34)
Substituting (33) into (34), we have Proposition 1.
APPENDIX B
APPROXIMATION FOR THE OPTIMAL SOLUTION IN (22)
Recall that γBPahba2, it follows that γBincreases with
Pa, and hence the condition γB>w(0+)is satisfied when Pa
is large. Then by Remark 2, a positive secrecy rate is achievable
under this condition, meaning that φ>0.
2114 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 67, NO. 3, MARCH 2018
In addition, since dPaλ2→∞as Pa→∞,itfollowsthat
the SOP constraint in (14) can be approximated as
ln 1
1(1εth)1
K=α1ln 1+(1φ)w(φ)
α1.(35)
After some rearrangement of terms, we can obtain that
(1φ)w(φ)=α1
1(1εth)1
K1
α1
α1
w(φ)= 1
(1φ)2α1
1(1εth)1
K1
α1
α1.
(36)
Besides, as Pabecomes large, R
s(φ)in (19) can be approxi-
mated as
R
s(φ)= 1φ2w(φ)
φ1+φw(φ)ln(2).(37)
It can be shown from (36) that w(φ)→∞ as φ1, and
consequently by (37) that R
s(1)<0 holds true. Then according
to Case 2 discussed in Section III-C, we can obtain that φ<1.
Finally, by substituting (36) into (37) we obtain that
R
s(φ)=
1φ
1φ2α1
1(1εth)1
K1
α1
α1
φ1+φw(φ)ln(2).
(38)
Then by solving R
s(φ)=0, we obtain the expression in (22).
APPENDIX C
PROOF OF PROPOSITION 3
Proof: The proof is divided into two parts. First, we prove
that optimal power allocation ratio and secrecy rate decrease
with K. Then, we prove that they are increasing with hba2.
1) First step: For simplicity, we define a function of Kas
ρ(K)ln 1
1(1εth)1
K.(39)
It can be shown that ρ(K)is a monotonically increasing function
of K. In addition, the SOP constraint in (14) can be rewritten as
ρ(K)= w
Pa
+α1ln 1+(1φ)w
α1+α2ln 1+w
d.
(40)
w(K, φ)=
α1
1
Pa(α1
w(K,φ)+1φ)+α1(1φ)
w(K,φ)+α2
w(K,φ)+d(α1
w(K,φ)+1φ).
(41)
As given in (40), the parameter wcan be taken as an implicit
function of (K, φ), which can be represented as w(K, φ). Then,
according to (17), the derivative of w(K, φ)at φ, denoted by
w(K, φ), can be expressed as in (41).
Lemma 2: The function w(K, φ)in (41) is monotonically
increasing with w(K, φ)and φ.
Proof: It can be shown that the denominator of (41) mono-
tonically decreases with w(ρ(K))and φ, and hence the mono-
tonicity of w(K, φ)is established.
Besides, the objective function of (16) can be rewritten as
Rs(K, φ) = log 1+φγB
1+φw(K, φ).(42)
R
s(K, φ)=γBw(K, φ)φ(1+γBφ)w(K, φ)
(1+γBφ)1+φw(K, φ)ln(2).(43)
ρ(K1)=w(K1
1)
Pa
+α1ln 1+(1φ
1)w(K1
1)
α1
+α2ln 1+w(K1
1)
d,(44)
ρ(K2)=w(K2
2)
Pa
+α1ln 1+(1φ
2)w(K2
2)
α1
+α2ln 1+w(K2
2)
d.(45)
Then the derivative of Rs(K, φ)at φ, denoted by R
s(K, φ),
can be expressed as in (43).
Lemma 3: Rs(K, φ)in (42) is strictly concave over φ.
Proof: For any fixed K, this result directly follows from
Proposition 2.
Suppose that φ
1and φ
2are optimal power allocation ratios
for K=K1and K=K2, respectively. We also assume without
loss of generality that K1<K
2.
Lemma 4: If φ
1=φ
2, then we have w(K2
2)>w(K1
1)
and w(K2
2)>w
(K1
1).
Proof: According to (40), SOP constraints for K=K1and
K=K2can be rewritten as in (44) and (45), respectively.
By the monotonicity of ρ(K), we obtain that ρ(K2)(K1).
Then comparing (44) with (45), it follows that w(K2
2)>
w(K1
1). Then, it can be shown that the denominator of (41)
decreases with K, and hence w(K2
2)>w
(K1
1),imply-
ing the desired result.
In the next, a comparison between φ
1and φ
2, and that between
Rs(K1
1)and Rs(K2
2)can be made. Specifically, four
different cases are characterized as follows.
1) Case 1: γBw(K2,1)+(1+γB)w(K2,1).
By (43), it can be shown that this condition is equivalent
to R
s(K2,1)0, and hence, by Lemma 3, φ
2=1. Then
by Lemma 4 , it follows that w(K2,1)>w(K1,1)and
w(K2,1)>w
(K1,1), and hence we obtain that
γB>w(K1,1)+(1+γB)w(K1,1),(46)
which results in φ
1=1, i.e., φ
1=φ
2=1. Moreover, by
(42), we can obtain that
HU et al.: COOPERATIVE-JAMMING-AIDED SECRECY ENHANCEMENT IN WIRELESS NETWORKS WITH PASSIVE EAVESDROPPERS 2115
Rs(K2
2) = log 1+γB
1+w(K2,1)
<log 1+γB
1+w(K1,1)
=Rs(K1
1).(47)
2) Case 2: γBw(K1,0+).
By (43) this condition is equivalent to R
s(K1,0+)0,
and consequently, by Lemma 3, φ
1=0. Besides, by
Lemma 4, we can obtain that γB<w(K2,0+), and
φ
2=0 follows by a similar argument. Then, by (42), we
can obtain that positive secrecy rate cannot be guaranteed
in this case, i.e., Rs(K1
1)=Rs(K2
2)=0
3) Case 3: w(K1,0+)
Bw(K2,0+).
Combining Case 1,Case 2 stated above and Remark 2 in
Section III-C, it follows that φ
1
2=0, and hence we
conclude that Rs(K1
1)>R
s(K2
2)=0.
4) Case 4: w(K2,0+)
B<w(K2,1)+(1+γB)w
(K2,1).
Note that by Lemma 4, we have that γB>w(K1,0+),
and thus, by Remark 2, φ
1
2(0,1]. In addition, it
can be shown that γB<w(K2,1)+(1+γB)w(K2,1)
is equivalent to R
s(K2,1)<0, and thus, by Lemma 3, we
have that φ
2<1. Combining above information, we can
conclude that 0
11, Rs(K1
1)>0, 0
2<1
(or equivalently R
s(K2
2)=0), and Rs(K2
2)>0.
Next, two different situations are considered below.
φ
1=1.
Obviously, we have φ
1
2, and in addition, φ
1=1
is equivalent to R
s(K1
1)0, and then we have
γBw(K1,1)+(1+γB)w(K1,1),(48)
w(K2
2)+(1+γB)w(K2
2)
Bw(K1,1)+(1+γB)w(K1,1).(49)
To prove w(K2
2)>w(K1,1), assume in contra-
diction that w(K2
2)w(K1,1). Then by (49) it
follows that w(K2
2)>w
(K1,1), contradicting
the monotonicity of w(K, φ)(see Lemma 2). We
thus conclude that w(K2
2)>w(K1,1), and then
by (42), we obtain that
Rs(K2
2) = log 1+γBw(K2
2)
1
φ
2+w(K2
2)
<log 1+γBw(K1
1)
1
φ
1+w(K1
1)
=Rs(K1
1).(50)
–0
1<1.
According to Lemma 3, this condition is equivalent
to R
s(K1
1)=0, then by (43) we obtain that
γB=w(K1
1)+φ
1(1+γBφ
1)w(K1
1)
=w(K2
2)+φ
2(1+γBφ
2)w(K2
2).
(51)
To prove φ
2
1, we assume in contradiction that
φ
2φ
1. Since ρ(K2)(K1), then by (44)–(45),
w(K2
2)>w(K1
1), and hence by (51) we have
φ
1(1+γBφ
1
)w(K1
1)
2(1+γBφ
2)w(K2
2)
w(K1
1)>w
(K2
2),(52)
which is contradicting the monotonicity of w(K, φ)
(see Lemma 2). Thus we have φ
2
1.
To show w(K2
2)>w(K1
1), suppose in contra-
diction that w(K2
2)w(K1
1). Then by (51),
it follows that
φ
1(1+γBφ
1)w(K1
1)φ
2(1+γBφ
2)w(K2
2)
w(K1
1)<w
(K2
2),(53)
contradicting the monotonicity of w(K, φ)(see
Lemma 2). Thus we have w(K2
2)>w(K1
1).
Then by (42) we obtain Rs(K2
2)<R
s(K1
1).
Hence, we conclude that if K2>K
1, then φ
2φ
1and
Rs(K2
2)Rs(K1
1). A brief summary is given in (54)
shown at the bottom of this page.
2) Second step: Recall that γBPahba2, and it can be
taken as a function of hba, denoted by γB(hba ). By (14),
it follows that the SOP constraint is irrelevant to hba , and in
addition, the objective function of (16) can be rewritten as
Rs(hba) = log 1+φγB(hba)
1+φw(φ),(55)
R
s(hba)
=γB(hba)w(φ)φ(1+γB(hba )φ)w(φ)
(1+γB(hba)φ)1+φw(φ)ln(2).(56)
and the derivative of Rs(hba)at φ, which is denoted by
R
s(hba), can be expressed as in (56).
Lemma 5: Rs(hba)in (55) is strictly concave over φ.
Proof: This result directly follows from Proposition 2.
Suppose that φ
1and φ
2are optimal power allocation ratios for
different qualities of the main channel (denoted by h(1)
ba 2and
h(2)
ba 2), and assume h(1)
ba <h(2)
ba , which is equivalent to
h(1)
ba 2<h(2)
ba 2. Then obviously, we have that γB(h(1)
ba )<
φ
2=φ
1=1,0<R
s(K2
2)<R
s(K1
1),when γBw(K2,1)+(1+γB)w(K2,1);
0
2
11,0<R
s(K2
2)<R
s(K1
1),when w(K2,0+)
B<w(K2,1)+(1+γB)w(K2,1);
0=φ
2
11,0=Rs(K2
2)<R
s(K1
1),when w(K1,0+)
Bw(K2,0+);
φ
2=φ
1=0,R
s(K2
2)=Rs(K1
1)=0,when γBw(K1,0+).
(54)
2116 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 67, NO. 3, MARCH 2018
γB(h(2)
ba ). In the following, we will prove that φ
1φ
2and
Rs(h(1)
ba
1)Rs(h(2)
ba
2). Specifically, three different
cases are characterized as follows.
1) Case 1: γB(h(1)
ba )w(0+).
By (56) this condition is equivalent to R
s(h(1)
ba ,0+)
0, and consequently, by Lemma 5, we can obtain that
φ
1=0 and Rs(h(1)
ba
1)=0. Then obviously, we have
that φ
2φ
1and Rs(h(2)
ba
2)Rs(h(1)
ba
1).
2) Case 2: w(0+)
B(h(1)
ba )<w(1)+(γB(h(1)
ba )+
1)w(1).
By (56) this condition is equivalent to R
s(h(1)
ba ,0+)>0
and R
s(h(1)
ba ,1)<0, and thus, by Lemma 5, 0
1<
1 and R
s(h(1)
ba
1)=0. Then by (56) we have
γB(h(1)
ba )w(φ
1)φ
1(1+γB(h(1)
ba )φ
1)w(φ
1)=0
⇐⇒ γB(h(1)
ba )=w(φ
1)+φ
1w(φ
1)
1(φ
1)2w(φ
1).(57)
Substituting (57) into (55), we can obtain that
Rs(h(1)
ba
1) = log 1
1(φ
1)2w(φ
1).(58)
Since γB(h(2)
ba )
B(h(1)
ba ),wehaveγB(h(2)
ba )>
w(0+), which is equivalent to R
s(h(2)
ba ,0+)>0, and
hence by Lemma 5, we obtain that 0
21. Next, two
different situations are considered below.
φ
2=1
Obviously, we can obtain that φ
2=1
1, and in
addition, it can be shown that φ
2=1 is equivalent
to R
s(h(2)
ba ,1)0, and then by (56) we have that
γB(h(2)
ba )w(1)+(1+γB(h(2)
ba ))w(1),
(59)
(1w(1))γB(h(2)
ba )w(1)+w(1).
(60)
Note that since γB(h(2)
ba ),w(1), and w(1)are
positive, it follows that 1 >w
(1). Then combining
(55) and (60), we can obtain that
Rs(h(2)
ba
2)log 1
1w(1).(61)
Note that by (17), φw(φ)can be rewritten as in (62)
shown at the bottom of this page. Then by Lemma 1
and Corollary 1, it follows that the denominator of
(62) strictly decreases with φ, and the numerator of
(62) strictly increase with φ. Hence, φw(φ)strictly
increases with φ. Then, we can conclude that
1>w
(1)
1w(φ
1)>(φ
1)2w(φ
1)>0
1
1w(1)>1
1(φ
1)2w(φ
1).(63)
Combining (58), (61), and (63), we can obtain that
Rs(h(2)
ba
2)>log 1
1(φ
1)2w(φ
1)
=Rs(h(1)
ba
1).(64)
–0
2<1
According to Lemma 5, this condition is equivalent
to R
s(h(2)
ba
2)=0, then by (56) we have
γB(h(2)
ba )=w(φ
2)+φ
2(1+γB(h(2)
ba )φ
2)w
(φ
2)
⇐⇒ γB(h(2)
ba )=w(φ
2)+φ
2w(φ
2)
1(φ
2)2w(φ
2).(65)
Substituting (65) into (55), we obtain that
Rs(h(2)
ba
2) = log 1
1(φ
2)2w(φ
2).(66)
By (62), it can be shown that the denominator of
w(φ)strictly decreases with φ, and the numerator of
w(φ)strictly increases with φ. Hence w(φ)strictly
increases with φ. To prove φ
2
1, we assume in
contradiction that φ
2φ
1. Then by the monotonic-
ity of w(φ),itfollowsthatw(φ
2)w(φ
1), and
hence we obtain that (φ
2)2w(φ
2)(φ
1)2w(φ
1).
φw(φ)= Paα1φw(φ)
α1+(1φ)w(φ)+Paα1(1φ)+ Paα2α1+(1φ)w(φ)
w(φ)+d
.(62)
φ
2=φ
1=1,0<R
s(h(1)
ba
1)<R
s(h(2)
ba
2),when γB(h(1)
ba )w(1)+(1+γB(h(1)
ba ))w(1);
0
1
21,0<R
s(h(1)
ba
1)<R
s(h(2)
ba
2),when w(0)
B(h(1)
ba )<w(1)+(1+γB(h(1)
ba ))w(1);
0=φ
1φ
21,0=Rs(h(1)
ba
1)Rs(h(2)
ba
2),when γB(h(1)
ba )w(0).
(70)
HU et al.: COOPERATIVE-JAMMING-AIDED SECRECY ENHANCEMENT IN WIRELESS NETWORKS WITH PASSIVE EAVESDROPPERS 2117
Then by (57) and (65), it follows that
γB(h(2)
ba )=w(φ
2)+φ
2w(φ
2)
1(φ
2)2w(φ
2)
w(φ
1)+φ
1w(φ
1)
1(φ
1)2w(φ
1).
=γB(h(1)
ba ),(67)
leading to a contradiction to the assumption that
γB(h(2)
ba )
B(h(1)
ba ). Thus we have φ
2>
φ
1. Combining (58) and (66) and using the
monotonicity of w(φ),wehaveRs(h(2)
ba
2)>
Rs(h(1)
ba
1).
3) Case 3: γB(h(1)
ba )w(1)+(1+γB(h(1)
ba ))
w(1).
By (56), this condition is equivalent to
R
s(h(1)
ba ,1)0, and consequently, by Lemma 5,
we can obtain that φ
1=1.
Since γB(h(2)
ba )
B(h(1)
ba ), it follows that
(1w(1))γB(h(2)
ba )>(1w(1))γB(h(1)
ba )
ew(1)+w(1),(68)
which implies that
γB(h(2)
ba )w(1)+w(1)(1+γB(h(2)
ba )).(69)
By (56) and using Lemma 5, we have φ
2=1.
Then by (55), we can obtain Rs(h(2)
ba
2)>
Rs(h(1)
ba
1).
We thus conclude that if h(2)
ba >h(1)
ba , then φ
2φ
1and
Rs(h(2)
ba
2)Rs(h(1)
ba
1). A brief summary is given in
(70) shown at the bottom of previous page.
This completes the proof of Proposition 3.
REFERENCES
[1] Y. Zou, J. Zhu, X. Wang, and L. Hanzo, “A survey on wireless security:
Technical challenges, recent advances, and future trends, Proc. IEEE,
vol. 104, no. 9, pp. 1727–1765, Sep. 2016.
[2] X. Zhou, L. Song, and Y. Zhang, Physical Layer Security in Wireless
Communications. Boca Raton, FL, USA: CRC Press, 2013.
[3] H. Wen, Physical Layer Approaches for Securing Wireless Communication
Systems. New York, NY, USA: Springer-Verlag, 2013.
[4] A. D. Wyner, “The wire-tap channel, Bell Syst. Tech. J., vol. 54, no. 8,
pp. 1355–1387, Oct. 1975.
[5] S. K. Leung-Yan-Cheong and M. E. Hellman, “The Gaussian wire-tap
channel,” IEEE Trans. Inf. Theory, vol. 24, no. 4, pp. 451–456, Jul. 1978.
[6] I. Csisz ´
ar and J. K¨
orner, “Broadcast channels with confidential messages,”
IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339–348, May 1978.
[7] S. Goel and R. Negi, “Guaranteeing secrecy using artificial noise,”
IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180–2189,
Jun. 2008.
[8] X. Zhang, X. Zhou, and M. R. McKay, “On the design of artificial-noise-
aided secure multi-antenna transmission in slow fading channels, IEEE
Trans. Veh. Technol., vol. 62, no. 5, pp. 2170–2181, Jun. 2013.
[9] T.-X. Zheng and H.-M. Wang, “Optimal power allocation for artificial
noise under imperfect CSI against spatially random eavesdroppers, IEEE
Trans. Veh. Technol., vol. 65, no. 10, pp. 8812–8817, Oct. 2016.
[10] L. Hu, H. Wen, B. Wu, J. Tang, and F. Pan, Adaptive secure transmis-
sion for physical layer security in cooperative wireless networks, IEEE
Commun. Lett., vol. 21, no. 3, pp. 524–527, Mar. 2017.
[11] H.-M. Wang and X.-G. Xia, “Enhancing wireless secrecy via cooperation:
Signal design and optimization,” IEEE Commun. Mag., vol. 53, no. 12,
pp. 47–53, Dec. 2015.
[12] L. J. Rodriguez, N. H. Tran, T. Q. Duong, T. Le-Ngoc, M. Elkashlan, and
S. Shetty, “Physical layer security in wireless cooperative relay networks:
State of the art and beyond,” IEEE Commun. Mag., vol. 53, no. 12, pp. 32–
39, Dec. 2015.
[13] L. Hu, H. Wen, J. Tang, Z.-Q. He, and J. Su, “Joint cooperative jamming
and beamforming for secure transmission in two-cell networks,” in Proc.
IEEE/CIC Int. Conf. Commun. China, Nov. 2015, pp. 110–114.
[14] T.-X. Zheng, H.-M. Wang, F. Liu, and M. H. Lee, “Outage constrained
secrecy throughput maximization for DF relay networks, IEEE Trans.
Commun., vol. 63, no. 5, pp. 1741–1755, May 2015.
[15] X. Hu, P. Mu, B. Wang, and Z. Li, “On the secrecy rate maximiza-
tion with uncoordinated cooperative jamming by single-antenna helpers,
IEEE Trans. Veh. Technol., vol. 66, no. 5, pp. 4457–4462, May 2017.
[16] P. Mu, X. Hu, B. Wang, and Z. Li, “Secrecy rate maximization with
uncoordinated cooperative jamming by single-antenna helpers under se-
crecy outage probability constraint,” IEEE Commun. Lett., vol. 19, no. 12,
pp. 2174–2177, Dec. 2015.
[17] L. Hu, B. Wu, J. Tang, F. Pan, and H. Wen, “Outage constrained secrecy
rate maximization using artificial-noise aided beamforming and coopera-
tive jamming, in Proc. IEEE Int. Conf. Commun., May 2016, pp. 1–5.
[18] H.-M. Wang, F. Liu, and M. Yang, “Joint cooperative beamforming, jam-
ming, and power allocation to secure AF relay systems, IEEE Trans. Veh.
Technol., vol. 64, no. 10, pp. 4893–4898, Oct. 2015.
[19] C. Wang, H.-M. Wang, and X.-G. Xia, “Hybrid opportunistic relaying and
jamming with power allocation for secure cooperative networks, IEEE
Trans. Wireless Commun., vol. 14, no. 2, pp. 589–605, Feb. 2015.
[20] F. Oggier and B. Hassibi, “The secrecy capacity of the MIMO wiretap
channel,” IEEE Trans. Inf. Theory, vol. 57, no. 8, pp. 4961–4972, Aug.
2011.
[21] D. Wang, B. Bai, W. Chen, and Z. Han, “Secure green communication
via untrusted two-way relaying: A physical layer approach,” IEEE Trans.
Commun., vol. 64, no. 5, pp. 1861–1874, May 2016.
[22] I. S. Gradshteyn and I. M. Ryzhik, Table of Integrals, Series, and Products,
8th ed. New York, NY, USA: Academic, 2015.
[23] Y. Liang, G. Kramer, H. V. Poor, and S. Shamai (Shitz), “Compound
wiretap channels,” EURASIP J.Wireless Commun. Netw.,vol. 2009, pp. 1–
12, Mar. 2009.
[24] R. B. Ash, Basic Probability Theory. Mineola, NY, USA: Dover, 2012.
[25] S. Boyd and L. Vandenberghe, Convex Optimization. U.K.: Cambridge
Univ. Press, 2004.
Authors’ photographs and biographies not available at the time of publication.
... There has been much research work on physical layer security in wireless communications [28][29][30][31][32][33][34][35][36][37]. Reference [28] employs artificial noise technology (ANT) to assist in transmitting secure signals. ...
... By establishing an optimization model that minimizes the secrecy outage probability under the constraint of the secrecy rate, this Reference determines the optimal power allocation ratio between the transmitted signal and the artificial noise. Reference [29] investigates a physical layer security transmission scheme in a MISO system where the cooperative users assist (CUA) send interference. Under the condition that only the statistical information of the eavesdropping channel is known, the study establishes an optimization model with the secrecy rate as the constraint and the secrecy outage probability as the optimization objective. ...
... Consequently, the findings suggest that transmit power is not a limiting factor impeding the augmentation of system throughput. The figure also analyzes the comparative relationship between the system-throughput-optimization scheme under the proposed system SRM-SSOP algorithm conditions and the other existing methods, the adaptive transmission mechanism (ADP) based on [30], artificial noise technology (ANT) [28], and cooperative users assist (CUA) [29]. We can conclude the following: 1. ...
Article
Full-text available
The rapid development of the Industrial Internet of Things (IIoT) has brought enormous opportunities to the industrial environment, but has also posed significant challenges to network security, especially physical layer security, which is crucial for the reliable transmission of messages among interconnected devices and sensors. Focusing on enhancing the physical layer security in IIoT communication, this paper proposes a mechanism for the Spatial Secrecy Outage Probability (SSOP) to ensure the secure transmission of data. The SSOP algorithm assumes that the location of legitimate devices is known, while the eavesdropper devices have a random distribution of locations, forming the SSOP model related to the device locations from the perspective of insecure regions (ISRs) and secure regions (SRs), and the closed-form expression for its upper bound is derived. Subsequently, under the constraint of the SSOP conditions, we establish an optimization model with the objective of system throughput maximization based on the Spatial Secrecy Outage Probability (SRM-SSOP). By optimizing the transmission rate of legitimate channels or controlling the transmission power, the maximization of the system throughput can be achieved, thus reducing the consumption of communication resources. Through sophisticated modeling and simulation in MATLAB, we verified the accuracy of the definition and derived the upper bound of the SSOP. The experimental results also show that the SSOP algorithm gradually converges to a specific value as the number of antenna elements increases. In addition, we observed that, when the receiver device is aligned with the normal direction of the transmit antenna array, the SSOP reaches a minimum value. This performance is crucial for understanding and optimizing the security performance of IIoT communication systems.
... The AN signal is usually scattered in the null subspace of the main channel to avoid interference at legitimate receiver. Based on this idea, AN aided secrecy transmission is studied for both fast and slow fading channels [10], [11], [12], [13], [14], [15], [16], [17]. For fast fading channels, the ergodic secrecy rate (ESR) is utilized as the secrecy performance in [10], [11]. ...
... For fast fading channels, the ergodic secrecy rate (ESR) is utilized as the secrecy performance in [10], [11]. While for slow fading channels, the secrecy outage probability (SOP) is used as the performance metric in [12], [13], and [14], and the SOP constrained secrecy rate is used as the performance metric in [15], [16], and [17]. Since perfect channel state information (CSI) of the eavesdropper is generally not available, it is impossible to maintain a steady secrecy rate over all realizations of fading channels. ...
... The SOPM is studied for multipleinput single-output (MISO) wiretap channels in [13], and for Internet of Things (IoT) in [14]. Besides, the SOP constrained secrecy rate maximization (SRM) is investigated in [15], [16], and [17]. However, these works do not consider multi-user interference mitigation, and thus cannot be directly applied to interference networks. ...
Article
Full-text available
We investigate the physical layer security (PLS) in multi-user interference networks. In particular, we consider secure transmission from a legitimate source (Alice) to a legitimate destination (Bob), coexisting with multiple passive eavesdroppers (Eves), as well as multiple legitimate transceivers. By assuming that only statistical channel state informations (CSIs) of Eves and local CSIs of legitimate users are available, we propose an artificial noise (AN) assisted interference alignment (IA) for security enhancement. Unlike traditional IA based security approaches which may result in secret signal cancellation, we design a modified alternating minimization (AM) scheme to overcome this threat, by incorporating the max-eigenmode beamforming (MEB) for secure transmission. Moreover, by partitioning the IA equation into three independent subsets and their combinations, a much tighter necessary condition for IA feasibility is established. We also provide guiding insights into the practical system designs, including useful guidelines for the selection of the dimension of AN. Furthermore, the power allocation ratio between the secret signal and the AN signal is optimized to minimize the secrecy outage probability (SOP), subject to a minimum secrecy rate constraint. Numerical results demonstrate that our design can enhance both quality and security of the secret signal, and thus is suitable and reliable for PLS in interference networks.
... Other than IA security in [22]- [27], there are many works on PLS for cooperative networks [29]- [33], Internet of Things (IoT) [34], cellular networks (e.g., two-cell [35]- [37] and multi-cell networks [38]- [40]), where interference management is also crucial to security performance. Our work is different from these research efforts in the following aspects: ...
... Based on [31], adaptive jamming for secure communication is designed for cooperative [32] and two-cell networks [37]. In addition, cooperative jamming is studied for SRM in [33] and for SOP minimization in [34]. Note that all these works do not consider multi-user interference mitigation, and hence cannot be directly applied to IA networks. ...
... Note that all these works do not consider multi-user interference mitigation, and hence cannot be directly applied to IA networks. In [33], the SOP is evaluated by taking advantage of properties of confluent and Gauss hypergeometric functions. However, it is difficult to use this approach to obtain a closed form of SOP for IA networks. ...
Preprint
Full-text available
This paper investigates physical layer security (PLS) in wireless interference networks. Specifically, we consider confidential transmission from a legitimate transmitter (Alice) to a legitimate receiver (Bob), in the presence of non-colluding passive eavesdroppers (Eves), as well as multiple legitimate transceivers. To mitigate interference at legitimate receivers and enhance PLS, artificial noise (AN) aided interference alignment (IA) is explored. However, the conventional leakage minimization (LM) based IA may exhibit confidential signal cancellation phenomenon. We theoretically analyze the cause and then establish a condition under which this phenomenon will occur almost surely. Moreover, we propose a means of avoiding this phenomenon by integrating the max-eigenmode beamforming (MEB) into the traditional LM based IA. By assuming that only statistical channel state informations (CSIs) of Eves and local CSIs of legitimate users are available, we derive a closed form expression for the secrecy outage probability (SOP), and establish a condition under which positive secrecy rate is achievable. To enhance security performance, an SOP constrained secrecy rate maximization (SRM) problem is formulated and an efficient numerical method is developed for the optimal solution. Numerical results confirm the effectiveness and the usefulness of the proposed approach.
... Artificial noise (AN) is an intuitive and effective method for secure communication. More precisely, AN aided beamforming and cooperative jamming for secrecy rate maximization (SRM) problem are designed in [7], [8]. It turns out that this scheme can enhance both secrecy rate and secure energy efficiency. ...
Article
This paper considers a Gaussian multi-input multi-output (MIMO) wiretap channel with a legitimate transmitter, a legitimate receiver (Bob), an eavesdropper (Eve), and a cooperative jammer. All nodes may be equipped with multiple antennas. Traditionally, the jammer transmits Gaussian noise (GN) to enhance the security. However, using this approach, the jamming signal interferes not only with Eve but also with Bob. In this paper, besides the GN strategy, we assume that the jammer can also choose to use the encoded jammer (EJ) strategy, i.e., instead of GN, it transmits a codeword from an appropriate codebook. In certain conditions, the EJ scheme enables Bob to decode the jamming codeword and thus cancel the interference, while Eve remains unable to do so even if it knows all the codebooks. We first derive an inner bound on the system’s secrecy rate under the strong secrecy metric, and then consider the maximization this bound through precoder design in a computationally efficient manner. In the single-input multi-output (SIMO) case, we prove that although non-convex, the power control problems can be optimally solved for both GN and EJ schemes. In the MIMO case, we propose to solve the problems using the matrix simultaneous diagonalization (SD) technique, which requires quite a low computational complexity. Simulation results show that by introducing a cooperative jammer with coding capability, and allowing it to switch between the GN and EJ schemes, a dramatic increase in the secrecy rate can be achieved. In addition, the proposed algorithms can significantly outperform the current state of the art benchmarks in terms of both secrecy rate and computation time.
Article
As security issues facing the industrial Internet of Things (IIoT) continue to emerge, industrial organizations are working to further improve the security system. Zero trust (ZT) is seen as the future of industrial security, with a rising voice, but currently, no concrete implementation technique is available. In this article, we start with the requirements of ZT security and attempt to design a ZT technical framework applicable to wireless IIoT. Specifically, a three-step ZT security framework is proposed that builds on the benefits of physical-layer security to enhance ZT in IIoT. Security zone formation is done first, which then facilitates a trusted environment for subsequent device authentication and cryptographic negotiation. By integrating physical-layer security, several promising techniques, including artificial noise, physical fingerprint, and key distribution, are well designed to accomplish the proposed framework. Our analysis reveals that the proposed framework and the designed particular implementation techniques are feasible to enhance ZT security in wireless IIoT.
Chapter
Secrecy Performance is one of the focus of research on physical layer security in vehicle-to-everything (V2X). Poisson line process (PLP) is regarded as a more suitable model to study the vehicle communication performance of urban scenarios. However, due to the high theoretical difficulty in the analysis of PLP, research in this area has not been widely conducted yet. In this paper, we take a secure transmission scheme that can improve physical layer security as an example, use PLP model to model urban scenarios. We analyze the performance of coverage probability, secrecy probability and secrecy throughput and draw some effective conclusions to improve secrecy performance. We import a typical urban scenario - part of the map data of Xi’an urban area in China, compare the performance derived by PLP and two-dimensional Poisson point process (2D PPP) model with those modeled on the real urban map respectively, it is demonstrated that PLP is more suitable as the model for urban scenarios.KeywordsPoisson line processurban scenariosafety performance analysisstochastic geometry
Article
This paper considers a friendly interferer allocating jamming power to eavesdropping channels to increase the level of secrecy of a wireless network. The friendly interferer has access to limited power, while the eavesdropper may not have the ability to attack all channels simultaneously. When all channels used for secret communication are under the threat of eavesdropping attacks, the optimal power allocation policy results from solving a convex optimization problem. In this case, the optimal policy is unique and can be obtained via a water-filling scheme. When the eavesdropper cannot attack all channels, the eavesdropper should behave strategically and may select the targets probabilistically. We propose a non-zero-sum game that helps the friendly interferer predict and concentrate on the targets selected by the eavesdropper. Under certain conditions, we prove that there exists a unique Nash equilibrium (NE) strategy pair, which has a threshold type structure. We provide conditions under which the eavesdropper’s equilibrium strategy is deterministic. We devise a strategy iteration algorithm to compute an equilibrium power allocation strategy. We present examples showing that the game-theoretic power allocation strategy performs better than the conservative power allocation strategy that assumes every channel to be under attack.
Article
Due to the open nature of the wireless communication in an Internet of Things (IoT) network, transmitted messages are easy to eavesdrop. To address the eavesdropping attack, we consider an IoT-based smart home where an IoT device (IoT-D) is selected as a friendly jammer to send artificial noise (AN) to protect transmitted messages from being eavesdropped. However, the selected IoT-D may send partial (or even none) AN, which is called an untrusted jammer. To avoid selecting an untrusted jammer, we aim to design two quantitative models from the perspective of time and space to evaluate the trustworthiness of IoT-Ds. Firstly, we adopt an improved energy detector to better counter signal-to-noise ratio (SNR) fluctuation of AN detection. Secondly, based on the detection results, we adopt two trust models: (1) the spatial-oriented beta trust model, (2) the time-oriented hidden Markov model (HMM)-based trust model. In the first model, direct and indirect trust of an IoT-D are both calculated to obtain an integrated trust value. In the second model, the probability of trusted state is calculated as the trust value, and time intervals between detection results of an IoT-D are taken into consideration. Numerical results are presented to demonstrate the performance of our improved energy detection method and two trust models.
Article
Full-text available
We investigate the physical layer security in cooperative wireless networks where a source (Alice) transmits a confidential message to a destination (Bob) with the help of a cooperative node (Charlie), in the presence of an eavesdropper (Eve). Cooperative transmission is explored to secure communication between Alice and Bob, while ensuring the desired quality of service (QoS) at Charlie’s receiver. We provide a transmit design for outage constrained secrecy rate maximization, taking both security and QoS constraints into account. Unlike the conventional cooperative security that adopts a fixed transmission scheme, we propose a mechanism for transmit strategy adaptation with security protection. Specifically, the proposed cooperative transmission is replaced by a cooperative jamming (CJ) scheme if either security or QoS constraint is not satisfied. Numerical results confirm that our design enables dynamic transmission, and thus is flexible and environment-adaptive.
Article
Full-text available
A practical uncoordinated cooperative jamming (UCJ) scheme is proposed in this paper to enhance the physical layer security of the single-input-single-output (SISO) wiretap channel. Differing from the existing works, all the helpers in this UCJ scheme are uncoordinated single-antenna uplink users, and each helper transmits a jamming signal independently to confound the eavesdropper. The intended receiver plays the role of base station in the cellular systems as well as a control center to properly allocate the jamming power of each helper to maximize the secrecy rate. Two cases are addressed in solving the secrecy rate maximization problem, namely, the global channel state information (CSI) case and the partial CSI case. The optimal solution is obtained in the global CSI case, and a near-optimal solution is obtained under the secrecy outage probability constraint in the partial CSI case. Numerical results show that the performance of the proposed scheme is comparable with the existing works.
Article
Full-text available
Cooperative relaying is an effective method of increasing the range and reliability of wireless networks, and several relaying strategies have been adopted in major wireless standards. Recently, cooperative relaying has also been considered in the context of PHY security, which is a new security paradigm to supplement traditional cryptographic schemes that usually handle security at the upper layers. In wireless PHY security, relay nodes can be used to exploit the physical layer properties of wireless channels in order to support a secured transmission from a source to a destination in the presence of one or more eavesdroppers. While some breakthroughs have been made in this emerging research area, to date, the problem of how to effectively adopt advanced relaying protocols to enhance PHY security is still far from being fully understood. In this article, we present a comprehensive summary of current state-of-theart PHY security concepts in wireless relay networks. A case study is then provided to quantify the benefits of power allocation and relay location for enhanced security. We finally outline important future research directions in relaying topologies, full-duplex relaying, and cross-layer design that can ignite new interests and ideas on the topic.
Book
Introduction for PHY Security.- Unconditional Security Wireless Communication.- MIMO Based Enhancement for Wireless Communication Security.- Physical Layer Assisted Authentication for Wireless Sensor Networks.- Detection of Node Clone and Sybil Attack Based on CI Approach.
Article
In this paper, energy-efficient secure communications via untrusted two-way relaying are investigated considering physical layer security to prevent the relays from intercepting the confidential information of users. The performance metric of secure energy efficiency (EE), defined as the ratio of the secrecy sum rate to the total power consumption, is maximized by jointly optimizing power allocation for all nodes, with the constraints of the maximum allowed power and the minimum target secrecy rate. To deal with this intractable nonconvex optimization problem, some optimization methods termed as fractional programming, alternate optimization, penalty function method, and difference of convex functions programming, are jointly applied to address a solution scheme with comparatively lower complexity. With these above-mentioned optimization methods, the primal problem is transformed into simple subproblems hierarchically so as to adopt the corresponding optimization algorithm. By simulations, the achievable secure EE, the secrecy sum rate and the total transmission power of the proposed scheme are compared with those of secrecy sum rate maximization. It is demonstrated that the proposed scheme can improve secure EE remarkably yet at the cost of secrecy sum rate loss. This fact also reveals the inherent tradeoff between energy and security.
Article
Physical layer security, or information-theoretic security, has attracted considerable attention recently, due to its potential to enhance the transmission secrecy of wireless communications. Various secrecy signaling and coding schemes have been designed at the physical layer of wireless systems to guarantee confidentiality against information leakage to unauthorized receivers, among which the strategy based on the idea of node cooperation is promising. This article provides an overview of the recent research on enhancing wireless transmission secrecy via cooperation. We take a signal processing perspective and focus on the secrecy signal design and optimization techniques to increase secrecy performance. We also propose some future research directions on this topic.