Skip to main content

Advertisement

Log in

Improving the Physical Layer Security in Cooperative Networks with Multiple Eavesdroppers

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Physical layer security is an efficient technique to realize security in wireless network without relying on conventional cryptographic techniques. In cooperative networks with secrecy constraints, joint relay and jammer selection is a promising approach for improving the security of wireless communications. We need to apply more techniques in order to achieve more effective security in contrast to the mentioned method. In this paper, we propose three techniques to increase the secrecy as follows: Firstly, we introduce a new criterion which decreases the rate at the eavesdroppers. Next, a new relay selection schemes are proposed, where two of the available relays are selected for data transmission. Therefore, the secrecy rate is increased considerably. Finally, we propose a sub-optimal power allocation solution for jammer nodes. Sub-optimal power of the jammer nodes vary according to the type of scenario, location of the eavesdroppers, and the destination. The sub-optimal power allocation to the jammer nodes causes more eavesdroppers confusion. As a result, the total secrecy rate is increased. Simulation and analytical results demonstrate the performance improvement of the proposed techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20

Similar content being viewed by others

References

  1. Silva, E., Dos Santos, A., Albini, L. C. P., & Lima, M. N. (2008). Identity-based key management in mobile ad hoc networks: techniques and applications. IEEE Wireless Communications, 15(5), 46–52.

    Article  Google Scholar 

  2. Barros, J., & Rodrigues, M. R. (2006). Secrecy capacity of wireless channels. In 2006 IEEE International Symposium on Information Theory (pp. 356–360). IEEE.

  3. Bloch, M., Barros, J., Rodrigues, M. R., & McLaughlin, S. W. (2008). Wireless information-theoretic security. IEEE Transactions on Information Theory, 54(6), 2515–2534.

    Article  MathSciNet  MATH  Google Scholar 

  4. Liu, R., Maric, I., Spasojevic, P., & Yates, R. D. (2008). Discrete memoryless interference and broadcast channels with confidential messages: Secrecy rate regions. IEEE Transactions on Information Theory, 54(6), 2493–2507.

    Article  MathSciNet  MATH  Google Scholar 

  5. Csiszár, I., & Korner, J. (1978). Broadcast channels with confidential messages. IEEE Transactions on Information Theory, 24(3), 339–348.

    Article  MathSciNet  MATH  Google Scholar 

  6. Wyner, A. D. (1975). The wire-tap channel. Bell Labs Technical Journal, 54(8), 1355–1387.

    Article  MathSciNet  MATH  Google Scholar 

  7. Vicario, J. L., Bel, A., Lopez-Salcedo, J. A., & Seco, G. (2009). Opportunistic relay selection with outdated CSI: Outage probability and diversity analysis. IEEE Transactions on Wireless Communications, 8(6), 2872–2876.

    Article  Google Scholar 

  8. Zhang, W., Duan, D., & Yang, L. (2009). Relay selection from a battery energy efficiency perspective. In Military Communications Conference, MILCOM 2009, IEEE (pp. 1–7). IEEE.

  9. Seyfi, M., Muhaidat, S., & Liang, J. (2011). Performance analysis of relay selection with feedback delay and channel estimation errors. IEEE Signal Processing Letters, 18(1), 67–70.

    Article  MATH  Google Scholar 

  10. Krikidis, I., Thompson, J., McLaughlin, S., & Goertz, N. (2008). Amplify-and-forward with partial relay selection. IEEE Communications Letters, 12(4), 235–237.

    Article  Google Scholar 

  11. Bletsas, A., Shin, H., & Win, M. Z. (2007). Outage analysis for co-operative communication with multiple amplify-and-forward relays. Electronics Letters, 43(6), 353–355.

    Article  Google Scholar 

  12. Kim, J., Ikhlef, A., & Schober, R. (2012). Combined relay selection and cooperative beamforming for physical layer security. Journal of Communications and Networks, 14(4), 364–373.

    Article  Google Scholar 

  13. Liu, Y., & Petropulu, A. P. (2012). Relay selection and scaling law in destination assisted physical layer secrecy systems. In Statistical Signal Processing Workshop (SSP), IEEE (pp. 381–384). IEEE.

  14. Wang, L., Ke, T., Song, M., Wei, Y., & Teng, Y. (2011). Research on secrecy capacity oriented relay selection for mobile cooperative networks. In 2011 IEEE International Conference on Cloud Computing and Intelligence Systems (CCIS) (pp. 443–447). IEEE.

  15. Cai, C., Cai, Y., & Yang, W. (2011). Secrecy rates for relay selection in OFDMA networks. In CMC (pp. 158–160).

  16. Yan, S., Mugen, P., Wenbo, W., Dong, L., & Manzoor, A. (2012). Relay self-selection for secure cooperative in amplify-and-forward netowrks. In Proceedings of the 7th International Conference on Communications and Networking in China (CHINACOM’12) (pp. 581–585).

  17. Sakran, H., Shokair, M., Nasr, O., El-Rabaie, S., & El-Azm, A. A. (2012). Proposed relay selection scheme for physical layer security in cognitive radio networks. IET Communications, 6(16), 2676–2687.

    Article  MathSciNet  Google Scholar 

  18. Luo, S., Godrich, H., Petropulu, A., & Poor, H. V. (2011). A knapsack problem formulation for relay selection in secure cooperative wireless communication. In 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (pp. 2512–2515). IEEE.

  19. Bassily, R., & Ulukus, S. (2013). Deaf cooperation and relay selection strategies for secure communication in multiple relay networks. IEEE Transactions on Signal Processing, 61(6), 1544–1554.

    Article  MathSciNet  Google Scholar 

  20. Krikidis, I., Thompson, J. S., & McLaughlin, S. (2009). Relay selection for secure cooperative networks with jamming. IEEE Transactions on Wireless Communications, 8(10), 5003–5011.

    Article  Google Scholar 

  21. Krikidis, I. (2010). Opportunistic relay selection for cooperative networks with secrecy constraints. IET Communications, 4(15), 1787–1791.

    Article  Google Scholar 

  22. Al-nahari, A. Y., Krikidis, I., Ibrahim, A. S., Dessouky, M. I., & Abd El-Samie, F. E. (2014). Relaying techniques for enhancing the physical layer secrecy in cooperative networks with multiple eavesdroppers. Transactions on Emerging Telecommunications Technologies, 25(4), 445–460.

    Article  Google Scholar 

  23. Li, J., Petropulu, A. P., & Weber, S. (2010). Optimal cooperative relaying schemes for improving wireless physical layer security. arXiv preprint arXiv:1001.1389.

  24. Lai, L., & El Gamal, H. (2008). The relay–eavesdropper channel: Cooperation for secrecy. IEEE Transactions on Information Theory, 54(9), 4005–4019.

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fatemeh-Sadat Saeidi-Khabisi.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Saeidi-Khabisi, FS., Vakili, V.T. & Abbasi-Moghadam, D. Improving the Physical Layer Security in Cooperative Networks with Multiple Eavesdroppers. Wireless Pers Commun 95, 3295–3320 (2017). https://doi.org/10.1007/s11277-017-3998-5

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-017-3998-5

Keywords

Navigation