Loading [MathJax]/extensions/TeX/AMScd.js
Secrecy Rate Maximization for Untrusted Relay Networks With Nonorthogonal Cooperative Transmission Protocols | IEEE Journals & Magazine | IEEE Xplore

Secrecy Rate Maximization for Untrusted Relay Networks With Nonorthogonal Cooperative Transmission Protocols


Abstract:

In this paper, a relay based network is considered where the source transmits confidential message to the destination via a nonregenerative relay. Due to the fact that th...Show More

Abstract:

In this paper, a relay based network is considered where the source transmits confidential message to the destination via a nonregenerative relay. Due to the fact that the relay is unidentified, and thus may wiretap the relayed message from source to destination. In this regard, two new half-duplex nonorthogonal amplify-and-forward (NAF) secure communication protocols are proposed, with different assumptions on the transmission ability of the destination, i.e., NAF-I for destination without transmission ability and NAF-II for destination with transmission ability. We separately derive the sufficient and necessary conditions to yield positive secrecy rate for these protocols under fixed source/destination transmission power, and discuss their joint power allocation that maximizes the system secrecy rate. Despite the nonconvexity of the considered power allocation problems, alternative optimization approach is proved useful in dealing with these problems, and the corresponding algorithms are proposed. We further prove the convergence of the proposed algorithms and analyze their complexity. The discussion is also extended to the orthogonal amplify-and-forward (OAF) based protocols, i.e., OAF-I or OAF-II, for comparison purpose. Our numerical results demonstrate the gain of the secrecy rate performance of the proposed NAF protocols over existing transmission protocols, and also verify the effectiveness of the designed alternative optimization algorithms.
Published in: IEEE Transactions on Vehicular Technology ( Volume: 67, Issue: 7, July 2018)
Page(s): 6325 - 6339
Date of Publication: 26 March 2018

ISSN Information:

Funding Agency:

Citations are not available for this document.

I. Introduction

Recently, leveraging relay to enhance wireless security has received considerable attentions [1], [2]. For these work, additional nodes are introduced into the network as relays who can provide extra degree of freedom in reinforcing the communication security. However, as mentioned in [3] and [4], all these work are based on an assumption that the relay has the same security clearance as the source and destination. In practical networks, there may exist relays with lower security clearance or untrustworthy relays that we need to take into consideration. Moreover, this issue becomes more serious if the untrusted relay is the only way for source and destination to establish connections between them.

Cites in Papers - |

Cites in Papers - IEEE (8)

Select All
1.
Hualiang Luo, Quanzhong Li, Qi Zhang, Jiayin Qin, "Joint Secure Transceiver Design for an Untrusted MIMO Relay Assisted Over-the-Air Computation Networks With Perfect and Imperfect CSI", IEEE Transactions on Information Forensics and Security, vol.18, pp.2508-2523, 2023.
2.
Fei Wang, Xi Zhang, "Secure Resource Allocations for Polarization-Enabled Multiple-Access Cooperative Cognitive Radio Networks With Energy Harvesting Capability", IEEE Transactions on Wireless Communications, vol.22, no.8, pp.4990-5004, 2023.
3.
Zhongbai Jiang, Yanwei Sun, Lei Shi, Weihua Hu, Zhaohui Liu, "Secure Data Dissemination among Multiple Base Stations in High-Speed Railway Network", 2020 IEEE Fifth International Conference on Data Science in Cyberspace (DSC), pp.113-119, 2020.
4.
Jin-Taek Lim, Kisong Lee, Youngnam Han, "Secure Communication With Outdated Channel State Information via Untrusted Relay Capable of Energy Harvesting", IEEE Transactions on Vehicular Technology, vol.69, no.10, pp.11323-11337, 2020.
5.
Anshul Pandey, Suneel Yadav, "Secure Cooperative Fixed Gain Untrusted Relay Networks with Destination Assisted Jamming under Nakagami-m Fading Channels", 2020 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom), pp.1-7, 2020.
6.
Shilong Ji, Wen-Qin Wang, "Physical-Layer Security for Frequency Diverse Array Communication System Over Nakagami-m Fading Channels", IEEE Systems Journal, vol.14, no.2, pp.2370-2381, 2020.
7.
Hongjiang Lei, Zixuan Yang, Ki-Hong Park, Imran Shafique Ansari, Yongcai Guo, Gaofeng Pan, Mohamed-Slim Alouini, "Secrecy Outage Analysis for Cooperative NOMA Systems With Relay Selection Schemes", IEEE Transactions on Communications, vol.67, no.9, pp.6282-6298, 2019.
8.
Zhongwu Xiang, Weiwei Yang, Gaofeng Pan, Yueming Cai, Xiaoli Sun, "Secure Transmission in Non-Orthogonal Multiple Access Networks With an Untrusted Relay", IEEE Wireless Communications Letters, vol.8, no.3, pp.905-908, 2019.

Cites in Papers - Other Publishers (2)

1.
Nida Zamir, Bakhtiar Ali, Muhammad Fasih Uddin Butt, Muhammad Awais Javed, Byung Moo Lee, Soon Xin Ng, "Cooperative Jamming-Assisted Untrusted Relaying Based on Game Theory for Next-Generation Communication Systems", Applied Sciences, vol.13, no.13, pp.7863, 2023.
2.
Fei Wang, Changchun Qin, "Secure resource allocation for green two-way relay networks with mutually untrusted relay and mobile users", IET Networks, vol.9, no.1, pp.1-6, 2020.

References

References is not available for this document.