Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Security and reliability trade‐off analysis of joint user and jammer selection in the face of co‐channel interference

Published: 01 October 2019 Publication History

Abstract

In this study, the authors investigate the security and reliability trade‐off (SRT) performance of a multiuser wireless network, where an eavesdropper attempts to overhear the confidential transmissions between a base station and multiple users under the impact of co‐channel interference. To enhance the SRT performance of the network, the authors propose two joint user and jammer selection schemes, namely the joint optimal user and random jammer selection (JOU‐RJS) scheme and the joint optimal user and optimal jammer selection (JOU‐OJS) scheme. For SRT performance comparison purposes, the traditional multiuser scheduling (TMUS) scheme is also considered. The authors derive closed‐form outage and intercept probability expressions for the JOU‐RJS and JOUOJS schemes. Simulation results show that the SRTs of both JOU‐RJS and JOU‐OJS schemes are better than that of the TMUS scheme, where JOU‐OJS achieves the best SRT performance. Additionally, this study also shows that an expected outage or intercept probability of the TMUS, JOU‐RJS, and JOU‐OJS schemes can be achieved by giving an appropriate overall rate. Finally, the sum of the outage and intercept probability can be minimised through an optimal power allocation between the selected user and friendly jammer for the proposed JOU‐RJS and JOU‐OJS.

References

[1]
Wyner A.D.: ‘The wire‐tap channel’, Bell Syst. Tech. J., 1975, 54, (8), pp. 1355–1387
[2]
Zou Y., Zhu J., Wang X. et al.: ‘A survey on wireless security: technical challenges, recent advances and future trends’, Proc. IEEE, 2016, 104, (9), pp. 1727–1765
[3]
Kapetanovic D., Zheng G., Rusek F.: ‘Physical layer security for massive MIMO: an overview on passive eavesdropping and active attacks’, IEEE Commun. Mag., 2015, 53, (6), pp. 21–27
[4]
Asaad S., Bereyhi A., Rabiei A.M. et al.: ‘Optimal transmit antenna selection for massive MIMO wiretap channels’, IEEE J. Sel. Areas Commun., 2018, 36, (4), pp. 817–828
[5]
Zhao R., Yuan Y., Fan L. et al.: ‘Secrecy performance analysis of cognitive decode‐and‐forward relay networks in Nakagami‐m fading channels’, IEEE Trans. Commun., 2017, 65, (2), pp. 549–563
[6]
Zhu J., Zou Y., Champagne B. et al.: ‘Security‐reliability tradeoff analysis of multirelay‐aided decode‐and‐forward cooperation systems’, IEEE Trans. Veh. Tech., 2016, 65, (7), pp. 5825–5831
[7]
Fan L., Lei X., Yang N. et al.: ‘Secure multiple amplify‐and‐forward relaying with cochannel interference’, IEEE J. Sel. Top. Signal Process., 2016, 10, (8), pp. 1494–1505
[8]
Wang C.L., Chen J.Y.: ‘Power allocation and relay selection for AF cooperative relay systems with imperfect channel estimation’, IEEE Trans. Veh. Technol., 2016, 65, (9), pp. 7809–7813
[9]
Zou Y., Wang X., Shen W.: ‘Physical‐layer security with multiuser scheduling in cognitive radio networks’, IEEE Trans. Commun., 2013, 61, (12), pp. 5103–5113
[10]
Deng H., Wang H.M., Yuan J. et al.: ‘Secure communication in uplink transmissions: user selection and multiuser secrecy gain’, IEEE Trans. Commun., 2016, 64, (8), pp. 3492–3506
[11]
Bang I., Kim S.M., Sung D.K.: ‘Effects of multiple antennas and imperfect channel knowledge on secrecy multiuser diversity’, IEEE Commun. Lett., 2015, 19, (9), pp. 1564–1567
[12]
Yang M., Guo D., Huang Y. et al.: ‘Physical layer security with threshold‐based multiuser scheduling in multi‐antenna wireless networks’, IEEE Trans. Commun., 2016, 64, (12), pp. 5189–5202
[13]
Goel S., Negi R.: ‘Guaranteeing secrecy using artificial noise’, IEEE Trans. Wirel. Commun., 2008, 7, (6), pp. 2180–2189
[14]
Hu L., Wen H., Wu B. et al.: ‘Cooperative‐jamming‐aided secrecy enhancement in wireless networks with passive eavesdroppers’, IEEE Trans. Veh. Technol., 2018, 67, (3), pp. 2108–2117
[15]
Yu H., Kim T., Jafarkhani H.: ‘Wireless secure communication with beamforming and jamming in time‐varying wiretap channels’, IEEE Trans. Inf. Forensics Sec., 2018, 13, (8), pp. 2087–2100
[16]
Zou Y., Zhu J.: ‘Intercept probability analysis of joint user‐jammer selection against eavesdropping’. Proc. IEEE GLOBECOM, Washington, DC, 2016, pp. 1–6
[17]
Nguyen B.V., Jung H., Kim K.: ‘Physical layer security schemes for full‐duplex cooperative systems: state of the art and beyond’, IEEE Commun. Mag., 2018, 56, (11), pp. 131–137
[18]
Banerjee A., Maity S.P., Roy S.: ‘On outage secrecy minimisation in an energy harvesting relay assisted cognitive radio networks’, IET Commun., 2018, 12, (18), pp. 2253–2265
[19]
Zhu Q., Saad W., Han Z. et al.: ‘Eavesdropping and jamming in next‐generation wireless networks: A game‐theoretic approach’. Proc. Military Commun. Conf., Baltimore, MD, USA, November 2011, pp. 119–124
[20]
Garnaev A., Baykal‐Gursoy M., Poor H.V.: ‘A game theoretic analysis of secret and reliable communication with active and passive adversarial modes’, IEEE Trans. Wirel. Commun., 2016, 15, (3), pp. 2155–2163
[21]
Yu H., Stuber G.L.: ‘General decode‐and‐forward cooperative relaying with co‐channel interference in shadowed Nakagami fading channels’, IEEE Trans. Wirel. Commun., 2012, 11, (12), pp. 4318–4327
[22]
Hussein J.A., Ikki S.S., Boussakta S. et al.: ‘Impact of co‐channel interference on an underlay cognitive radio network over Nakagami‐m fading channels’. Proc. IEEE Int. Conf. on Communications (ICC), Paris, 2017, pp. 1–7
[23]
Li B., Zhou J., Zou Y. et al.: ‘Closed‐form secrecy outage analysis of cellular downlink systems in the presence of co‐channel interference’, IEEE Trans. Wirel. Commun., 2018, 17, (7), pp. 4721–4734
[24]
Zhu J.: ‘Exploiting opportunistic network coding for improving wireless reliability against co‐channel interference’, IEEE Trans. Ind. Inf., 2016, 12, (5), pp. 1692–1701
[25]
Almradi A., Hamdi K.A.: ‘MIMO full‐duplex relaying in the presence of co‐channel interference’, IEEE Trans. Veh. Technol., 2017, 66, (6), pp. 4874–4885
[26]
Duy T.T., Duong T.Q., da Costa D.B. et al.: ‘Proactive relay selection with joint impact of hardware impairment and co‐channel interference’, IEEE Trans. Commun., 2015, 63, (5), pp. 1594–1606
[27]
Karatza G., Peppas K., Sagias N.C.: ‘Effective capacity of multi‐source multi‐destination cooperative systems under co‐channel interference’, IEEE Trans. Veh. Technol., 2018, 67, (9), pp. 8411–8421
[28]
Li B., Zhou J., Zou Y. et al.: ‘Secrecy versus computation overhead for wireless networks in the face of co‐channel interference’, IEEE Trans. Commun., 2019, 67, (3), pp. 2306–2320
[29]
Zou Y.: ‘Physical‐layer security for spectrum sharing systems’, IEEE Trans. Wirel. Commun., 2017, 16, (2), pp. 1319–1329
[30]
Li B., Zou Y., Zhou J. et al.: ‘Secrecy outage probability analysis of friendly jammer selection aided multiuser scheduling for wireless networks’, IEEE Trans. Commun., 2019, 67, (5), pp. 3482–3495
[31]
Ye C., Mathur S., Reznik A. et al.: ‘Information‐theoretically secret key generation for fading wireless channels’, IEEE Trans. Inf. Forensics Sec., 2010, 5, (2), pp. 240–254
[32]
Ren K., Su H., Wang Q.: ‘Secret key generation exploiting channel characteristics in wireless communications’, IEEE Wirel. Commun., 2011, 18, (4), pp. 6–12
[33]
Bloch M.: ‘Physical‐layer security: from information theory to security engineering’ (Cambridge University Press, Cambridge, UK, 2011)
[34]
Yan P., Zou Y., Zhu J.: ‘Energy‐aware multiuser scheduling for physical‐layer security in energy‐harvesting underlay cognitive radio systems’, IEEE Trans. Veh. Tech., 2018, 67, (3), pp. 2084–2096
[35]
Zou Y., Zhu J., Li X. et al.: ‘Relay selection for wireless communications against eavesdropping: a security‐reliability trade‐off perspective’, IEEE Netw., 2016, 30, (5), pp. 74–79
[36]
El‐Malek A.H.A., Salhab A.M., Zummo S.A.: ‘Optimal power allocation for enhancing physical layer security in opportunistic relay networks in the presence of co‐channel interference’. Proc. IEEE GLOBECOM, San Diego, CA, 2015, pp. 1–6
[37]
Gradshteyn I.S., Ryzhik I.M.: ‘Table of integrals, series, and products’ (Academic, San Diego, CA, USA, 2007, 7th edn.)

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Nov 2024

Other Metrics

Citations

View Options

View options

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media