Skip to main content
Log in

Secure Wireless Communication Using Friendly Noise Through an Untrusted Relay

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

In this paper, a relay based network is considered where the source can transmit confidential data with the help of non-regenerative relay node to the destination. Since the relay is assumed to be untrusted, it is very important to secure confidential data from it while maintaining the reliability of the transmission. A new approach is proposed in which a friendly noise is incorporated with the information bearing signal at the sender such that it does not degrade the integrity of the signal and the quality of the legitimate link. This friendly noise acts as jamming signal for the untrusted relay. The analytical expressions for secrecy outage probability of the proposed technique are derived. The secrecy performance of the proposed approach is compared with the traditional relay transmission and the cooperative jamming schemes. The asymptotic nature of the outage probability is also studied for the different parameters. Numerical results are also presented to verify the derived analytical expressions of the proposed approach.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Wyner, A. D. (1975). The Wire-tap channel. Bell Systems Technical Journal, 54(8), 1355–1387.

    Article  MATH  MathSciNet  Google Scholar 

  2. Csiszar, I., & Korner, J. (1978). Broadcast channels with confidential messages. IEEE Transactions on Information Theory, 24(3), 339–348.

    Article  MATH  MathSciNet  Google Scholar 

  3. Leung-Yan-Cheong, S., & Hellman, M. (1978). The gaussian wire-tap channel. IEEE Transactions on Information Theory, 24(4), 451–456.

    Article  MATH  MathSciNet  Google Scholar 

  4. Bloch, M., Barros, J., Rodrigues, M. R. D., & McLaughlin, S. (2008). Wireless information-theoretic security. IEEE Transactions on Information Theory, 54(6), 2515–2534.

    Article  MATH  MathSciNet  Google Scholar 

  5. Krikidis, I., Thompson, J., & McLaughlin, S. (2009). Relay selection for secure cooperative networks with jamming. IEEE Transactions on Wireless Communications, 8(10), 5003–5011.

    Article  Google Scholar 

  6. Krikidis, I. (2010). Opportunistic relay selection for cooperative networks with secrecy constraints. IET Communications, 4(15), 1787–1791.

    Article  Google Scholar 

  7. Ding, Z., Leung, K., Goeckel, D., & Towsley, D. (2011). Opportunistic relaying for secrecy communications: Cooperative jamming vs. relay chatting. IEEE Transactions on Wireless Communications, 10(6), 1725–1729.

    Article  Google Scholar 

  8. Oohama, Y. (2001) “Coding for relay channels with confidential messages”. In IEEE Information Theory Workshop (pp. 87–89).

  9. He, X., & Yener, A. (2008) “Two-hop secure communication using an untrusted relay: A case for cooperative jamming”. In IEEE Global Telecommunications Conference (pp. 1–5).

  10. He, X., & Yener, A. (2010). Cooperation with an untrusted relay: A secrecy perspective. IEEE Transactions on Information Theory, 56(8), 3807–3827.

    Article  MathSciNet  Google Scholar 

  11. Goel, S., & Negi, R. (2008). Guaranteeing secrecy using artificial noise. IEEE Transactions on Wireless Communications, 7(6), 2180–2189.

    Article  Google Scholar 

  12. Dong, L., Han, Z., Petropulu, A., & Poor, H. (2009). “Cooperative jamming for wireless physical layer security”. In SSP ’09. IEEE/SP 15th Workshop on Statistical Signal Processing 2009 (pp. 417–420).

  13. Huang, J., & Swindlehurst, A. (2012). Robust secure transmission in miso channels based on worst-case optimization. IEEE Transactions on Signal Processing, 60(4), 1696–1707.

    Article  MathSciNet  Google Scholar 

  14. Liu, Y., Li, J., & Petropulu, A. (2013). Destination assisted cooperative jamming for wireless physical-layer security. IEEE Transactions on Information Forensics and Security, 8(4), 682–694.

    Article  Google Scholar 

  15. Huang, J., Mukherjee, A., & Swindlehurst, A. (2013). Secure communication via an untrusted non-regenerative relay in fading channels. IEEE Transactions on Signal Processing, 61(10), 2536–2550.

    Article  MathSciNet  Google Scholar 

  16. He, B., Zhou, X., & Abhayapala, T. D. (2013). “Wireless physical layer security with imperfect channel state information: A survey”. CoRR, vol. abs/1307.4146.

  17. Yang, Y., Wang, W., Zhao, H., & Zhao, L. (2012). Transmitter beamforming and artificial noise with delayed feedback: Secrecy rate and power allocation. Journal of Communications and Networks, 14(4), 374–384.

    Article  MathSciNet  Google Scholar 

  18. Aggarwal, P., & Trivedi, A. (Sept 2014). “An approach for secure wireless communication using friendly noise”. In International Conference on Advances in Computing, Communications and Informatics (ICACCI) (pp. 1578–1584).

  19. Lai, L., & Poor, H. (2009). “A unified framework for key agreement over wireless fading channels”. In IEEE Information Theory Workshop, 2009. ITW 2009 (pp. 100–104).

  20. Wallace, J., & Sharma, R. (2010). Automatic secret keys from reciprocal mimo wireless channels: Measurement and analysis. IEEE Transactions on Information Forensics and Security, 5(3), 381–392.

    Article  Google Scholar 

  21. Shimizu, T., Iwai, H., & Sasaoka, H. (2011). Physical-layer secret key agreement in two-way wireless relaying systems. IEEE Transactions on Information Forensics and Security, 6(3), 650–660.

    Article  Google Scholar 

  22. Chen, D., Qin, Z., Mao, X., Yang, P., Qin, Z., & Wang, R. (2013). Smokegrenade: An efficient key generation protocol with artificial interference. IEEE Transactions on Information Forensics and Security, 8(11), 1731–1745.

    Article  Google Scholar 

  23. Wang, N., Zhang, N., & Gulliver, T. (2014). Cooperative key agreement for wireless networking: Key rates and practical protocol design. IEEE Transactions on Information Forensics and Security, 9(2), 272–284.

    Article  Google Scholar 

  24. Mathur, S., Trappe, W., Mandayam, N., Ye, C., & Reznik, A. (2008). “Radio-telepathy: Extracting a secret key from an unauthenticated wireless channel”. In Proceedings of the 14th ACM International Conference on Mobile Computing and Networking. New York, NY, USA: ACM, (pp. 128–139).

  25. Zhang, M., Raghunathan, A., & Jha, N. (May 2013). “Towards trustworthy medical devices and body area networks”. In 50th ACM / EDAC / IEEE Design Automation Conference (DAC) (pp. 1–6).

  26. Papoulis, A. (1965). Probability, random variables, and stochastic processes. New York: McGraw-Hill.

  27. Gradshteyn, I. S., & Ryzhik, I. M. (2007). Table of integrals, series, and products (7th ed.). Amsterdam: Elsevier.

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Parag Aggarwal.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Aggarwal, P., Trivedi, A. Secure Wireless Communication Using Friendly Noise Through an Untrusted Relay. Wireless Pers Commun 84, 2927–2941 (2015). https://doi.org/10.1007/s11277-015-2773-8

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-015-2773-8

Keywords

Navigation