Skip to main content

Advertisement

Log in

Joint Relay and Jammer Selection and Power Control for physical Layer Security in Two-Way Relay Networks with Imperfect CSI

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Physical layer security is an emerging security paradigm that can achieve secure information transmission from the source to the intended destination with the existence of malicious eavesdroppers. In this paper, joint relay/jammer selection and power control with friendly jammers for physical layer security in two-way relay networks are studied. First, several relay/jammer selection schemes are proposed to increase the secrecy capacity for source nodes and degrade the eavesdropper links simultaneously. The presented schemes select one conventional relay node and at most two friendly jammers among a number of intermediate nodes. The impact of channel estimation error on the wiretap channel is also considered. After the selection of optimal relay node and friendly jammers, a game-theoretic power control approach is introduced to deal with the interaction between the source nodes and the friendly jammers. The proposed power control approach is proven to be able to converge to the Stackelberg equilibrium, and both source nodes and friendly jammers can obtain their optimal benefits. The simulation results demonstrate the effectiveness of the relay/jammer selection schemes to enhance the secrecy capacity of the system, and validate the properties of optimization and convergence for the game-theoretic power control approach.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Wyner, A. D. (1975). The wire-tap channel. Bell System Technical Journal, 54(8), 1355–1387.

    Article  MathSciNet  MATH  Google Scholar 

  2. Tang, X. J., Liu, R. H., Spasojevic, P., & Poor, H. V.: The Gaussian wiretap channel with a helping interferer. In Proceeding IEEE International Symposium Information Theory (ISIT 2008), Toronto, Canada (pp. 389–393).

  3. Bloch, M., Barros, J., Rodrigues, M. R. D., & McLaughlin, S. W. (2008). Wireless information-theoretic security. IEEE Transactions on Information Theory, 54, 2515–2534.

    Article  MathSciNet  MATH  Google Scholar 

  4. Dong, L., Han, Z., Petropulu, A. P., & Poor, H. V. (2010). Improving wireless physical layer security via cooperating relays. IEEE Transactions on Signal Processing, 58(3), 1875–1888.

    Article  MathSciNet  Google Scholar 

  5. Zheng, G., Choo, L. C., & Wong, K. K. (2011). Optimal cooperative jamming to enhance physical layer security using relays, signal processing. IEEE Transactions on 59(3), 1317–1322.

  6. Li, J., Petropulu, A. P., & Weber, S. (2011). On cooperative relaying schemes for wireless physical layer security. Signal Processing, IEEE Transactions on 59(10), 4985–4997.

  7. Lai, L. F., & Gamal, H. E. (2008). The relay-eavesdropper channel: Cooperation for secrecy. IEEE Transactions on Information Theory, 54(9), 4005–4019.

    Article  Google Scholar 

  8. Ding, Z. G., Leung, K. K., Goeckel, D. L., & Towsley, D. (2011). Opportunistic relaying for secrecy communications: Cooperative jamming vs. relay chatting. IEEE Transactions on Wireless Communications, 10(6), 1725–1729.

    Article  Google Scholar 

  9. Huang, J., & Swindlehurst, A. L. (2011). Cooperative jamming for secure communications in MIMO relay networks. IEEE Transactions on Signal Processing, 59(10), 4871–4884.

    Article  MathSciNet  Google Scholar 

  10. Nam, W., Chung, S. Y., & Lee, Y. H. (2010). Capacity of the Gaussian two-way relay channel to within 1/2 bit. Information Theory, IEEE Transactions on 56(11), 5488–5494.

  11. Zhang, R.Q., Song, L.Y., Han, Z., Jiao, B.L., & Debbah, M. (2010). Physical layer security for two way relay communications with friendly jammers. 2010 IEEE Global Communications Conference (GLOBECOM 2010), Miami, Florida (pp. 1–6).

  12. Zhang, R. Q., Song, L. Y., Han, Z., & Jiao, B. L. (2012). Physical layer security for two-way untrusted relaying with friendly jammers. IEEE Transactions on Vehicular Technology, 61(8), 3693–3704.

    Article  Google Scholar 

  13. Wang, H. M., Yin, Q. Y., & Xia, X. G. (2012). Distributed beamforming for physical-layer security of two-way relay networks. IEEE Transactions on Signal Processing, 60(7), 3532–3545.

    Article  MathSciNet  Google Scholar 

  14. Krikidis, I. (2010). Opportunistic relay selection for cooperative networks with secrecy constraints. IET Communications, 4(15), 1787–1791.

    Article  Google Scholar 

  15. Krikidis, Ioannis, Thompson, John S., & McLaughlin, Steve. (2009). Relay selection for secure cooperative networks with jamming. IEEE Transactions on Wireless Communications, 8(10), 5003–5011.

    Article  Google Scholar 

  16. Chen, J. C., Song, L. Y., Han, Z., and Jiao, B. L. (2011). Joint relay and jammer selection for secure decode-and-forward two-way relay communications. 2011 IEEE Global Communications Conference 2011 (GLOBECOM 2011), Houston, Texas (pp. 1–5).

  17. Owen, G. (1995). Game theory. Salt Lake City: Academic.

  18. Wang, B. B., Han, Z., & Liu, K. J. R. (2009). Distributed relay selection and power control for multiuser cooperative communication networks using Stackelberg game. IEEE Transactions on Mobile Computing, 8(7), 975–990.

    Article  Google Scholar 

  19. Han, Z., Marina, N., Debbah, M., & Hjorungnes, A. (2009). Physical layer security game: Interaction between source, eavesdropper, and friendly jammer. EURASIP Journal on Wireless Communications, 2009, 1–10.

    Article  Google Scholar 

  20. Wang, C. Y., Liu, T. C. K., & Dong, X. D. (2012). Impact of channel estimation error on the performance of amplify-and-forward two-way relaying. IEEE Transactions on Vehicular Technology, 61(3), 1197–1207.

    Article  Google Scholar 

  21. Taghiyar, M. J., Muhaidat, S., & Liang, J. (2012). Max-min relay selection in bidirectional cooperative networks with imperfect channel estimation. IET Communications, 6(15), 2497–2502.

    Article  Google Scholar 

  22. Huang, J., & Swindlehurst, A. L. (2012). Robust secure transmission in MISO channels based on worst-case optimization. IEEE Transactions on Signal Processing, 60(4), 1696–1707.

    Article  MathSciNet  Google Scholar 

  23. Tse, D., & Viswanath, P. (2005). Fundamentals of wireless communication, Cambridge. Cambridge: Cambridge Univsrsity Press.

    Book  Google Scholar 

  24. Yates, R. (1995). A framework for uplink power control in cellular radio systems. IEEE Journal on Selected Areas in Communications, 13(7), 1341–1347.

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgments

This work is partially supported by the National Natural Science Foundation of China Nos. 61379111, 61402538, 61202342 and 61403424, and China Postdoctoral Science Foundation, Postdoctoral Science Planning Project of Hunan Province, Postdoctoral Science Foundation of Central South University (120951).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jun Peng.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jiang, F., Zhu, C., Peng, J. et al. Joint Relay and Jammer Selection and Power Control for physical Layer Security in Two-Way Relay Networks with Imperfect CSI. Wireless Pers Commun 85, 841–862 (2015). https://doi.org/10.1007/s11277-015-2813-4

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-015-2813-4

Keywords

Navigation