DOI QR코드

DOI QR Code

Asymptotically Optimal Cooperative Jamming for Physical Layer Security

  • Yang, Jun (Department of Statistical Sciences, University of Toronto) ;
  • Salari, Soheil (Department of Electrical and Computer Engineering, Queen's University) ;
  • Kim, Il-Min (Department of Electrical and Computer Engineering, Queen's University) ;
  • Kim, Dong In (School of Information and Communication Engineering, Sungkyunkwan University (SKKU)) ;
  • Kim, Seokki (Electronics and Telecommunications Research Institute (ETRI)) ;
  • Lim, Kwangae (Electronics and Telecommunications Research Institute (ETRI))
  • Received : 2014.12.17
  • Accepted : 2015.07.30
  • Published : 2016.02.28

Abstract

Design of effective cooperative jamming (CJ) algorithm is studied in this paper to maximize the achievable secrecy rate when the total transmit power of the source and multiple trusted terminals is constrained. Recently, the same problem was studied in [1] and an optimal algorithm was proposed involving a one-dimensional exhaustive searching.However, the computational complexity of such exhaustive searching could be very high, which may limit the practical use of the optimal algorithm. We propose an asymptotically optimal algorithm, involving only a fast line searching, which can guarantee to achieve the global optimality when the total transmit power goes to infinity. Numerical results demonstrate that the proposed asymptotically optimal algorithm essentially gives the same performance as the algorithm in [1, (44)] but with much lower computational complexity.

Keywords

Acknowledgement

Grant : Development of 5G Mobile Communication Technologies for Hyper-connected smart services

Supported by : IITP

References

  1. J. Li, A. P. Petropulu, and S. Weber, "On cooperative relaying schemes for wireless physical layer security," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4985-4997, Oct. 2011. https://doi.org/10.1109/TSP.2011.2159598
  2. A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, pp. 1355-1387, 1975. https://doi.org/10.1002/j.1538-7305.1975.tb02040.x
  3. S. Leung-Yan-Cheong, andM. Hellman, "The Gaussian wire-tap channel," IEEE Trans. Inf. Theory, vol. 24, no. 4, pp. 451-456, July 1978. https://doi.org/10.1109/TIT.1978.1055917
  4. I. Csiszar and J. Korner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978. https://doi.org/10.1109/TIT.1978.1055892
  5. S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, June 2008. https://doi.org/10.1109/TWC.2008.060848
  6. E. Tekin and A. Yener, "The general Gaussian multiple-access and twoway wiretap channels: Achievable rates and cooperative jamming," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2735-2751, June 2008. https://doi.org/10.1109/TIT.2008.921680
  7. R. Liu, I. Maric, P. Spasojevic, and R. D. Yates,"Discrete memoryless interference and broadcast channels With confidential messages: Secrecy rate regions," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2493-2507, June 2008. https://doi.org/10.1109/TIT.2008.921879
  8. M. Lai, X. Lifeng, and H. El Gamal, "Cooperative secrecy: The relayeavesdropper channel," in Proc. IEEE Int. Symp. Information Theory, Nice, France, Apr. 2007, pp. 931-935.
  9. X. Tang, R. Liu, P. Spasojevic, and H. V. Poor, "Interference-assisted secret communication," in Proc. IEEE Information Theory Workshop, Porto, Portugal, Apr. 2008, pp. 164-168.
  10. S. Goel and R. Negi, "Obtaining secrecy through intentional uncertainty," in Securing Wireless Communications at the Physical Layer, R. Liu, and W. Trappe, Eds., Springer, 2010, Ch. 2.
  11. X. He and A. Yender, "Cooperative jamming: The tale of friendly interference for secrecy," in Securing Wireless Communications at the Physical Layer, R. Liu, and W. Trappe, Eds., Springer, 2010, Ch. 4.
  12. L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, Mar. 2010. https://doi.org/10.1109/TSP.2009.2038412
  13. G. Zheng, L. C. Choo, and K. K. Wong, "Optimal cooperative jamming to enhance physical layer security using relays," IEEE Trans. Signal Process., vol. 59, no. 3, pp. 1317-1322, Mar. 2011. https://doi.org/10.1109/TSP.2010.2092774
  14. E. A. Jorswieck, "Secrecy capacity of single- and multi-antenna channels with simple helpers," in Proc. IEEE SCC, Nice, France, Apr. 2007, pp. 931-935.
  15. A. Wolf and E. A. Jorswieck, "On the zero forcing optimality for friendly jamming in MISO wiretap channels," in Proc. IEEE SPAWC, Nice, France, Apr. 2010, pp. 1-5.
  16. J. Yang, I. M. Kim, and D. I. Kim,"Joint design of optimal cooperative jamming and power allocation for linear precoding," IEEE Trans. Commun., vol. 62, no. 9, pp. 3285-3298, Sept. 2014. https://doi.org/10.1109/TCOMM.2014.2345659
  17. J. Yang, I. M. Kim, and D. I. Kim,"Optimal cooperative jamming for multiuser broadcast channel with multiple eavesdroppers," IEEE Trans. Wireless Commun., vol. 12, no. 6, pp. 2840-2852, June 2013. https://doi.org/10.1109/TWC.2013.040413.120972
  18. J. Nocedal and J. Stephen, Securing wireless communications at the physical layer, New York: Springer, 2000.
  19. M. F. Hanif, L.-N. Tran, M. Juntti, and S. Glisic, "On linear precoding strategies for secrecy rate maximization in multiuser multiantenna wireless networks," IEEE Trans. Signal Process., vol. 62, no. 14, pp. 2840-2852, July 2014.
  20. A. Khisti and G.W.Wornell, "Secure transmission with multiple antennas I: The MISOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 7, pp. 3088-3104, July 2010. https://doi.org/10.1109/TIT.2010.2048445
  21. A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas-Part II: TheMIMOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5515-5532, Nov. 2010. https://doi.org/10.1109/TIT.2010.2068852
  22. F. Oggier and B. Hassibi, "The secrecy capacity of the MIMO wiretap channel," in Proc. IEEE Int. Symp. Information Theory, Toronto, Canada, 2008, pp. 524-528.
  23. T. Liu and S. Shamai, "A note on the secrecy capacity of the multipleantenna wiretap channel," IEEE Trans. Inf. Theory, vol. 55, no. 6, pp. 2547-2553, June 2009. https://doi.org/10.1109/TIT.2009.2018322
  24. Y. Liang, G. Kramer, H. V. Poor, and S. Shamai, "Compound wire-tap channels," in Proc. 45th Annu. Allerton Conf. Communication, Control, and Computing, 2007.
  25. S. Boyd and L. Vandenberghe, Convex optimization, Harvard: Cambridge Univ. Press, 2004.
  26. D. Tse and V. Pramod, Fundamentals of wireless communication, Harvard: Cambridge Univ. Press, 2005.