Abstract

Physical layer security (PLS) is an emerging area for information security against eavesdroppers (Eve). Information security of any system can also be improved by using friendly jammers that produce interference signals to Eve. Traditional security techniques are limited by the processing power of the wireless nodes, whereas PLS can achieve communication secrecy without requiring computationally expensive cryptographic operations. The relay networks have emerged as a promising technology to enhance the performance of the wireless systems. This paper proposes a joint resource optimization framework for the PLS of dual-hop decode and forward (DF) relay network with and without cooperative jamming. In particular, the proposed framework consists of a base station (BS), multiple users, DF relays, multiple subcarriers, and an Eve. Our objective is to maximize the sum secrecy rate (SR) through optimal power loading over different subcarriers at BS and relay nodes, and efficient subcarrier assignment. We formulate a mixed binary integer programing problem for secrecy optimization and adopt Lagrangian dual method to achieve the efficient solutions. We also provide three benchmark frameworks, i.e., joint power optimization with random subcarrier assignment, equal power allocation with efficient subcarrier assignment and equal power with random subcarrier assignment to guage the performance of our joint resource optimization framework. Simulation results unveil that the proposed joint resource optimization framework under cooperative jamming and without jamming performs significantly better than the benchmark frameworks.

Highlights

  • The wireless technologies are developing with a rapid pace and the main demands is to provide secure connections between billions of communication nodes [1]

  • Every subcarrier has different value of channel gain due to the multi-path effect in which same symbol is coming from different paths

  • We consider the number of subcarriers as N = 64, the number of multi-paths for each channel as tap = 10, and the same noise variance at all nodes as δ = 0.1

Read more

Summary

Introduction

The wireless technologies are developing with a rapid pace and the main demands is to provide secure connections between billions of communication nodes [1]. Peoples are more dependent on sharing their private information using wireless devices which can be more susceptible to security attacks. Security issues are handled by cryptographic techniques at the upper layers of protocol stack [7], [8]. For this purpose, computational security mechanisms are used where various encryption techniques are employed to secure the information. In practice if either the key or information is changed, the mechanism would fail to provide the required security

Objectives
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.