Joint relay selection and artificial jamming power allocation for secure DF relay networks

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

9 Scopus citations

Abstract

This paper studies cooperative transmission for securing a decode-and-forward (DF) two-hop network where massive cooperative nodes coexist with a potential single eavesdropper. With only the statistical channel state information (CSIs) of the eavesdroppers, we propose an opportunistic relaying with artificial jamming secrecy scheme, where a 'best' cooperative node is chosen to forward the confidential signal and the others act as jammers to send the jamming signals to confuse the eavesdropper. Utilizing the limiting distribution technique of extreme order statistics, we optimize the power allocation between the confidential information and jamming signal based on the statistical CSIs of the legitimate nodes for ergodic secrecy rate (ESR) maximization. Although the optimization problems are non-convex, we propose a sequential parametric convex approximation (SPCA) algorithm to locate the KKT solutions. Then, we derive an analytical closed-form expression of the achievable ESR, which reduces the complexity of the system analysis and design.

Original languageEnglish
Title of host publication2014 IEEE International Conference on Communications Workshops, ICC 2014
PublisherIEEE Computer Society
Pages819-824
Number of pages6
ISBN (Print)9781479946402
DOIs
StatePublished - 2014
Event2014 IEEE International Conference on Communications Workshops, ICC 2014 - Sydney, NSW, Australia
Duration: 10 Jun 201414 Jun 2014

Publication series

Name2014 IEEE International Conference on Communications Workshops, ICC 2014

Conference

Conference2014 IEEE International Conference on Communications Workshops, ICC 2014
Country/TerritoryAustralia
CitySydney, NSW
Period10/06/1414/06/14

Fingerprint

Dive into the research topics of 'Joint relay selection and artificial jamming power allocation for secure DF relay networks'. Together they form a unique fingerprint.

Cite this