Security for Two-Way Untrusted Relay against Constant and Reactive Jamming with Fixed Signals

Chan Thai, Vo-Nguyen Quoc Bao, De-Thu Huynh

Abstract


Active attacking in physical-layer security has not been significantly studied while potentially causing serious consequences for the legitimate networks. In this paper, we propose a novel method to estimate and remove the jamming signals from multiple multi-antenna jammers in a two-way relay network with multi-antenna legitimate and relay nodes. We carefully consider the signals in the time slots in order to exploit the repetition of the signals and design the transmitted signals which can work in different cases. The numerical results show that the secrecy maximum achievable sum-rate (MASR) at the legitimate nodes is higher than that of the conventional method when considering the affect of transmit SNR; the number antennas at the legitimate and relay nodes; normalized distance between one legitimate node and the relay; and the vertical coordinate of the relay.

Full Text:

PDF

References


A. Mukherjee, S. Fakoorian, J. Huang, and A. Swindlehurst, “Principles of physical layer security in multiuser wireless networks: A survey,” IEEE Comm. Surveys Tutorials, vol. 16, no. 1, pp. 1–24, Feb. 2014.

Y. Wu, A. Khisti, C. Xiao, G. Caire, K. Wong, and X. Gao, “A survey of physical layer security techniques for 5G wireless networks and challenges ahead,” IEEE J. on Sel. Areas in Comm., vol. 36, no. 4, pp. 679–695, Apr. 2018.

T. Lv, H. Gao, and S. Yang, “Secrecy transmit beamforming for heterogeneous networks,” IEEE J. Sel. Areas in Comm., vol. 33, no. 6, pp. 1154–1170, Jun. 2015.

J. Y. Ryu, J. Lee, and T. Q. S. Quek, “Confidential cooperative communication with trust degree of potential eavesdroppers,” IEEE Trans. Wireless Comm., 2016.

Q. Yan, H. Zeng, T. Jiang, M. Li, W. Lou, and Y. T. Hou, “Jamming resilient communication using MIMO interference cancellation,” IEEE Trans. Info. Foren. and Sec., vol. 11, no. 7, pp. 1486–1499, Jul. 2016.

M. Karlsson, E. Bjrnson, and E. G. Larsson, “Jamming a TDD point-to-point link using reciprocity-based MIMO,” IEEE Transactions on Information Forensics and Security, vol. 12, no. 12, pp. 2957–2970, 2017.

A. Mukherjee and A. L. Swindlehurst, “Jamming games in the mimo wiretap channel with an active eavesdropper,” IEEE Transactions on Signal Processing, vol. 61, no. 1, pp. 82–91, 2013.

L. Xiao, X. Lu, D. Xu, Y. Tang, L.Wang, andW. Zhuang, “UAV relay in VANETs against smart jamming with reinforcement learning,” IEEE Transactions on Vehicular Technology, vol. 67, no. 5, pp. 4087–4097, 2018.

C. Pu, “Jamming-resilient multipath routing protocol for flying Ad Hoc networks,” IEEE Access, vol. 6, pp. 68 472–68 486, 2018.

L. Xiao, T. Chen, J. Liu, and H. Dai, “Anti-jamming transmission stackelberg game with observation errors,” IEEE Communications Letters, vol. 19, no. 6, pp. 949–952, 2015.

L. Li, A. P. Petropulu, and Z. Chen, “MIMO secret communications against an active eavesdropper,” IEEE Trans. Info. Foren. and Sec., vol. 12, no. 10, pp. 2387–2401, Oct. 2017.

S. Vahidian, S. Hatamnia, and B. Champagne, “On the security analysis of a cooperative incremental relaying protocol in the presence of an active eavesdropper,” IEEE Access, vol. 7, pp. 181 812–181 828, Sep. 2019.

T. Lv, Y. Yin, Y. Lu, S. Yang, E. Liu, and G. Clapworthy, “Physical detection of misbehavior in relay systems with unreliable channel state information,” IEEE J. Sel. Areas in Comm., vol. 36, no. 7, pp. 1517–1530, Jul. 2018.

H. Pirayesh, P. K. Sangdeh, and H. Zeng, “Securing ZigBee communications against constant jamming attack using neural network,” IEEE Internet of Things J., pp. 1–1, 2020.

K. Panyim, T. Hayajneh, P. Krishnamurthy, and D. Tipper, “On limited-range strategic/random jamming attacks in wireless ad hoc networks,” in 2009 IEEE 34th Conf. on Local Comp. Netw., 2009, pp. 922–929.

M. Spuhler, D. Giustiniano, V. Lenders, M. Wilhelm, and J. B. Schmitt, “Detection of reactive jamming in DSSS-based wireless communications,” IEEE Trans. on Wireless Comm., vol. 13, no. 3, pp. 1593–1603, 2014.

C. Zhang, J. Ge, J. Li, F. Gong, and H. Ding, “Complexity aware relay selection for 5G large-scale secure two-way relay systems,” IEEE Trans. on Veh. Tech., vol. 66, no. 6, pp. 5461–5465, 2017.

D. Tse and P. Viswanath, “Fundamentals of wireless communications,” Cambridge Univ. Pr., 2005.




DOI: http://dx.doi.org/10.21553/rev-jec.260

Copyright (c) 2021 REV Journal on Electronics and Communications


Copyright © 2011-2024
Radio and Electronics Association of Vietnam
All rights reserved