Securing Untrusted RF-EH Relay Networks Using Cooperative Jamming Signals

We propose a new scheme to secure a wireless-powered untrusted cooperative-communication network, where a legitimate source node (Alice) transmits her information messages to a legitimate destination node (Bob) through the multiple amplify-and-forward untrusted relays. The relay nodes are assumed to...

Full description

Bibliographic Details
Main Authors: Ahmed El Shafie, Asma Mabrouk, Kamel Tourki, Naofal Al-Dhahir, Ridha Hamila
Format: Article
Language:English
Published: IEEE 2017-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8093604/
_version_ 1818410546311987200
author Ahmed El Shafie
Asma Mabrouk
Kamel Tourki
Naofal Al-Dhahir
Ridha Hamila
author_facet Ahmed El Shafie
Asma Mabrouk
Kamel Tourki
Naofal Al-Dhahir
Ridha Hamila
author_sort Ahmed El Shafie
collection DOAJ
description We propose a new scheme to secure a wireless-powered untrusted cooperative-communication network, where a legitimate source node (Alice) transmits her information messages to a legitimate destination node (Bob) through the multiple amplify-and-forward untrusted relays. The relay nodes are assumed to be honest but curious nodes; hence, they are trusted at the service level but are untrusted at the information level. To reduce the energy consumption of the network, only one relay node is selected in each time slot to forward Alice's information signal. We assume a power-splitting-based energy-harvesting scheme, where each relay node splits its received signal into information and energy streams. Since the relay nodes are assumed to be untrusted at the information level, they attempt to decode the information intended to Bob while harvesting energy at the same time. When the relaying mode is selected, the scheme is realized over two non-overlapping time phases. To prevent any information leakage to the untrusted relay nodes, Bob and a cooperative jammer (John) inject jamming (artificial noise) signals during the first phase. During the second phase, the untrusted relay nodes that will not be forwarding the information signal must harvest energy to accumulate more energy to help Alice in future time slots. Moreover, the cooperative jammer will jam the untrusted relays to further power their batteries and prevent them from decoding the information-forwarding relay signal in case they decided to cheat and decode it. We model the battery state transitions at each relay as a finite-state Markov chain and analyze it. Our numerical results show the security gains of our proposed scheme relative to two benchmark schemes.
first_indexed 2024-12-14T10:17:14Z
format Article
id doaj.art-427c047ca01d4d519f7de1964386b2c4
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-12-14T10:17:14Z
publishDate 2017-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-427c047ca01d4d519f7de1964386b2c42022-12-21T23:06:44ZengIEEEIEEE Access2169-35362017-01-015243532436710.1109/ACCESS.2017.27685088093604Securing Untrusted RF-EH Relay Networks Using Cooperative Jamming SignalsAhmed El Shafie0https://orcid.org/0000-0002-7315-8242Asma Mabrouk1Kamel Tourki2https://orcid.org/0000-0002-1859-3460Naofal Al-Dhahir3Ridha Hamila4https://orcid.org/0000-0002-6920-7371Electrical Engineering Department, The University of Texas at Dallas, Richardson, TX, USAHANA Research Laboratory, National School of Computer Sciences, Université de la Manouba, Manouba, TunisiaMathematical and Algorithmic Sciences Laboratory, France Research Center, Huawei Technologies France SASU, Huawei, FranceElectrical Engineering Department, The University of Texas at Dallas, Richardson, TX, USADepartment of Electrical Engineering, Qatar University, Doha, QatarWe propose a new scheme to secure a wireless-powered untrusted cooperative-communication network, where a legitimate source node (Alice) transmits her information messages to a legitimate destination node (Bob) through the multiple amplify-and-forward untrusted relays. The relay nodes are assumed to be honest but curious nodes; hence, they are trusted at the service level but are untrusted at the information level. To reduce the energy consumption of the network, only one relay node is selected in each time slot to forward Alice's information signal. We assume a power-splitting-based energy-harvesting scheme, where each relay node splits its received signal into information and energy streams. Since the relay nodes are assumed to be untrusted at the information level, they attempt to decode the information intended to Bob while harvesting energy at the same time. When the relaying mode is selected, the scheme is realized over two non-overlapping time phases. To prevent any information leakage to the untrusted relay nodes, Bob and a cooperative jammer (John) inject jamming (artificial noise) signals during the first phase. During the second phase, the untrusted relay nodes that will not be forwarding the information signal must harvest energy to accumulate more energy to help Alice in future time slots. Moreover, the cooperative jammer will jam the untrusted relays to further power their batteries and prevent them from decoding the information-forwarding relay signal in case they decided to cheat and decode it. We model the battery state transitions at each relay as a finite-state Markov chain and analyze it. Our numerical results show the security gains of our proposed scheme relative to two benchmark schemes.https://ieeexplore.ieee.org/document/8093604/Batteryenergy harvestingsecrecyuntrusted relayingrelay selection
spellingShingle Ahmed El Shafie
Asma Mabrouk
Kamel Tourki
Naofal Al-Dhahir
Ridha Hamila
Securing Untrusted RF-EH Relay Networks Using Cooperative Jamming Signals
IEEE Access
Battery
energy harvesting
secrecy
untrusted relaying
relay selection
title Securing Untrusted RF-EH Relay Networks Using Cooperative Jamming Signals
title_full Securing Untrusted RF-EH Relay Networks Using Cooperative Jamming Signals
title_fullStr Securing Untrusted RF-EH Relay Networks Using Cooperative Jamming Signals
title_full_unstemmed Securing Untrusted RF-EH Relay Networks Using Cooperative Jamming Signals
title_short Securing Untrusted RF-EH Relay Networks Using Cooperative Jamming Signals
title_sort securing untrusted rf eh relay networks using cooperative jamming signals
topic Battery
energy harvesting
secrecy
untrusted relaying
relay selection
url https://ieeexplore.ieee.org/document/8093604/
work_keys_str_mv AT ahmedelshafie securinguntrustedrfehrelaynetworksusingcooperativejammingsignals
AT asmamabrouk securinguntrustedrfehrelaynetworksusingcooperativejammingsignals
AT kameltourki securinguntrustedrfehrelaynetworksusingcooperativejammingsignals
AT naofalaldhahir securinguntrustedrfehrelaynetworksusingcooperativejammingsignals
AT ridhahamila securinguntrustedrfehrelaynetworksusingcooperativejammingsignals