Securing Untrusted RF-EH Relay Networks Using Cooperative Jamming Signals
We propose a new scheme to secure a wireless-powered untrusted cooperative-communication network, where a legitimate source node (Alice) transmits her information messages to a legitimate destination node (Bob) through the multiple amplify-and-forward untrusted relays. The relay nodes are assumed to...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2017-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8093604/ |
_version_ | 1818410546311987200 |
---|---|
author | Ahmed El Shafie Asma Mabrouk Kamel Tourki Naofal Al-Dhahir Ridha Hamila |
author_facet | Ahmed El Shafie Asma Mabrouk Kamel Tourki Naofal Al-Dhahir Ridha Hamila |
author_sort | Ahmed El Shafie |
collection | DOAJ |
description | We propose a new scheme to secure a wireless-powered untrusted cooperative-communication network, where a legitimate source node (Alice) transmits her information messages to a legitimate destination node (Bob) through the multiple amplify-and-forward untrusted relays. The relay nodes are assumed to be honest but curious nodes; hence, they are trusted at the service level but are untrusted at the information level. To reduce the energy consumption of the network, only one relay node is selected in each time slot to forward Alice's information signal. We assume a power-splitting-based energy-harvesting scheme, where each relay node splits its received signal into information and energy streams. Since the relay nodes are assumed to be untrusted at the information level, they attempt to decode the information intended to Bob while harvesting energy at the same time. When the relaying mode is selected, the scheme is realized over two non-overlapping time phases. To prevent any information leakage to the untrusted relay nodes, Bob and a cooperative jammer (John) inject jamming (artificial noise) signals during the first phase. During the second phase, the untrusted relay nodes that will not be forwarding the information signal must harvest energy to accumulate more energy to help Alice in future time slots. Moreover, the cooperative jammer will jam the untrusted relays to further power their batteries and prevent them from decoding the information-forwarding relay signal in case they decided to cheat and decode it. We model the battery state transitions at each relay as a finite-state Markov chain and analyze it. Our numerical results show the security gains of our proposed scheme relative to two benchmark schemes. |
first_indexed | 2024-12-14T10:17:14Z |
format | Article |
id | doaj.art-427c047ca01d4d519f7de1964386b2c4 |
institution | Directory Open Access Journal |
issn | 2169-3536 |
language | English |
last_indexed | 2024-12-14T10:17:14Z |
publishDate | 2017-01-01 |
publisher | IEEE |
record_format | Article |
series | IEEE Access |
spelling | doaj.art-427c047ca01d4d519f7de1964386b2c42022-12-21T23:06:44ZengIEEEIEEE Access2169-35362017-01-015243532436710.1109/ACCESS.2017.27685088093604Securing Untrusted RF-EH Relay Networks Using Cooperative Jamming SignalsAhmed El Shafie0https://orcid.org/0000-0002-7315-8242Asma Mabrouk1Kamel Tourki2https://orcid.org/0000-0002-1859-3460Naofal Al-Dhahir3Ridha Hamila4https://orcid.org/0000-0002-6920-7371Electrical Engineering Department, The University of Texas at Dallas, Richardson, TX, USAHANA Research Laboratory, National School of Computer Sciences, Université de la Manouba, Manouba, TunisiaMathematical and Algorithmic Sciences Laboratory, France Research Center, Huawei Technologies France SASU, Huawei, FranceElectrical Engineering Department, The University of Texas at Dallas, Richardson, TX, USADepartment of Electrical Engineering, Qatar University, Doha, QatarWe propose a new scheme to secure a wireless-powered untrusted cooperative-communication network, where a legitimate source node (Alice) transmits her information messages to a legitimate destination node (Bob) through the multiple amplify-and-forward untrusted relays. The relay nodes are assumed to be honest but curious nodes; hence, they are trusted at the service level but are untrusted at the information level. To reduce the energy consumption of the network, only one relay node is selected in each time slot to forward Alice's information signal. We assume a power-splitting-based energy-harvesting scheme, where each relay node splits its received signal into information and energy streams. Since the relay nodes are assumed to be untrusted at the information level, they attempt to decode the information intended to Bob while harvesting energy at the same time. When the relaying mode is selected, the scheme is realized over two non-overlapping time phases. To prevent any information leakage to the untrusted relay nodes, Bob and a cooperative jammer (John) inject jamming (artificial noise) signals during the first phase. During the second phase, the untrusted relay nodes that will not be forwarding the information signal must harvest energy to accumulate more energy to help Alice in future time slots. Moreover, the cooperative jammer will jam the untrusted relays to further power their batteries and prevent them from decoding the information-forwarding relay signal in case they decided to cheat and decode it. We model the battery state transitions at each relay as a finite-state Markov chain and analyze it. Our numerical results show the security gains of our proposed scheme relative to two benchmark schemes.https://ieeexplore.ieee.org/document/8093604/Batteryenergy harvestingsecrecyuntrusted relayingrelay selection |
spellingShingle | Ahmed El Shafie Asma Mabrouk Kamel Tourki Naofal Al-Dhahir Ridha Hamila Securing Untrusted RF-EH Relay Networks Using Cooperative Jamming Signals IEEE Access Battery energy harvesting secrecy untrusted relaying relay selection |
title | Securing Untrusted RF-EH Relay Networks Using Cooperative Jamming Signals |
title_full | Securing Untrusted RF-EH Relay Networks Using Cooperative Jamming Signals |
title_fullStr | Securing Untrusted RF-EH Relay Networks Using Cooperative Jamming Signals |
title_full_unstemmed | Securing Untrusted RF-EH Relay Networks Using Cooperative Jamming Signals |
title_short | Securing Untrusted RF-EH Relay Networks Using Cooperative Jamming Signals |
title_sort | securing untrusted rf eh relay networks using cooperative jamming signals |
topic | Battery energy harvesting secrecy untrusted relaying relay selection |
url | https://ieeexplore.ieee.org/document/8093604/ |
work_keys_str_mv | AT ahmedelshafie securinguntrustedrfehrelaynetworksusingcooperativejammingsignals AT asmamabrouk securinguntrustedrfehrelaynetworksusingcooperativejammingsignals AT kameltourki securinguntrustedrfehrelaynetworksusingcooperativejammingsignals AT naofalaldhahir securinguntrustedrfehrelaynetworksusingcooperativejammingsignals AT ridhahamila securinguntrustedrfehrelaynetworksusingcooperativejammingsignals |