Physical Layer Security in Two-Way SWIPT Relay Networks with Imperfect CSI and a Friendly Jammer

In this paper, the security of two-way relay communications in the presence of a passive eavesdropper is investigated. Two users communicate via a relay that depends solely on energy harvesting to amplify and forward the received signals. Time switching is employed at the relay to harvest energy and...

Full description

Bibliographic Details
Main Authors: Maymoona Hayajneh, Thomas Aaron Gulliver
Format: Article
Language:English
Published: MDPI AG 2023-01-01
Series:Entropy
Subjects:
Online Access:https://www.mdpi.com/1099-4300/25/1/122
_version_ 1827626104777605120
author Maymoona Hayajneh
Thomas Aaron Gulliver
author_facet Maymoona Hayajneh
Thomas Aaron Gulliver
author_sort Maymoona Hayajneh
collection DOAJ
description In this paper, the security of two-way relay communications in the presence of a passive eavesdropper is investigated. Two users communicate via a relay that depends solely on energy harvesting to amplify and forward the received signals. Time switching is employed at the relay to harvest energy and obtain user information. A friendly jammer is utilized to hinder the eavesdropping from wiretapping the information signal. The eavesdropper employs maximal ratio combining and selection combining to improve the signal-to-noise ratio of the wiretapped signals. Geometric programming (GP) is used to maximize the secrecy capacity of the system by jointly optimizing the time switching ratio of the relay and transmit power of the two users and jammer. The impact of imperfect channel state information at the eavesdropper for the links between the eavesdropper and the other nodes is determined. Further, the secrecy capacity when the jamming signal is not perfectly cancelled at the relay is examined. The secrecy capacity is shown to be greater with a jammer compared to the case without a jammer. The effect of the relay, jammer, and eavesdropper locations on the secrecy capacity is also studied. It is shown that the secrecy capacity is greatest when the relay is at the midpoint between the users. The closer the jammer is to the eavesdropper, the higher the secrecy capacity as the shorter distance decreases the signal-to-noise ratio of the jammer.
first_indexed 2024-03-09T12:49:11Z
format Article
id doaj.art-96ecc610831c448ea3d55a0bb47e801b
institution Directory Open Access Journal
issn 1099-4300
language English
last_indexed 2024-03-09T12:49:11Z
publishDate 2023-01-01
publisher MDPI AG
record_format Article
series Entropy
spelling doaj.art-96ecc610831c448ea3d55a0bb47e801b2023-11-30T22:08:58ZengMDPI AGEntropy1099-43002023-01-0125112210.3390/e25010122Physical Layer Security in Two-Way SWIPT Relay Networks with Imperfect CSI and a Friendly JammerMaymoona Hayajneh0Thomas Aaron Gulliver1Department of Electrical and Computer Engineering, University of Victoria, P.O. Box 1700, STN CSC, Victoria, BC V8W 2Y2, CanadaDepartment of Electrical and Computer Engineering, University of Victoria, P.O. Box 1700, STN CSC, Victoria, BC V8W 2Y2, CanadaIn this paper, the security of two-way relay communications in the presence of a passive eavesdropper is investigated. Two users communicate via a relay that depends solely on energy harvesting to amplify and forward the received signals. Time switching is employed at the relay to harvest energy and obtain user information. A friendly jammer is utilized to hinder the eavesdropping from wiretapping the information signal. The eavesdropper employs maximal ratio combining and selection combining to improve the signal-to-noise ratio of the wiretapped signals. Geometric programming (GP) is used to maximize the secrecy capacity of the system by jointly optimizing the time switching ratio of the relay and transmit power of the two users and jammer. The impact of imperfect channel state information at the eavesdropper for the links between the eavesdropper and the other nodes is determined. Further, the secrecy capacity when the jamming signal is not perfectly cancelled at the relay is examined. The secrecy capacity is shown to be greater with a jammer compared to the case without a jammer. The effect of the relay, jammer, and eavesdropper locations on the secrecy capacity is also studied. It is shown that the secrecy capacity is greatest when the relay is at the midpoint between the users. The closer the jammer is to the eavesdropper, the higher the secrecy capacity as the shorter distance decreases the signal-to-noise ratio of the jammer.https://www.mdpi.com/1099-4300/25/1/122amplify and forwardeavesdropperimperfect channel state informationrelaysecrecy capacitysimultaneous wireless information and power transfer
spellingShingle Maymoona Hayajneh
Thomas Aaron Gulliver
Physical Layer Security in Two-Way SWIPT Relay Networks with Imperfect CSI and a Friendly Jammer
Entropy
amplify and forward
eavesdropper
imperfect channel state information
relay
secrecy capacity
simultaneous wireless information and power transfer
title Physical Layer Security in Two-Way SWIPT Relay Networks with Imperfect CSI and a Friendly Jammer
title_full Physical Layer Security in Two-Way SWIPT Relay Networks with Imperfect CSI and a Friendly Jammer
title_fullStr Physical Layer Security in Two-Way SWIPT Relay Networks with Imperfect CSI and a Friendly Jammer
title_full_unstemmed Physical Layer Security in Two-Way SWIPT Relay Networks with Imperfect CSI and a Friendly Jammer
title_short Physical Layer Security in Two-Way SWIPT Relay Networks with Imperfect CSI and a Friendly Jammer
title_sort physical layer security in two way swipt relay networks with imperfect csi and a friendly jammer
topic amplify and forward
eavesdropper
imperfect channel state information
relay
secrecy capacity
simultaneous wireless information and power transfer
url https://www.mdpi.com/1099-4300/25/1/122
work_keys_str_mv AT maymoonahayajneh physicallayersecurityintwowayswiptrelaynetworkswithimperfectcsiandafriendlyjammer
AT thomasaarongulliver physicallayersecurityintwowayswiptrelaynetworkswithimperfectcsiandafriendlyjammer