Secure Communications for Two-Way Relay Networks Via Relay Chatting

Abstract

In this paper, we investigate a two-way relay network consisting of two sources, multiple cooperative relays and an eavesdropper. To enhance secure communications, a new relay chatting based on transmission scheme is proposed. Specifically, the proposed scheme selects a best relay that maximize the sum mutual information among the sources to forward the sources’ signals using an amplify-and-forward protocol, and the remaining relays transmit interference signals to confuse the eavesdropper via distributed beam forming. It can be found that the proposed scheme with relay chatting does not require the knowledge of the eavesdropper’s channel, and outperforms the joint relay and jammer selection scheme, which introduces the interference into the sources. Numerical results show that the secrecy outage probability of the proposed scheme converges to zero as the transmit power increases.

Share and Cite:

Xiong, J. , Ma, D. , Liu, C. and Wang, X. (2013) Secure Communications for Two-Way Relay Networks Via Relay Chatting. Communications and Network, 5, 42-47. doi: 10.4236/cn.2013.53B2009.

Conflicts of Interest

The authors declare no conflicts of interest.

References

[1] A. D. Wyner, “The Wiretap Channel,” Bell System Technical Journal, Vol. 54, No. 8, 1975, pp. 1355-1367. doi:10.1002/j.1538-7305.1975.tb02040.x
[2] S. K. Leung-Yan-Cheong and M. E. Hellman, “The Gaussian Wiretap Channel,” IEEE Transactions on Information Theory, Vol. 24, No. 4, 1978, pp. 451-456. doi:10.1109/TIT.1978.1055917
[3] I. Csiszár and J.Körner, “Broadcast Channels With Confidential Messages,” IEEE Transactions on Information Theory, Vol. 24, No. 3, 1978, pp. 339-348. doi:10.1109/TIT.1978.1055892
[4] F. Oggier and B. Hassibi, “The Secrecy Capacity of The MIMO Wiretap Channel,” IEEE Transactions on Information Theory, Vol. 57, No. 8, 2011, pp. 4961-4972. doi:10.1109/TIT.2011.2158487
[5] T. Liu and S. Shamai, “A Note on The Secrecy Capacity of The Multiple Antenna Wiretap Channel,” IEEE Transactions on Information Theory, Vol. 55, No. 6, 2009, pp. 2547-2553. doi:10.1109/TIT.2009.2018322
[6] L. Dong, Z. Han, A. P. Petropulu and H. V. Poor, “Improving Wireless Physical Layer Security via Cooperating Relays,” IEEE Transactions on Signal Processing, Vol. 58, No. 3, 2010, pp. 1875-1888. doi:10.1109/TSP.2009.2038412
[7] H. M. Wang, Q. Y. Yin and X. G. Xia, “Improving the Physical Layer Security of Wireless Two-Way Relaying via Analog Network Coding,” Proceedings of IEEE Global Telecommunications Conference (GLOBECOM), Texas, Houston, Dec. 2011.
[8] H. M. Wang, Q. Y. Yin and X. G. Xia, “Distributed Beamforming for Physical-Layer Security of Two-Way Relay Networks,” IEEE Transactions on Signal Processing, Vol. 60, No. 7, 2012, pp. 3532-3545. doi:10.1109/TSP.2012.2191543
[9] I. Krikidis, J. S. Thompson and S. McLaughlin, “Relay Selection for Secure Cooperative Networks With Jamming,” IEEE Transactions on Wireless Communications, Vol. 8, No. 10, 2009, pp. 5003-5011. doi:10.1109/TWC.2009.090323
[10] J. Chen, R. Zhang, L. Song, Z. Han and B. Jiao, “Joint Relay and Jammer Selection for Secure Two-Way Relay Networks,” IEEE Transactions on Information Forensics and Security, Vol. 7, No. 1, Jan. 2012, pp. 310-320. doi:10.1109/TIFS.2011.2166386
[11] Z. Ding, K. K. Leung, D. L. Goeckel and D. Towsley. “Opportunistic Relaying for Secrecy Communications: Cooperative Jamming vs. Relay Chatting,” IEEE Transactions on Wireless Communications, Vol. 10, No. 6, 2011, pp. 1725-1729. doi: /10.1109/TWC.2011.040511.101694
[12] A. Bletsas, A. Khisti, D. P. Reed and A. Lippman, “A Simple Cooperative Diversity Method Based On Network Path Selection,” IEEE Journal Selected in Areas Communications, Vol. 24, No. 3, Mar. 2006, pp. 659-672. doi:10.1109/JSAC.2005.862417
[13] M. Bloch, J. Barros, M. Rodrigues, and S. McLaughlin, “Wireless Information-theoretic Security,” IEEE Transactions on Information Theory, Vol. 54, No. 6, 2008, pp. 2515-2534. doi:10.1109/TIT.2008.921908
[14] J. Xiong, K. K. Wong, D. Ma and J. Wei, “A Closed-Form Power Allocation for Minimizing Secrecy Outage Probability for MISO Wiretap Channels via Masked Beamforming,” IEEE Communications Letters, Vol. 16, No. 9, 2012, pp. 1496-1499. doi:10.1109/LCOMM.2012.073112.121254

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.