Security Transmission Scheme for Two-way Untrusted Relay Networks Based on Simultaneous Wireless Information and Power Transfer
-
摘要:
针对非信任双向中继网络的能量受限和信息安全问题,该文提出一种基于无线携能通信(SWIPT)与人工噪声辅助的物理层安全传输方案。该方案中的非信任中继采用功率分割(PS)策略辅助合法用户进行保密通信,而全双工干扰机在进行能量采集的同时发送人工噪声以确保系统安全。以最大化系统保密性能为目标,优化了中继的PS因子,推导了保密和速率的解析式及高信噪比条件下最佳PS因子的闭式解。特别针对非理想信道状态信息的情况,分析了信道估计误差对系统保密性能的影响。仿真结果验证了理论推导的正确性,并证明了所提的基于PS策略的干扰机协同传输方案相比采用时间切换(TS)策略或目的节点协同干扰的方案具有更优的保密性能。
Abstract:The physical-layer security transmission scheme based on Simultaneous Wireless Information and Power Transfer (SWIPT) and artificial noise-aided is proposed to solve the energy-constrained and information security issues upon the two-way untrusted relay networks. The Power Splitting (PS) strategy is adopted by the untrusted relay to assist the confidential communication, where a full-duplex jammer is assigned to send the artificial noise while harvesting energy, to ensure the system security. The PS factor is optimized to maximize the secrecy performance, and then the closed-form expressions of the secrecy sum-rate and optimal PS ratio are derived in the high signal-to-noise ratio regime. Besides, the impacts of the channel estimation error on the system security are analyzed for the imperfect channel state information. Simulation results validate the correctness of the theoretical derivation and demonstrate that the proposed transmission scheme based on PS strategy and friendly jammer outperforms that based on the Time Switching (TS) strategy or destination-aided jamming.
-
RAMEZANI P, ZENG Yong, and JAMALIPOUR A. Optimal resource allocation for multiuser internet of things network with single wireless-powered relay[J]. IEEE Internet of Things Journal, 2019, 6(2): 3132–3142. doi: 10.1109/JIOT.2018.2879373 KIM J B, LIM J, and CIOFFI J M. Capacity scaling and diversity order for secure cooperative relaying with untrustworthy relays[J]. IEEE Transactions on Wireless Communications, 2015, 14(7): 3866–3876. doi: 10.1109/TWC.2015.2413784 洪涛, 张更新. 人工噪声辅助的物理层安全信号峰均功率比减低算法[J]. 电子与信息学报, 2018, 40(6): 1426–1432. doi: 10.11999/JEIT170739HONG Tao and ZHANG Gengxin. Peak-to-average power ratio reduction algorithm of artificial-noise-aided secure signal[J]. Journal of Electronics &Information Technology, 2018, 40(6): 1426–1432. doi: 10.11999/JEIT170739 LÜ Lu, CHEN Jian, YANG Long, et al. Improving physical layer security in untrusted relay networks: Cooperative jamming and power allocation[J]. IET Communications, 2017, 11(3): 393–399. doi: 10.1049/iet-com.2016.0355 KALAMKAR S S and BANERJEE A. Secure communication via a wireless energy harvesting untrusted relay[J]. IEEE Transactions on Vehicular Technology, 2017, 66(3): 2199–2213. doi: 10.1109/TVT.2016.2572960 ZHANG Rongqing, SONG Lingyang, HAN Zhu, et al. Physical layer security for two-way untrusted relaying with friendly jammers[J]. IEEE Transactions on Vehicular Technology, 2012, 61(8): 3693–3704. doi: 10.1109/TVT.2012.2209692 KUHESTANI A, MOHAMMADI A, and YEOH P L. Optimal power allocation and secrecy sum rate in two-way untrusted relaying networks with an external jammer[J]. IEEE Transactions on Communications, 2018, 66(6): 2671–2684. doi: 10.1109/TCOMM.2018.2802951 VARSHNEY L R. Transporting information and energy simultaneously[C]. 2018 IEEE International Symposium on Information Theory, Toronto, Canada, 2008: 1612–1616. doi: 10.1109/ISIT.2008.4595260. 张波, 黄开枝. 异构携能通信网络中基于人工噪声辅助的鲁棒安全传输方案[J]. 电子与信息学报, 2019, 41(1): 1–8. doi: 10.11999/JEIT180269ZHANG Bo and HUANG Kaizhi. Robust secure transmission scheme based on artificial noise-aided for heterogeneous networks with simultaneous wireless information and power transfer[J]. Journal of Electronics &Information Technology, 2019, 41(1): 1–8. doi: 10.11999/JEIT180269 LEE K, HONG J P, CHOI H H, et al. Wireless-powered two-way relaying protocols for optimizing physical layer security[J]. IEEE Transactions on Information Forensics and Security, 2019, 14(1): 162–174. doi: 10.1109/TIFS.2018.2847452 GUPTA V, KALAMKAR S S, and BANERJEE A. On secure communication using RF energy harvesting two-way untrusted relay[C]. 2018 IEEE Global Communications Conference, Singapore, 2017: 1–7. doi: 10.1109/GLOCOM.2017.8254194. MAMAGHANI M T, KUHESTANI A, and WONG K K. Secure two-way transmission via wireless-powered untrusted relay and external jammer[J]. IEEE Transactions on Vehicular Technology, 2018, 67(9): 8451–8465. doi: 10.1109/TVT.2018.2848648 HUANG Jing and SWINDLEHURST A L. Joint transmit design and node selection for one-way and two-way untrusted relay channels[C]. 2013 Asilomar Conference on Signals, Systems and Computers, Pacific Grove, USA, 2013: 1555–1559. doi: 10.1109/ACSSC.2013.6810558. LI Quanzhong, ZHANG Qi, and QIN Jiayin. Robust beamforming for cognitive multi-antenna relay networks with bounded channel uncertainties[J]. IEEE Transactions on Communications, 2014, 62(2): 478–487. doi: 10.1109/TCOMM.2014.011014.130437