Citation: | Jinglan OU, Huanhuan YU, Haowei WU, Rui MA, Liubin WANG. Security Transmission Scheme for Two-way Untrusted Relay Networks Based on Simultaneous Wireless Information and Power Transfer[J]. Journal of Electronics & Information Technology, 2020, 42(12): 2908-2914. doi: 10.11999/JEIT200069 |
The physical-layer security transmission scheme based on Simultaneous Wireless Information and Power Transfer (SWIPT) and artificial noise-aided is proposed to solve the energy-constrained and information security issues upon the two-way untrusted relay networks. The Power Splitting (PS) strategy is adopted by the untrusted relay to assist the confidential communication, where a full-duplex jammer is assigned to send the artificial noise while harvesting energy, to ensure the system security. The PS factor is optimized to maximize the secrecy performance, and then the closed-form expressions of the secrecy sum-rate and optimal PS ratio are derived in the high signal-to-noise ratio regime. Besides, the impacts of the channel estimation error on the system security are analyzed for the imperfect channel state information. Simulation results validate the correctness of the theoretical derivation and demonstrate that the proposed transmission scheme based on PS strategy and friendly jammer outperforms that based on the Time Switching (TS) strategy or destination-aided jamming.
RAMEZANI P, ZENG Yong, and JAMALIPOUR A. Optimal resource allocation for multiuser internet of things network with single wireless-powered relay[J]. IEEE Internet of Things Journal, 2019, 6(2): 3132–3142. doi: 10.1109/JIOT.2018.2879373
|
KIM J B, LIM J, and CIOFFI J M. Capacity scaling and diversity order for secure cooperative relaying with untrustworthy relays[J]. IEEE Transactions on Wireless Communications, 2015, 14(7): 3866–3876. doi: 10.1109/TWC.2015.2413784
|
洪涛, 张更新. 人工噪声辅助的物理层安全信号峰均功率比减低算法[J]. 电子与信息学报, 2018, 40(6): 1426–1432. doi: 10.11999/JEIT170739
HONG Tao and ZHANG Gengxin. Peak-to-average power ratio reduction algorithm of artificial-noise-aided secure signal[J]. Journal of Electronics &Information Technology, 2018, 40(6): 1426–1432. doi: 10.11999/JEIT170739
|
LÜ Lu, CHEN Jian, YANG Long, et al. Improving physical layer security in untrusted relay networks: Cooperative jamming and power allocation[J]. IET Communications, 2017, 11(3): 393–399. doi: 10.1049/iet-com.2016.0355
|
KALAMKAR S S and BANERJEE A. Secure communication via a wireless energy harvesting untrusted relay[J]. IEEE Transactions on Vehicular Technology, 2017, 66(3): 2199–2213. doi: 10.1109/TVT.2016.2572960
|
ZHANG Rongqing, SONG Lingyang, HAN Zhu, et al. Physical layer security for two-way untrusted relaying with friendly jammers[J]. IEEE Transactions on Vehicular Technology, 2012, 61(8): 3693–3704. doi: 10.1109/TVT.2012.2209692
|
KUHESTANI A, MOHAMMADI A, and YEOH P L. Optimal power allocation and secrecy sum rate in two-way untrusted relaying networks with an external jammer[J]. IEEE Transactions on Communications, 2018, 66(6): 2671–2684. doi: 10.1109/TCOMM.2018.2802951
|
VARSHNEY L R. Transporting information and energy simultaneously[C]. 2018 IEEE International Symposium on Information Theory, Toronto, Canada, 2008: 1612–1616. doi: 10.1109/ISIT.2008.4595260.
|
张波, 黄开枝. 异构携能通信网络中基于人工噪声辅助的鲁棒安全传输方案[J]. 电子与信息学报, 2019, 41(1): 1–8. doi: 10.11999/JEIT180269
ZHANG Bo and HUANG Kaizhi. Robust secure transmission scheme based on artificial noise-aided for heterogeneous networks with simultaneous wireless information and power transfer[J]. Journal of Electronics &Information Technology, 2019, 41(1): 1–8. doi: 10.11999/JEIT180269
|
LEE K, HONG J P, CHOI H H, et al. Wireless-powered two-way relaying protocols for optimizing physical layer security[J]. IEEE Transactions on Information Forensics and Security, 2019, 14(1): 162–174. doi: 10.1109/TIFS.2018.2847452
|
GUPTA V, KALAMKAR S S, and BANERJEE A. On secure communication using RF energy harvesting two-way untrusted relay[C]. 2018 IEEE Global Communications Conference, Singapore, 2017: 1–7. doi: 10.1109/GLOCOM.2017.8254194.
|
MAMAGHANI M T, KUHESTANI A, and WONG K K. Secure two-way transmission via wireless-powered untrusted relay and external jammer[J]. IEEE Transactions on Vehicular Technology, 2018, 67(9): 8451–8465. doi: 10.1109/TVT.2018.2848648
|
HUANG Jing and SWINDLEHURST A L. Joint transmit design and node selection for one-way and two-way untrusted relay channels[C]. 2013 Asilomar Conference on Signals, Systems and Computers, Pacific Grove, USA, 2013: 1555–1559. doi: 10.1109/ACSSC.2013.6810558.
|
LI Quanzhong, ZHANG Qi, and QIN Jiayin. Robust beamforming for cognitive multi-antenna relay networks with bounded channel uncertainties[J]. IEEE Transactions on Communications, 2014, 62(2): 478–487. doi: 10.1109/TCOMM.2014.011014.130437
|