Loading...

Physical layer security in AF and CF relay networks with RF-energy harvesting

Soleimani, A ; Sharif University of Technology

481 Viewed
  1. Type of Document: Article
  2. DOI: 10.1109/ISCISC.2017.8488378
  3. Abstract:
  4. In this paper, we investigate the achievable secrecy rate in a relay channel where the source and the destination wish to keep the information confidential from an untrusted relay (potential eavesdropper). The relay has no energy supply, and harvests its required energy for relaying from its received signals. For radio-frequency (RF) Energy Harvesting (EH) at the relay, we adopt power splitting (PS) approach. We study the problem of achieving positive secrecy rates between the transmitter and the receiver while making use of an untrusted relay. Energy limitation at the relay makes the problem more interesting. Because, the relay must choose either to eavesdrop the signal to be able to decode or to harvest energy (from the information signal) to be able to forward the message. Our scheme to guarantee the secrecy uses cooperative jamming by either the destination or an extra jammer node. We derive the achievable secrecy rates for the compress-and-forward (CF) and amplify-and-forward (AF) relays for two different scenarios. First, we assume the destination and the jammer are two separate nodes. Then, we consider destination-assisted jamming. In addition, we let the relay to use both the sources and the jammers transmitted signals to harvest energy. Our numerical results show that our proposed schemes guarantee a positive secrecy rate by properly locating the jammer and allocating enough jamming power. However, for a given power budget (i.e., fixed total transmission and jamming power) there is an optimum amount for the jamming power. © 2017 IEEE
  5. Keywords:
  6. Budget control ; Cryptography ; Energy harvesting ; Jamming ; Network layers ; Security of data ; Achievable secrecy rates ; Amplifyand-forward relay ; Compress and forward ; Cooperative jamming ; Information signals ; Physical layer security ; Radio-frequency energy harvesting ; RF energy harvesting ; Chromium compounds
  7. Source: 2017 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, ISCISC 2017, 6 September 2017 through 7 September 2017 ; 2018 , Pages 86-92 ; 9781538665602 (ISBN)
  8. URL: https://ieeexplore.ieee.org/document/8488378