Secrecy Analysis of Multi-user Half/Full-Duplex Wireless Bi-directional Relaying Network

Secrecy Analysis of Multi-user Half/Full-Duplex Wireless Bi-directional Relaying Network

This study investigates the secrecy performance of the relay-assisted orthogonal frequency division multiplexing technique. The investigation utilizes a multi-user illegitimate half/full-duplex based bi-directional relaying, which is under the effect of a finite number of friendly jammers, system model. In reference to Monte-Carlo computer simulation results, the system model that operates in half-duplex mode achieves slightly better secrecy outage performance than the system model that operates in full-duplex mode. The results also show that the information leakage can be minimized by using friendly jammers, yet the friendly jammers degrade the system secrecy performance and result in system coding gain losses in high signal-to-noise ratios.

___

  • R. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Commun. of the ACM, vol. 21, pp. 120–126, 1978.
  • J. Daemen and V. Rijmen, “AES proposal: Rijndael,” 1999.
  • A. D. Wyner, “The wire-tap channel,” Bell. Syst. Tech. J., vol. 54, no. 8, p. 13551387, 1975.
  • Z. Ding, Y. Liu, J. Choi, Q. Sun, M. Elkashlan, C. I, and H. V . Poor, “Application of non-orthogonal multiple access in lte and 5g networks,” IEEE Commun. Magazine, vol. 55, no. 2, pp. 185–191, February 2017.
  • C. Cai, Y. Cai, R. Wang, W. Yang, and W. Yang, “Resource allocation for physical layer security in cooperative OFDM networks,” in 2015 Intern. Conf. on Wireless Commun. Signal Processing (WCSP), Oct 2015, pp. 1–5.
  • C. Jeong and I. M. Kim, “Optimal power allocation for secure multicarrier relay systems,” IEEE Trans. on Signal Process., vol. 59, no. 11, pp. 5428–5442, Nov 2011.
  • H. Zhang, H. Xing, J. Cheng, A. Nallanathan, and V. C. M. Leung, “Secure resource allocation for OFDMA two-way relay wireless sensor networks without and with cooperative jamming,” IEEE Trans. on Indust. Informatics, vol. 12, no. 5, pp. 1714–1725, Oct 2016.
  • D. W. K. Ng, E. S. Lo, and R. Schober, “Secure resource allocation and scheduling for OFDMA decode-and-forward relay networks,” IEEE Trans. on Wireless Commun., vol. 10, no. 10, pp. 3528–3540, October 2011.
  • W. Aman, G. A. S. Sidhu, T. Jabeen, F. Gao, and S. Jin, “Enhancing physical layer security in dual-hop multiuser transmission,” in 2016 IEEE Wireless Commun. and Networking Conf., April 2016, pp. 1–6.
  • C. Cai, Y. Cai, and W. Yang, “Secrecy rates for relay selection in OFDMA networks,” in 2011 Third Intern. Conf. on Commun. and Mobile Comp., April 2011, pp. 158–160.
  • V. Ozduran, “Physical layer security of multi-user full-duplex one-way wireless relaying network,” in Advances in Wireless and Optical Communications (RTUWO’18), Riga, Latvia, 1516 November 2018.
  • E. W. Weisstein, “Meijer g-function.” From MathWorld–A Wolfram Web Resource. http://mathworld.wolfram.com/MeijerGFunction.html, accessed on 25 June 2019.
  • N. H. Mahmood, I. S. Ansari, P. Popovski, P. Mogensen, and K. A. Qaraqe, “Physical-layer security with full-duplex transceivers and multiuser receiver at eve,” IEEE Trans. on Commun., vol. 65, no. 10, pp. 4392–4405, Oct 2017.
  • E. Soleimani-Nasab, M. Matthaiou, M. Ardebilipour, and G. K. Karagiannidis, “Two-way AF relaying in the presence of cochannel interference,” IEEE Trans. on Commun., vol. 61, no. 8, pp. 3156–3169, August 2013.
  • J. Miranda, R. Abrishambaf, T. Gomes, P. Gonalves, J. Cabral, A. Tavares, and J. Monteiro, “Path loss exponent analysis in wireless sensor networks: Experimental evaluation,” in 2013 11th IEEE International Conference on Industrial Informatics (INDIN), July 2013, pp. 54–58.
  • V. Ozduran, E. Soleimani-Nasab, and B. S. Yarman, “Opportunistic source-pair selection for multi-user two-way amplifyand-forward wireless relaying networks,” IET Commun., vol. 10, no. 16, pp. 2106–2118, 2016.
  • L. Jimnez Rodrguez, N. H. Tran, and T. Le-Ngoc, “Performance of full-duplex af relaying in the presence of residual selfinterference,” IEEE Journal on Selected Areas in Commun., vol. 32, no. 9, pp. 1752–1764, Sep. 2014.
  • A. Papoulis and U. Pillai, Probability, random variables and stochastic processes, 4th ed. McGraw-Hill, 11 2001.
  • I. S. Gradshteyn and I. M. Ryzhik, Tables of Integrals, Series and Products. Elsevier Inc., 7th edition, 2007.
  • V. S. Adamchik and O. I. Marichev, The algorithm for calculating integrals of hypergeometric type functions and its realization in REDUCE systems. Proc. Conf. ISSAC’90, Tokyo, pp. 212224, 1990.