Joint Relay and Jammer Selection for Secure Two-Way Relay Networks

  • Authors:
  • Jingchao Chen;Rongqing Zhang;Lingyang Song;Zhu Han;Bingli Jiao

  • Affiliations:
  • Wireless Communication and Signal Processing Research Center, School of Electronics Engineering and Computer Science, Peking University, Beijing, China;Wireless Communication and Signal Processing Research Center, School of Electronics Engineering and Computer Science, Peking University, Beijing, China;Wireless Communication and Signal Processing Research Center, School of Electronics Engineering and Computer Science, Peking University, Beijing, China;Electrical and Computer Engineering Department, University of Houston, Houston, TX, USA;Wireless Communication and Signal Processing Research Center, School of Electronics Engineering and Computer Science, Peking University, Beijing, China

  • Venue:
  • IEEE Transactions on Information Forensics and Security - Part 2
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper, we investigate joint relay and jammer selection in two-way cooperative networks, consisting of two sources, a number of intermediate nodes, and one eavesdropper, with the constraints of physical-layer security. Specifically, the proposed algorithms select two or three intermediate nodes to enhance security against the malicious eavesdropper. The first selected node operates in the conventional relay mode and assists the sources to deliver their data to the corresponding destinations using an amplify-and-forward protocol. The second and third nodes are used in different communication phases as jammers in order to create intentional interference upon the malicious eavesdropper. First, we find that in a topology where the intermediate nodes are randomly and sparsely distributed, the proposed schemes with cooperative jamming outperform the conventional nonjamming schemes within a certain transmitted power regime. We also find that, in the scenario where the intermediate nodes gather as a close cluster, the jamming schemes may be less effective than their nonjamming counterparts. Therefore, we introduce a hybrid scheme to switch between jamming and nonjamming modes. Simulation results validate our theoretical analysis and show that the hybrid switching scheme further improves the secrecy rate.