Loading…

Securing Untrusted Full-Duplex Relay Channels in the Presence of Multiple External Cluster-Based Eavesdroppers

We investigate the physical layer security of a wireless cooperative network where communication between Alice and Bob is assisted by a full-duplex (FD) untrusted relay, Ray, in the presence of multiple external eavesdroppers, Eves. A cluster-based colluding eavesdropping setting is considered, wher...

Full description

Saved in:
Bibliographic Details
Published in:IEEE systems journal 2020-03, Vol.14 (1), p.665-668
Main Authors: Mabrouk, Asma, Shafie, Ahmed El, Tourki, Kamel, Al-Dhahir, Naofal, Hamdi, Noureddine
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c295t-78d8818fa75a7c020b2e3b2f4a22df5e8f32677bbdf8be5ca17291dd5fa79c283
cites cdi_FETCH-LOGICAL-c295t-78d8818fa75a7c020b2e3b2f4a22df5e8f32677bbdf8be5ca17291dd5fa79c283
container_end_page 668
container_issue 1
container_start_page 665
container_title IEEE systems journal
container_volume 14
creator Mabrouk, Asma
Shafie, Ahmed El
Tourki, Kamel
Al-Dhahir, Naofal
Hamdi, Noureddine
description We investigate the physical layer security of a wireless cooperative network where communication between Alice and Bob is assisted by a full-duplex (FD) untrusted relay, Ray, in the presence of multiple external eavesdroppers, Eves. A cluster-based colluding eavesdropping setting is considered, where illegitimate nodes with common interests are grouped in a cluster. To confuse the different eavesdropping clusters, we employ artificial-noise (AN) aided beamforming at the source node. Moreover, FD relay jamming is used to improve the system's security. To maintain secure communications against the untrusted relay node, an FD destination jamming scheme is adopted. Our proposed scheme is designed based on the channel state information of the legitimate nodes only. We optimize the transmit power allocation factors between data and AN signals, the data and AN precoders at Alice, the AN precoder at Bob, and the data and AN precoders at Ray. Numerical results show that the optimal power allocation factor between data and AN depends on the total number of antennas of the different colluding eavesdropping clusters.
doi_str_mv 10.1109/JSYST.2019.2910149
format article
fullrecord <record><control><sourceid>proquest_ieee_</sourceid><recordid>TN_cdi_proquest_journals_2374694742</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>8701471</ieee_id><sourcerecordid>2374694742</sourcerecordid><originalsourceid>FETCH-LOGICAL-c295t-78d8818fa75a7c020b2e3b2f4a22df5e8f32677bbdf8be5ca17291dd5fa79c283</originalsourceid><addsrcrecordid>eNo9kM1OwzAQhC0EEqXwAnCxxDnFdpLaPkJp-REIRNsDp8hJ1jSVcYKdoPbtcdqK0660841mB6FLSkaUEnnzPP-cL0aMUDlikhKayCM0oDLmkWRxcrzbWSSoSE7RmfdrQlKRcjlAdg5F5yr7hZe2dZ1vocSzzpjovmsMbPAHGLXFk5WyFozHlcXtCvC7Aw-2AFxr_NqZtgpaPN204KwyeGJ6HxfdKR_cpuoXfOnqpgHnz9GJVsbDxWEO0XI2XUweo5e3h6fJ7UtUMJm2ERelCGG14qniBWEkZxDnTCeKsVKnIHTMxpznealFDmmhKA9vl2UaCFkwEQ_R9d63cfVPB77N1nXXh_MZi3kylglPWFCxvapwtfcOdNa46lu5bUZJ1vea7XrN-l6zQ68ButpDFQD8A4KHI6fxHyC2di0</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2374694742</pqid></control><display><type>article</type><title>Securing Untrusted Full-Duplex Relay Channels in the Presence of Multiple External Cluster-Based Eavesdroppers</title><source>IEEE Xplore (Online service)</source><creator>Mabrouk, Asma ; Shafie, Ahmed El ; Tourki, Kamel ; Al-Dhahir, Naofal ; Hamdi, Noureddine</creator><creatorcontrib>Mabrouk, Asma ; Shafie, Ahmed El ; Tourki, Kamel ; Al-Dhahir, Naofal ; Hamdi, Noureddine</creatorcontrib><description>We investigate the physical layer security of a wireless cooperative network where communication between Alice and Bob is assisted by a full-duplex (FD) untrusted relay, Ray, in the presence of multiple external eavesdroppers, Eves. A cluster-based colluding eavesdropping setting is considered, where illegitimate nodes with common interests are grouped in a cluster. To confuse the different eavesdropping clusters, we employ artificial-noise (AN) aided beamforming at the source node. Moreover, FD relay jamming is used to improve the system's security. To maintain secure communications against the untrusted relay node, an FD destination jamming scheme is adopted. Our proposed scheme is designed based on the channel state information of the legitimate nodes only. We optimize the transmit power allocation factors between data and AN signals, the data and AN precoders at Alice, the AN precoder at Bob, and the data and AN precoders at Ray. Numerical results show that the optimal power allocation factor between data and AN depends on the total number of antennas of the different colluding eavesdropping clusters.</description><identifier>ISSN: 1932-8184</identifier><identifier>EISSN: 1937-9234</identifier><identifier>DOI: 10.1109/JSYST.2019.2910149</identifier><identifier>CODEN: ISJEB2</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Beamforming ; Cluster-based eavesdropping attacks ; Clusters ; Communication system security ; Eavesdropping ; Jamming ; Nodes ; Optimization ; physical-layer security ; Receivers ; Relay ; Relays ; Security ; untrusted-relaying networks ; Wireless communication ; Wireless communications</subject><ispartof>IEEE systems journal, 2020-03, Vol.14 (1), p.665-668</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2020</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c295t-78d8818fa75a7c020b2e3b2f4a22df5e8f32677bbdf8be5ca17291dd5fa79c283</citedby><cites>FETCH-LOGICAL-c295t-78d8818fa75a7c020b2e3b2f4a22df5e8f32677bbdf8be5ca17291dd5fa79c283</cites><orcidid>0000-0003-3789-3108 ; 0000-0002-1859-3460 ; 0000-0002-7315-8242</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/8701471$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,27924,27925,54796</link.rule.ids></links><search><creatorcontrib>Mabrouk, Asma</creatorcontrib><creatorcontrib>Shafie, Ahmed El</creatorcontrib><creatorcontrib>Tourki, Kamel</creatorcontrib><creatorcontrib>Al-Dhahir, Naofal</creatorcontrib><creatorcontrib>Hamdi, Noureddine</creatorcontrib><title>Securing Untrusted Full-Duplex Relay Channels in the Presence of Multiple External Cluster-Based Eavesdroppers</title><title>IEEE systems journal</title><addtitle>JSYST</addtitle><description>We investigate the physical layer security of a wireless cooperative network where communication between Alice and Bob is assisted by a full-duplex (FD) untrusted relay, Ray, in the presence of multiple external eavesdroppers, Eves. A cluster-based colluding eavesdropping setting is considered, where illegitimate nodes with common interests are grouped in a cluster. To confuse the different eavesdropping clusters, we employ artificial-noise (AN) aided beamforming at the source node. Moreover, FD relay jamming is used to improve the system's security. To maintain secure communications against the untrusted relay node, an FD destination jamming scheme is adopted. Our proposed scheme is designed based on the channel state information of the legitimate nodes only. We optimize the transmit power allocation factors between data and AN signals, the data and AN precoders at Alice, the AN precoder at Bob, and the data and AN precoders at Ray. Numerical results show that the optimal power allocation factor between data and AN depends on the total number of antennas of the different colluding eavesdropping clusters.</description><subject>Beamforming</subject><subject>Cluster-based eavesdropping attacks</subject><subject>Clusters</subject><subject>Communication system security</subject><subject>Eavesdropping</subject><subject>Jamming</subject><subject>Nodes</subject><subject>Optimization</subject><subject>physical-layer security</subject><subject>Receivers</subject><subject>Relay</subject><subject>Relays</subject><subject>Security</subject><subject>untrusted-relaying networks</subject><subject>Wireless communication</subject><subject>Wireless communications</subject><issn>1932-8184</issn><issn>1937-9234</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><recordid>eNo9kM1OwzAQhC0EEqXwAnCxxDnFdpLaPkJp-REIRNsDp8hJ1jSVcYKdoPbtcdqK0660841mB6FLSkaUEnnzPP-cL0aMUDlikhKayCM0oDLmkWRxcrzbWSSoSE7RmfdrQlKRcjlAdg5F5yr7hZe2dZ1vocSzzpjovmsMbPAHGLXFk5WyFozHlcXtCvC7Aw-2AFxr_NqZtgpaPN204KwyeGJ6HxfdKR_cpuoXfOnqpgHnz9GJVsbDxWEO0XI2XUweo5e3h6fJ7UtUMJm2ERelCGG14qniBWEkZxDnTCeKsVKnIHTMxpznealFDmmhKA9vl2UaCFkwEQ_R9d63cfVPB77N1nXXh_MZi3kylglPWFCxvapwtfcOdNa46lu5bUZJ1vea7XrN-l6zQ68ButpDFQD8A4KHI6fxHyC2di0</recordid><startdate>202003</startdate><enddate>202003</enddate><creator>Mabrouk, Asma</creator><creator>Shafie, Ahmed El</creator><creator>Tourki, Kamel</creator><creator>Al-Dhahir, Naofal</creator><creator>Hamdi, Noureddine</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><orcidid>https://orcid.org/0000-0003-3789-3108</orcidid><orcidid>https://orcid.org/0000-0002-1859-3460</orcidid><orcidid>https://orcid.org/0000-0002-7315-8242</orcidid></search><sort><creationdate>202003</creationdate><title>Securing Untrusted Full-Duplex Relay Channels in the Presence of Multiple External Cluster-Based Eavesdroppers</title><author>Mabrouk, Asma ; Shafie, Ahmed El ; Tourki, Kamel ; Al-Dhahir, Naofal ; Hamdi, Noureddine</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c295t-78d8818fa75a7c020b2e3b2f4a22df5e8f32677bbdf8be5ca17291dd5fa79c283</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Beamforming</topic><topic>Cluster-based eavesdropping attacks</topic><topic>Clusters</topic><topic>Communication system security</topic><topic>Eavesdropping</topic><topic>Jamming</topic><topic>Nodes</topic><topic>Optimization</topic><topic>physical-layer security</topic><topic>Receivers</topic><topic>Relay</topic><topic>Relays</topic><topic>Security</topic><topic>untrusted-relaying networks</topic><topic>Wireless communication</topic><topic>Wireless communications</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Mabrouk, Asma</creatorcontrib><creatorcontrib>Shafie, Ahmed El</creatorcontrib><creatorcontrib>Tourki, Kamel</creatorcontrib><creatorcontrib>Al-Dhahir, Naofal</creatorcontrib><creatorcontrib>Hamdi, Noureddine</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Xplore</collection><collection>CrossRef</collection><jtitle>IEEE systems journal</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Mabrouk, Asma</au><au>Shafie, Ahmed El</au><au>Tourki, Kamel</au><au>Al-Dhahir, Naofal</au><au>Hamdi, Noureddine</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Securing Untrusted Full-Duplex Relay Channels in the Presence of Multiple External Cluster-Based Eavesdroppers</atitle><jtitle>IEEE systems journal</jtitle><stitle>JSYST</stitle><date>2020-03</date><risdate>2020</risdate><volume>14</volume><issue>1</issue><spage>665</spage><epage>668</epage><pages>665-668</pages><issn>1932-8184</issn><eissn>1937-9234</eissn><coden>ISJEB2</coden><abstract>We investigate the physical layer security of a wireless cooperative network where communication between Alice and Bob is assisted by a full-duplex (FD) untrusted relay, Ray, in the presence of multiple external eavesdroppers, Eves. A cluster-based colluding eavesdropping setting is considered, where illegitimate nodes with common interests are grouped in a cluster. To confuse the different eavesdropping clusters, we employ artificial-noise (AN) aided beamforming at the source node. Moreover, FD relay jamming is used to improve the system's security. To maintain secure communications against the untrusted relay node, an FD destination jamming scheme is adopted. Our proposed scheme is designed based on the channel state information of the legitimate nodes only. We optimize the transmit power allocation factors between data and AN signals, the data and AN precoders at Alice, the AN precoder at Bob, and the data and AN precoders at Ray. Numerical results show that the optimal power allocation factor between data and AN depends on the total number of antennas of the different colluding eavesdropping clusters.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/JSYST.2019.2910149</doi><tpages>4</tpages><orcidid>https://orcid.org/0000-0003-3789-3108</orcidid><orcidid>https://orcid.org/0000-0002-1859-3460</orcidid><orcidid>https://orcid.org/0000-0002-7315-8242</orcidid></addata></record>
fulltext fulltext
identifier ISSN: 1932-8184
ispartof IEEE systems journal, 2020-03, Vol.14 (1), p.665-668
issn 1932-8184
1937-9234
language eng
recordid cdi_proquest_journals_2374694742
source IEEE Xplore (Online service)
subjects Beamforming
Cluster-based eavesdropping attacks
Clusters
Communication system security
Eavesdropping
Jamming
Nodes
Optimization
physical-layer security
Receivers
Relay
Relays
Security
untrusted-relaying networks
Wireless communication
Wireless communications
title Securing Untrusted Full-Duplex Relay Channels in the Presence of Multiple External Cluster-Based Eavesdroppers
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-01T22%3A03%3A24IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_ieee_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Securing%20Untrusted%20Full-Duplex%20Relay%20Channels%20in%20the%20Presence%20of%20Multiple%20External%20Cluster-Based%20Eavesdroppers&rft.jtitle=IEEE%20systems%20journal&rft.au=Mabrouk,%20Asma&rft.date=2020-03&rft.volume=14&rft.issue=1&rft.spage=665&rft.epage=668&rft.pages=665-668&rft.issn=1932-8184&rft.eissn=1937-9234&rft.coden=ISJEB2&rft_id=info:doi/10.1109/JSYST.2019.2910149&rft_dat=%3Cproquest_ieee_%3E2374694742%3C/proquest_ieee_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c295t-78d8818fa75a7c020b2e3b2f4a22df5e8f32677bbdf8be5ca17291dd5fa79c283%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2374694742&rft_id=info:pmid/&rft_ieee_id=8701471&rfr_iscdi=true