Loading…
Securing Untrusted Full-Duplex Relay Channels in the Presence of Multiple External Cluster-Based Eavesdroppers
We investigate the physical layer security of a wireless cooperative network where communication between Alice and Bob is assisted by a full-duplex (FD) untrusted relay, Ray, in the presence of multiple external eavesdroppers, Eves. A cluster-based colluding eavesdropping setting is considered, wher...
Saved in:
Published in: | IEEE systems journal 2020-03, Vol.14 (1), p.665-668 |
---|---|
Main Authors: | , , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c295t-78d8818fa75a7c020b2e3b2f4a22df5e8f32677bbdf8be5ca17291dd5fa79c283 |
---|---|
cites | cdi_FETCH-LOGICAL-c295t-78d8818fa75a7c020b2e3b2f4a22df5e8f32677bbdf8be5ca17291dd5fa79c283 |
container_end_page | 668 |
container_issue | 1 |
container_start_page | 665 |
container_title | IEEE systems journal |
container_volume | 14 |
creator | Mabrouk, Asma Shafie, Ahmed El Tourki, Kamel Al-Dhahir, Naofal Hamdi, Noureddine |
description | We investigate the physical layer security of a wireless cooperative network where communication between Alice and Bob is assisted by a full-duplex (FD) untrusted relay, Ray, in the presence of multiple external eavesdroppers, Eves. A cluster-based colluding eavesdropping setting is considered, where illegitimate nodes with common interests are grouped in a cluster. To confuse the different eavesdropping clusters, we employ artificial-noise (AN) aided beamforming at the source node. Moreover, FD relay jamming is used to improve the system's security. To maintain secure communications against the untrusted relay node, an FD destination jamming scheme is adopted. Our proposed scheme is designed based on the channel state information of the legitimate nodes only. We optimize the transmit power allocation factors between data and AN signals, the data and AN precoders at Alice, the AN precoder at Bob, and the data and AN precoders at Ray. Numerical results show that the optimal power allocation factor between data and AN depends on the total number of antennas of the different colluding eavesdropping clusters. |
doi_str_mv | 10.1109/JSYST.2019.2910149 |
format | article |
fullrecord | <record><control><sourceid>proquest_ieee_</sourceid><recordid>TN_cdi_proquest_journals_2374694742</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>8701471</ieee_id><sourcerecordid>2374694742</sourcerecordid><originalsourceid>FETCH-LOGICAL-c295t-78d8818fa75a7c020b2e3b2f4a22df5e8f32677bbdf8be5ca17291dd5fa79c283</originalsourceid><addsrcrecordid>eNo9kM1OwzAQhC0EEqXwAnCxxDnFdpLaPkJp-REIRNsDp8hJ1jSVcYKdoPbtcdqK0660841mB6FLSkaUEnnzPP-cL0aMUDlikhKayCM0oDLmkWRxcrzbWSSoSE7RmfdrQlKRcjlAdg5F5yr7hZe2dZ1vocSzzpjovmsMbPAHGLXFk5WyFozHlcXtCvC7Aw-2AFxr_NqZtgpaPN204KwyeGJ6HxfdKR_cpuoXfOnqpgHnz9GJVsbDxWEO0XI2XUweo5e3h6fJ7UtUMJm2ERelCGG14qniBWEkZxDnTCeKsVKnIHTMxpznealFDmmhKA9vl2UaCFkwEQ_R9d63cfVPB77N1nXXh_MZi3kylglPWFCxvapwtfcOdNa46lu5bUZJ1vea7XrN-l6zQ68ButpDFQD8A4KHI6fxHyC2di0</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2374694742</pqid></control><display><type>article</type><title>Securing Untrusted Full-Duplex Relay Channels in the Presence of Multiple External Cluster-Based Eavesdroppers</title><source>IEEE Xplore (Online service)</source><creator>Mabrouk, Asma ; Shafie, Ahmed El ; Tourki, Kamel ; Al-Dhahir, Naofal ; Hamdi, Noureddine</creator><creatorcontrib>Mabrouk, Asma ; Shafie, Ahmed El ; Tourki, Kamel ; Al-Dhahir, Naofal ; Hamdi, Noureddine</creatorcontrib><description>We investigate the physical layer security of a wireless cooperative network where communication between Alice and Bob is assisted by a full-duplex (FD) untrusted relay, Ray, in the presence of multiple external eavesdroppers, Eves. A cluster-based colluding eavesdropping setting is considered, where illegitimate nodes with common interests are grouped in a cluster. To confuse the different eavesdropping clusters, we employ artificial-noise (AN) aided beamforming at the source node. Moreover, FD relay jamming is used to improve the system's security. To maintain secure communications against the untrusted relay node, an FD destination jamming scheme is adopted. Our proposed scheme is designed based on the channel state information of the legitimate nodes only. We optimize the transmit power allocation factors between data and AN signals, the data and AN precoders at Alice, the AN precoder at Bob, and the data and AN precoders at Ray. Numerical results show that the optimal power allocation factor between data and AN depends on the total number of antennas of the different colluding eavesdropping clusters.</description><identifier>ISSN: 1932-8184</identifier><identifier>EISSN: 1937-9234</identifier><identifier>DOI: 10.1109/JSYST.2019.2910149</identifier><identifier>CODEN: ISJEB2</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Beamforming ; Cluster-based eavesdropping attacks ; Clusters ; Communication system security ; Eavesdropping ; Jamming ; Nodes ; Optimization ; physical-layer security ; Receivers ; Relay ; Relays ; Security ; untrusted-relaying networks ; Wireless communication ; Wireless communications</subject><ispartof>IEEE systems journal, 2020-03, Vol.14 (1), p.665-668</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2020</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c295t-78d8818fa75a7c020b2e3b2f4a22df5e8f32677bbdf8be5ca17291dd5fa79c283</citedby><cites>FETCH-LOGICAL-c295t-78d8818fa75a7c020b2e3b2f4a22df5e8f32677bbdf8be5ca17291dd5fa79c283</cites><orcidid>0000-0003-3789-3108 ; 0000-0002-1859-3460 ; 0000-0002-7315-8242</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/8701471$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,27924,27925,54796</link.rule.ids></links><search><creatorcontrib>Mabrouk, Asma</creatorcontrib><creatorcontrib>Shafie, Ahmed El</creatorcontrib><creatorcontrib>Tourki, Kamel</creatorcontrib><creatorcontrib>Al-Dhahir, Naofal</creatorcontrib><creatorcontrib>Hamdi, Noureddine</creatorcontrib><title>Securing Untrusted Full-Duplex Relay Channels in the Presence of Multiple External Cluster-Based Eavesdroppers</title><title>IEEE systems journal</title><addtitle>JSYST</addtitle><description>We investigate the physical layer security of a wireless cooperative network where communication between Alice and Bob is assisted by a full-duplex (FD) untrusted relay, Ray, in the presence of multiple external eavesdroppers, Eves. A cluster-based colluding eavesdropping setting is considered, where illegitimate nodes with common interests are grouped in a cluster. To confuse the different eavesdropping clusters, we employ artificial-noise (AN) aided beamforming at the source node. Moreover, FD relay jamming is used to improve the system's security. To maintain secure communications against the untrusted relay node, an FD destination jamming scheme is adopted. Our proposed scheme is designed based on the channel state information of the legitimate nodes only. We optimize the transmit power allocation factors between data and AN signals, the data and AN precoders at Alice, the AN precoder at Bob, and the data and AN precoders at Ray. Numerical results show that the optimal power allocation factor between data and AN depends on the total number of antennas of the different colluding eavesdropping clusters.</description><subject>Beamforming</subject><subject>Cluster-based eavesdropping attacks</subject><subject>Clusters</subject><subject>Communication system security</subject><subject>Eavesdropping</subject><subject>Jamming</subject><subject>Nodes</subject><subject>Optimization</subject><subject>physical-layer security</subject><subject>Receivers</subject><subject>Relay</subject><subject>Relays</subject><subject>Security</subject><subject>untrusted-relaying networks</subject><subject>Wireless communication</subject><subject>Wireless communications</subject><issn>1932-8184</issn><issn>1937-9234</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><recordid>eNo9kM1OwzAQhC0EEqXwAnCxxDnFdpLaPkJp-REIRNsDp8hJ1jSVcYKdoPbtcdqK0660841mB6FLSkaUEnnzPP-cL0aMUDlikhKayCM0oDLmkWRxcrzbWSSoSE7RmfdrQlKRcjlAdg5F5yr7hZe2dZ1vocSzzpjovmsMbPAHGLXFk5WyFozHlcXtCvC7Aw-2AFxr_NqZtgpaPN204KwyeGJ6HxfdKR_cpuoXfOnqpgHnz9GJVsbDxWEO0XI2XUweo5e3h6fJ7UtUMJm2ERelCGG14qniBWEkZxDnTCeKsVKnIHTMxpznealFDmmhKA9vl2UaCFkwEQ_R9d63cfVPB77N1nXXh_MZi3kylglPWFCxvapwtfcOdNa46lu5bUZJ1vea7XrN-l6zQ68ButpDFQD8A4KHI6fxHyC2di0</recordid><startdate>202003</startdate><enddate>202003</enddate><creator>Mabrouk, Asma</creator><creator>Shafie, Ahmed El</creator><creator>Tourki, Kamel</creator><creator>Al-Dhahir, Naofal</creator><creator>Hamdi, Noureddine</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><orcidid>https://orcid.org/0000-0003-3789-3108</orcidid><orcidid>https://orcid.org/0000-0002-1859-3460</orcidid><orcidid>https://orcid.org/0000-0002-7315-8242</orcidid></search><sort><creationdate>202003</creationdate><title>Securing Untrusted Full-Duplex Relay Channels in the Presence of Multiple External Cluster-Based Eavesdroppers</title><author>Mabrouk, Asma ; Shafie, Ahmed El ; Tourki, Kamel ; Al-Dhahir, Naofal ; Hamdi, Noureddine</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c295t-78d8818fa75a7c020b2e3b2f4a22df5e8f32677bbdf8be5ca17291dd5fa79c283</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Beamforming</topic><topic>Cluster-based eavesdropping attacks</topic><topic>Clusters</topic><topic>Communication system security</topic><topic>Eavesdropping</topic><topic>Jamming</topic><topic>Nodes</topic><topic>Optimization</topic><topic>physical-layer security</topic><topic>Receivers</topic><topic>Relay</topic><topic>Relays</topic><topic>Security</topic><topic>untrusted-relaying networks</topic><topic>Wireless communication</topic><topic>Wireless communications</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Mabrouk, Asma</creatorcontrib><creatorcontrib>Shafie, Ahmed El</creatorcontrib><creatorcontrib>Tourki, Kamel</creatorcontrib><creatorcontrib>Al-Dhahir, Naofal</creatorcontrib><creatorcontrib>Hamdi, Noureddine</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Xplore</collection><collection>CrossRef</collection><jtitle>IEEE systems journal</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Mabrouk, Asma</au><au>Shafie, Ahmed El</au><au>Tourki, Kamel</au><au>Al-Dhahir, Naofal</au><au>Hamdi, Noureddine</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Securing Untrusted Full-Duplex Relay Channels in the Presence of Multiple External Cluster-Based Eavesdroppers</atitle><jtitle>IEEE systems journal</jtitle><stitle>JSYST</stitle><date>2020-03</date><risdate>2020</risdate><volume>14</volume><issue>1</issue><spage>665</spage><epage>668</epage><pages>665-668</pages><issn>1932-8184</issn><eissn>1937-9234</eissn><coden>ISJEB2</coden><abstract>We investigate the physical layer security of a wireless cooperative network where communication between Alice and Bob is assisted by a full-duplex (FD) untrusted relay, Ray, in the presence of multiple external eavesdroppers, Eves. A cluster-based colluding eavesdropping setting is considered, where illegitimate nodes with common interests are grouped in a cluster. To confuse the different eavesdropping clusters, we employ artificial-noise (AN) aided beamforming at the source node. Moreover, FD relay jamming is used to improve the system's security. To maintain secure communications against the untrusted relay node, an FD destination jamming scheme is adopted. Our proposed scheme is designed based on the channel state information of the legitimate nodes only. We optimize the transmit power allocation factors between data and AN signals, the data and AN precoders at Alice, the AN precoder at Bob, and the data and AN precoders at Ray. Numerical results show that the optimal power allocation factor between data and AN depends on the total number of antennas of the different colluding eavesdropping clusters.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/JSYST.2019.2910149</doi><tpages>4</tpages><orcidid>https://orcid.org/0000-0003-3789-3108</orcidid><orcidid>https://orcid.org/0000-0002-1859-3460</orcidid><orcidid>https://orcid.org/0000-0002-7315-8242</orcidid></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1932-8184 |
ispartof | IEEE systems journal, 2020-03, Vol.14 (1), p.665-668 |
issn | 1932-8184 1937-9234 |
language | eng |
recordid | cdi_proquest_journals_2374694742 |
source | IEEE Xplore (Online service) |
subjects | Beamforming Cluster-based eavesdropping attacks Clusters Communication system security Eavesdropping Jamming Nodes Optimization physical-layer security Receivers Relay Relays Security untrusted-relaying networks Wireless communication Wireless communications |
title | Securing Untrusted Full-Duplex Relay Channels in the Presence of Multiple External Cluster-Based Eavesdroppers |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-01T22%3A03%3A24IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_ieee_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Securing%20Untrusted%20Full-Duplex%20Relay%20Channels%20in%20the%20Presence%20of%20Multiple%20External%20Cluster-Based%20Eavesdroppers&rft.jtitle=IEEE%20systems%20journal&rft.au=Mabrouk,%20Asma&rft.date=2020-03&rft.volume=14&rft.issue=1&rft.spage=665&rft.epage=668&rft.pages=665-668&rft.issn=1932-8184&rft.eissn=1937-9234&rft.coden=ISJEB2&rft_id=info:doi/10.1109/JSYST.2019.2910149&rft_dat=%3Cproquest_ieee_%3E2374694742%3C/proquest_ieee_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c295t-78d8818fa75a7c020b2e3b2f4a22df5e8f32677bbdf8be5ca17291dd5fa79c283%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2374694742&rft_id=info:pmid/&rft_ieee_id=8701471&rfr_iscdi=true |