Optimal Cooperative Strategies for PHY Security Maximization Subject to SNR Constraints

The cooperative jamming (CJ) and decode-and-forward (DF) protocols for physical layer security are studied in this paper. We propose a design that aims at maximizing the security gap, which is defined as the signal-to-noise ratio (SNR) difference between the destination and an eavesdropper, subject...

Full description

Bibliographic Details
Main Authors: Kyriakos Fytrakis, Nicholas Kolokotronis, Konstantinos Katsanos, Nicholas Kalouptsidis
Format: Article
Language:English
Published: IEEE 2020-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/9127415/
id doaj-790b01ff94b045299daa752d9af5496f
record_format Article
spelling doaj-790b01ff94b045299daa752d9af5496f2021-03-30T01:53:49ZengIEEEIEEE Access2169-35362020-01-01811931211932310.1109/ACCESS.2020.30054819127415Optimal Cooperative Strategies for PHY Security Maximization Subject to SNR ConstraintsKyriakos Fytrakis0https://orcid.org/0000-0002-0001-9815Nicholas Kolokotronis1https://orcid.org/0000-0003-0660-8431Konstantinos Katsanos2https://orcid.org/0000-0003-1894-5216Nicholas Kalouptsidis3Department of Informatics and Telecommunications, University of Athens, Athens, GreeceDepartment of Informatics and Telecommunications, University of Peloponnese, Tripolis, GreeceDepartment of Informatics and Telecommunications, University of Athens, Athens, GreeceDepartment of Informatics and Telecommunications, University of Athens, Athens, GreeceThe cooperative jamming (CJ) and decode-and-forward (DF) protocols for physical layer security are studied in this paper. We propose a design that aims at maximizing the security gap, which is defined as the signal-to-noise ratio (SNR) difference between the destination and an eavesdropper, subject to security and reliability constraints defining the thresholds on the received signals' SNR values at the destination and the eavesdropper. A fractional quadratically constrained quadratic program (QCQP) is formulated, which is solved analytically and closed-form expressions are determined for both protocols. Numerical results demonstrate that the proposed designs achieve the same performance for the secrecy rate under both strategies compared with state-of-the-art approaches, for a proper choice of thresholds on SNR values. Additionally, for relaxed thresholds and at the cost of a slight decrease on the optimal secrecy rate value, the received SNR values at the eavesdropper are greatly decreased for the CJ protocol and even more for the DF protocol, while guaranteeing target SNR values at the destination, compared with previous state-of-the-art approaches.https://ieeexplore.ieee.org/document/9127415/Cooperative jammingcooperative relayingfractional programminglow–resource devicesphysical layer securitywireless communications
collection DOAJ
language English
format Article
sources DOAJ
author Kyriakos Fytrakis
Nicholas Kolokotronis
Konstantinos Katsanos
Nicholas Kalouptsidis
spellingShingle Kyriakos Fytrakis
Nicholas Kolokotronis
Konstantinos Katsanos
Nicholas Kalouptsidis
Optimal Cooperative Strategies for PHY Security Maximization Subject to SNR Constraints
IEEE Access
Cooperative jamming
cooperative relaying
fractional programming
low–resource devices
physical layer security
wireless communications
author_facet Kyriakos Fytrakis
Nicholas Kolokotronis
Konstantinos Katsanos
Nicholas Kalouptsidis
author_sort Kyriakos Fytrakis
title Optimal Cooperative Strategies for PHY Security Maximization Subject to SNR Constraints
title_short Optimal Cooperative Strategies for PHY Security Maximization Subject to SNR Constraints
title_full Optimal Cooperative Strategies for PHY Security Maximization Subject to SNR Constraints
title_fullStr Optimal Cooperative Strategies for PHY Security Maximization Subject to SNR Constraints
title_full_unstemmed Optimal Cooperative Strategies for PHY Security Maximization Subject to SNR Constraints
title_sort optimal cooperative strategies for phy security maximization subject to snr constraints
publisher IEEE
series IEEE Access
issn 2169-3536
publishDate 2020-01-01
description The cooperative jamming (CJ) and decode-and-forward (DF) protocols for physical layer security are studied in this paper. We propose a design that aims at maximizing the security gap, which is defined as the signal-to-noise ratio (SNR) difference between the destination and an eavesdropper, subject to security and reliability constraints defining the thresholds on the received signals' SNR values at the destination and the eavesdropper. A fractional quadratically constrained quadratic program (QCQP) is formulated, which is solved analytically and closed-form expressions are determined for both protocols. Numerical results demonstrate that the proposed designs achieve the same performance for the secrecy rate under both strategies compared with state-of-the-art approaches, for a proper choice of thresholds on SNR values. Additionally, for relaxed thresholds and at the cost of a slight decrease on the optimal secrecy rate value, the received SNR values at the eavesdropper are greatly decreased for the CJ protocol and even more for the DF protocol, while guaranteeing target SNR values at the destination, compared with previous state-of-the-art approaches.
topic Cooperative jamming
cooperative relaying
fractional programming
low–resource devices
physical layer security
wireless communications
url https://ieeexplore.ieee.org/document/9127415/
work_keys_str_mv AT kyriakosfytrakis optimalcooperativestrategiesforphysecuritymaximizationsubjecttosnrconstraints
AT nicholaskolokotronis optimalcooperativestrategiesforphysecuritymaximizationsubjecttosnrconstraints
AT konstantinoskatsanos optimalcooperativestrategiesforphysecuritymaximizationsubjecttosnrconstraints
AT nicholaskalouptsidis optimalcooperativestrategiesforphysecuritymaximizationsubjecttosnrconstraints
_version_ 1724186226409340928