Optimal Cooperative Strategies for PHY Security Maximization Subject to SNR Constraints
The cooperative jamming (CJ) and decode-and-forward (DF) protocols for physical layer security are studied in this paper. We propose a design that aims at maximizing the security gap, which is defined as the signal-to-noise ratio (SNR) difference between the destination and an eavesdropper, subject...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2020-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/9127415/ |
id |
doaj-790b01ff94b045299daa752d9af5496f |
---|---|
record_format |
Article |
spelling |
doaj-790b01ff94b045299daa752d9af5496f2021-03-30T01:53:49ZengIEEEIEEE Access2169-35362020-01-01811931211932310.1109/ACCESS.2020.30054819127415Optimal Cooperative Strategies for PHY Security Maximization Subject to SNR ConstraintsKyriakos Fytrakis0https://orcid.org/0000-0002-0001-9815Nicholas Kolokotronis1https://orcid.org/0000-0003-0660-8431Konstantinos Katsanos2https://orcid.org/0000-0003-1894-5216Nicholas Kalouptsidis3Department of Informatics and Telecommunications, University of Athens, Athens, GreeceDepartment of Informatics and Telecommunications, University of Peloponnese, Tripolis, GreeceDepartment of Informatics and Telecommunications, University of Athens, Athens, GreeceDepartment of Informatics and Telecommunications, University of Athens, Athens, GreeceThe cooperative jamming (CJ) and decode-and-forward (DF) protocols for physical layer security are studied in this paper. We propose a design that aims at maximizing the security gap, which is defined as the signal-to-noise ratio (SNR) difference between the destination and an eavesdropper, subject to security and reliability constraints defining the thresholds on the received signals' SNR values at the destination and the eavesdropper. A fractional quadratically constrained quadratic program (QCQP) is formulated, which is solved analytically and closed-form expressions are determined for both protocols. Numerical results demonstrate that the proposed designs achieve the same performance for the secrecy rate under both strategies compared with state-of-the-art approaches, for a proper choice of thresholds on SNR values. Additionally, for relaxed thresholds and at the cost of a slight decrease on the optimal secrecy rate value, the received SNR values at the eavesdropper are greatly decreased for the CJ protocol and even more for the DF protocol, while guaranteeing target SNR values at the destination, compared with previous state-of-the-art approaches.https://ieeexplore.ieee.org/document/9127415/Cooperative jammingcooperative relayingfractional programminglow–resource devicesphysical layer securitywireless communications |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Kyriakos Fytrakis Nicholas Kolokotronis Konstantinos Katsanos Nicholas Kalouptsidis |
spellingShingle |
Kyriakos Fytrakis Nicholas Kolokotronis Konstantinos Katsanos Nicholas Kalouptsidis Optimal Cooperative Strategies for PHY Security Maximization Subject to SNR Constraints IEEE Access Cooperative jamming cooperative relaying fractional programming low–resource devices physical layer security wireless communications |
author_facet |
Kyriakos Fytrakis Nicholas Kolokotronis Konstantinos Katsanos Nicholas Kalouptsidis |
author_sort |
Kyriakos Fytrakis |
title |
Optimal Cooperative Strategies for PHY Security Maximization Subject to SNR Constraints |
title_short |
Optimal Cooperative Strategies for PHY Security Maximization Subject to SNR Constraints |
title_full |
Optimal Cooperative Strategies for PHY Security Maximization Subject to SNR Constraints |
title_fullStr |
Optimal Cooperative Strategies for PHY Security Maximization Subject to SNR Constraints |
title_full_unstemmed |
Optimal Cooperative Strategies for PHY Security Maximization Subject to SNR Constraints |
title_sort |
optimal cooperative strategies for phy security maximization subject to snr constraints |
publisher |
IEEE |
series |
IEEE Access |
issn |
2169-3536 |
publishDate |
2020-01-01 |
description |
The cooperative jamming (CJ) and decode-and-forward (DF) protocols for physical layer security are studied in this paper. We propose a design that aims at maximizing the security gap, which is defined as the signal-to-noise ratio (SNR) difference between the destination and an eavesdropper, subject to security and reliability constraints defining the thresholds on the received signals' SNR values at the destination and the eavesdropper. A fractional quadratically constrained quadratic program (QCQP) is formulated, which is solved analytically and closed-form expressions are determined for both protocols. Numerical results demonstrate that the proposed designs achieve the same performance for the secrecy rate under both strategies compared with state-of-the-art approaches, for a proper choice of thresholds on SNR values. Additionally, for relaxed thresholds and at the cost of a slight decrease on the optimal secrecy rate value, the received SNR values at the eavesdropper are greatly decreased for the CJ protocol and even more for the DF protocol, while guaranteeing target SNR values at the destination, compared with previous state-of-the-art approaches. |
topic |
Cooperative jamming cooperative relaying fractional programming low–resource devices physical layer security wireless communications |
url |
https://ieeexplore.ieee.org/document/9127415/ |
work_keys_str_mv |
AT kyriakosfytrakis optimalcooperativestrategiesforphysecuritymaximizationsubjecttosnrconstraints AT nicholaskolokotronis optimalcooperativestrategiesforphysecuritymaximizationsubjecttosnrconstraints AT konstantinoskatsanos optimalcooperativestrategiesforphysecuritymaximizationsubjecttosnrconstraints AT nicholaskalouptsidis optimalcooperativestrategiesforphysecuritymaximizationsubjecttosnrconstraints |
_version_ |
1724186226409340928 |