10th EAI International Conference on Communications and Networking in China

Research Article

Cooperative Beamforming and Jammer Selection Strategies for Two-Hop Secure Communication

  • @INPROCEEDINGS{10.4108/eai.15-8-2015.2261066,
        author={Hao Deng and Hui-Ming Wang and Chaowen Liu and Tong-Xing Zheng and Wenjie Wang},
        title={Cooperative Beamforming and Jammer Selection Strategies for Two-Hop Secure Communication},
        proceedings={10th EAI International Conference on Communications and Networking in China},
        publisher={IEEE},
        proceedings_a={CHINACOM},
        year={2015},
        month={9},
        keywords={physical layer security; cooperative jamming; jammer selection; cooperative communications},
        doi={10.4108/eai.15-8-2015.2261066}
    }
    
  • Hao Deng
    Hui-Ming Wang
    Chaowen Liu
    Tong-Xing Zheng
    Wenjie Wang
    Year: 2015
    Cooperative Beamforming and Jammer Selection Strategies for Two-Hop Secure Communication
    CHINACOM
    IEEE
    DOI: 10.4108/eai.15-8-2015.2261066
Hao Deng1, Hui-Ming Wang1,*, Chaowen Liu1, Tong-Xing Zheng1, Wenjie Wang1
  • 1: School of Electronic and Information Engineering, Xi’an Jiaotong University
*Contact email: xjbswhm@gmail.com

Abstract

In this paper, we propose a novel scheme to enhance the security of a single source-destination cooperative network with multiple helpers and one eavesdropper, where a helper operates as a jammer and the others use amplify-and-forward (AF) protocol to deliver a weighted version of the received signal. Since the instantaneous channel state information (CSI) of the eavesdropper is not available, we hope to achieve the maximum signal-to-noise ratio (SNR) and guarantee that the jamming signal is cancelled out at the destination. The weights of the relay can be obtained by just solving a semidefinite programming (SDP) without bisection search. We provide two jammer selection strategies for two cases, i.e., with or without knowledge of the eavesdropper’s position. Simulation results confirm a great improvement of the security in the considered network.