Secure Transmission for Multiuser Relay Networks

Sung Il Kim, Il Min Kim, Jun Heo

Research output: Contribution to journalArticlepeer-review

45 Citations (Scopus)

Abstract

We investigate secure transmission for multiuser relay networks, where the undesired users who are not selected for data reception may overhear the source message as eavesdroppers. In this system, the secrecy performance may deteriorate as the number of users increases, since the number of eavesdroppers also increases. To address this issue, we consider a multiuser relay scheme with cooperative jamming (MUCJ). In this scheme, the desired user sends a jamming signal to the relay while the source sends its message to the relay, and then the relay amplifies and forwards the received signal to the desired user. Since the jamming can be subtracted only at the desired user, it acts as interference to prevent the eavesdroppers from intercepting the source message. We propose an optimal user selection scheme for the MUCJ, which is optimal in the sense of maximizing the secrecy rate. For the existing multiuser relay scheme (MURS) without cooperative jamming and the MUCJ, we derive the ergodic secrecy rates and analyze the asymptotic secrecy rate gains. We reveal that the ergodic secrecy rate can be increased as the number of users grows and much higher secrecy rate can be achieved by the MUCJ.

Original languageEnglish
Article number7055280
Pages (from-to)3724-3737
Number of pages14
JournalIEEE Transactions on Wireless Communications
Volume14
Issue number7
DOIs
Publication statusPublished - 2015 Jul 1

Bibliographical note

Publisher Copyright:
© 2015 IEEE.

Keywords

  • Cooperative jamming
  • multiuser relay networks
  • physical layer security
  • secrecy capacity
  • secure communications
  • untrustworthy users

ASJC Scopus subject areas

  • Computer Science Applications
  • Electrical and Electronic Engineering
  • Applied Mathematics

Fingerprint

Dive into the research topics of 'Secure Transmission for Multiuser Relay Networks'. Together they form a unique fingerprint.

Cite this