Next Article in Journal
A Maximum Entropy Procedure to Solve Likelihood Equations
Next Article in Special Issue
Secrecy Enhancing Scheme for Spatial Modulation Using Antenna Selection and Artificial Noise
Previous Article in Journal
On the Robustness of Multiscale Indices for Long-Term Monitoring in Cardiac Signals
Previous Article in Special Issue
List-Decoding Capacity of the Gaussian Arbitrarily-Varying Channel
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Confidential Cooperative Communication with the Trust Degree of Jammer

1
National Pilot School of Software, Yunnan University, Kunming 650504, China
2
Key Laboratory in Software Engineering of Yunnan Province, Kunming 650504, China
3
School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China
4
School of Communication Engineering, Hangzhou Dianzi University, Hangzhou 310018, China
*
Author to whom correspondence should be addressed.
Entropy 2019, 21(6), 595; https://doi.org/10.3390/e21060595
Submission received: 16 May 2019 / Revised: 11 June 2019 / Accepted: 13 June 2019 / Published: 15 June 2019
(This article belongs to the Special Issue Information-Theoretic Security II)

Abstract

:
In this paper, we consider the trust degree of a jammer, defined as the probability that the jammer cooperates to secure the legitimate transmission, and investigate its influence on confidential cooperative communication. According to the trust degree, we derive the closed-form optimal transmit signal-to-noise ratio (SNR) of the confidential message, ρ c , to maximize the expected secrecy rate, and further obtain the relationship between ρ c and the trust degree associated with the transmit SNR at the transmit user and channel gains. Simulation results demonstrate that the trust degree has a great effect on the transmit SNR of the confidential message and helps improve the performance of confidential cooperation in terms of the expected secrecy rate.

1. Introduction

With the rapid growth of communications between socially-connected users, not only physical parameters, e.g., channel qualities and traffic demands, but also the social relationship among users, such as kinship, friendship, and acquaintance, have been taken into account as key design parameters for efficient cooperative communications [1,2,3,4,5]. As the most fundamental concept, the trust degree of the social relationship is interpreted as the degree that reveals how willingly a node helps other nodes’ communication in cooperative communications [5]. In other words, the node would like to cooperate with others by consuming their own resources if they have a close relationship, i.e., a high trust degree, which can be evaluated and quantified based on the previous direct or indirect information according to observations of behavior [6].
In the literature, the trust degree has triggered plenty of research interest in various fields, including content caching, mobile social communications, and especially cooperative communications [1,2,3,4,5]. More specifically, the optimal social-aware relay selection strategy was proposed in [1], while a partner selection algorithm was designed based on the social-position relationship in [2]. The trust degree-based beamforming and transmission strategies were investigated for one relay in [3] and two relays with different trusts in [4] for a MISO cooperative communication system. Meanwhile, the traffic demand-driven user cooperation strategies were considered for various antenna configurations based on the trust degree in [5].
Due to the broadcasting nature of wireless mediums, physical (PHY)-layer security has also drawn significant attention in communication networks [7,8,9,10,11]. Specifically, the authors in [8] gave a constructive survey on threats and attacks on mobile networks, while a comprehensive survey on cooperative relaying and jamming strategies for physical layer security was presented in [9]. Meanwhile, the performance analysis of mmWave-overlaid microwave cellular networks was given in [10] from the security perspective, and secrecy analysis with passive eavesdroppers by using partial cooperation was investigated in [11]. Furthermore, with the rapid development of social awareness networks, the combination of the trust degree and PHY-layer security with application to cooperative communications has attracted plenty of research [12,13,14,15]. To be specific, the authors in [12] treated potential eavesdroppers as relays to transmit messages and maximize the expected secrecy rate according to their trustworthiness, instead of regarding them as wiretappers all the time. In [13,14], trust degree-based cooperative secure transmission strategies were proposed, and users with sufficiently high trust degrees would cooperate to transmit data or jamming signals. In [15], jamming-aided cooperative cooperation based on trust degree was investigated to maximize the security rate of the data transmission for P2P communications, where the authors applied a brute-force approach to search over all possible power allocations of the confidential message and jamming signal. However, the trust degree in [13,14] was exploited to choose trustworthy users (jammer [13], jammer and relay [14]) and filter out untrustworthy users (dummy nodes), and the explicit relationship between power allocations and trust degree had not been investigated and given in [15]. Therefore, the characteristics of the jammer’ trust degree were not fully utilized to effectively design cooperative secure transmission strategies, and the insight into how the trust degree affects the confidential cooperation was not explicitly investigated and well presented.
Motivated by the aforementioned research and problems, we have observed that the trust degree plays a significant role in cooperative secure communications. Hence, in this paper, we consider the probability that the jammer cooperates in secure legitimate transmission as its trust degree and investigate its influence on the performance of confidential cooperative communications. Different from [15], we not only consider the transmit signal-to-noise ratios (SNRs) of the confidential message and jamming signal, but also investigate the influence of artificial interference at the transmit user (Tu) in the case that the jamming signal from the jammer is not sufficient when the channel gain between the jammer and eavesdropper is weak and obtain their optimal transmit SNRs in closed-form to maximize the expected secrecy rate according to the trust degree. Meanwhile, we further achieve some meaningful results based on the relationship among the trust degree, channel gains, and the transmit SNR at Tu.
Notation: For a complex scalar x, its complex conjugate is denoted by x ¯ . E [ · ] and CN ( · ) denote the statistical expectation and complex Gaussian distributions, respectively.

2. Trust Degree and System Model

2.1. Trust Degree

With the rapid growth of online social networks, more and more people are getting involved in online social interactions. Therefore, the social relationship has emerged as an important issue to investigate how the degree of closeness of the social relationship between users affects their communication strategies [5,16,17,18]. In the cooperative communication systems, the trust degree can be interpreted as the degree that reveals how much a node is willing to help the communication of the other node [1,3,5]. Similarly, in our system model, the trust degree between T and J , α , is defined by the probability that J helps to secure the transmission between T and R , and thus, α is a value in the range of 0 α 1 .
In the literature, the trust degree has been evaluated and quantified in various ways [6,19,20,21,22,23]. In emergency networks such as disaster relief and public safety networks, the most trustworthy nodes would be those in the immediate region, so the trust degree can be measured based on the proximity between nodes, e.g., physical distance [19]. In general mobile networks, the trust degree can be evaluated by the observations of the previous behaviors of the node [6,20,21,22,23]. In [22,23], the trust degree was determined using the Bayesian framework. In the Bayesian framework, the trust degree is given by the ratio of the observations of the positive behavior among total observations, where the positive behavior is that the node behaves in the predefined way of the network. Similar to [23], in this paper, the positive behavior is defined by jammer, which helps to secure the transmission of Tu, and hence, Tu can estimate the trust degree based on the historical observations of the positive behavior of jammer. The trust degree can also be updated according to new observations. However, when the number of observations is sufficiently large, the trust degree will have ignorable change according to new observation, and it will be more like a constant. Therefore, in our system model, we assume that the trust degree remains unchanged during the transmission [5].

2.2. System Model

Consider a user cooperation network as shown in Figure 1, where there are four single-antenna nodes, including a Tu, a receive user (Ru), a jammer, and an eavesdropper, and we denote them by T , R , J , and E , respectively. The channels from T to R and E , and from J to E and R are denoted by h t r , h t e , h j e , and h j r , where all of them follow a complex Gaussian distribution with zero mean and different covariances, σ h t r 2 , σ h t e 2 , σ h j e 2 m and σ h j r 2 , respectively.
In this paper, we consider that J will transmit the jamming signal to confound E in order to help the legitimate transmission between T and R based on trust degree α , which characterize the willingness that J cooperates with T for secure communications, i.e., J helps with high probability when the trust degree is high. In this system, we consider the following two transmission strategies for confidential communications:
(a) Direct transmission: J does not help to confound E with jamming signal x j , and thus, T transmits artificial interference, x i , together with a confidential message, x c , to keep its transmission secure, where x i and x c are independent. In this strategy, the transmit data at T and J are written as { x t = P c x c + P i x i , x j d = 0 } , while E [ x i x ¯ i ] = 1 and E [ x c x ¯ c ] = 1 , where P c + P i P T and P T is the maximum transmit budget at T .
(b) Cooperative transmission: J transmits jamming signal x j to guarantee additionally the secure transmission between T and R and helps to reserve more power for the confidential message at T . However, T also needs to generate artificial interference for this strategy in case the jamming signal from the jammer is not sufficient when channel gain | h j e | 2 is small. Thus, the transmit data at T and J are given by { x t = P c x c + P i x i , x j c = P j x j } , while E [ x j c x ¯ j c ] = 1 , where P j P J and P J is the maximum transmit budget at J .
According to the above strategies, the expected secrecy rate with respect to (w.r.t.) trust degree α , the similar structure of which was given in [15], is obtained by:
R ¯ s e ( ρ c , ρ i , ρ j ) = α ¯ log 2 ( 1 + ρ c g t r ) log 2 1 + ρ c g t e ρ i g t e + 1 + + α log 2 ( 1 + ρ c g t r ) log 2 1 + ρ c g t e ρ i g t e + ρ j g j e + 1 + ,
in which we assume that x i and x j are prior-known at R , and R can completely cancel x i and x j from its received signal, which is a common assumption used in [12,24]. Notice that the information of jamming and artificial interference can be shared through an alternative wired connection between the transmitter or jammer and the receiver. In (1), [ x ] + = max { 0 , x } and α ¯ 1 α . The channel gains are defined as g t r = | h t r | 2 , g t e = | h t e | 2 and g j e = | h j e | 2 . The transmit SNRs are given as ρ c = P c σ 2 , ρ i = P i σ 2 and ρ j = P j σ 2 , where σ 2 is the variance of the complex Gaussian distribution, CN ( 0 , σ 2 ) , associated with the additive white Gaussian noise (AWGN) at R and E . The first term of (1) denotes the secrecy rate at R obtained by the direct transmission strategy when J does not help with the possibility α ¯ , while the second term represents the secrecy rate achieved by the cooperative transmission when J helps to jam with the possibility α .

3. Problem Formulation and Solution

From (1), it is noted that for given { ρ c , ρ j } , (1) is a monotonic increasing function w.r.t. ρ i , and thus, the optimal transmit SNR of artificial interference that maximizes (1) is achieved when ρ i = ρ T ρ c i.e., P i = P T P c , where ρ T = P T σ 2 . Meanwhile, it also applies to the case that for given { ρ c , ρ i } , the optimal transmit SNR of the jamming signal is ρ j = ρ J P J σ 2 , which maximizes (1). Therefore, the problem that maximizes (1) can be formulated as:
P : max ρ c R ¯ s e ( ρ c )
s . t . 0 ρ c ρ T ,
where:
R ¯ s e ( ρ c ) = α ¯ log 2 ( 1 + ρ c g t r ) log 2 1 + ρ c g t e ( ρ T ρ c ) g t e + 1 + + α log 2 ( 1 + ρ c g t r ) log 2 1 + ρ c g t e ( ρ T ρ c ) g t e + ρ J g j e + 1 + .
To maximize the expected secrecy rate in P , the optimal transmit SNR of confidential message, ρ c , at T can be achieved resorting to the following theorem.
Theorem 1.
For given channel conditions and transmit SNRs, ρ T and ρ J , the optimal transmit SNR of confidential message, ρ c , that maximizes the expected secrecy rate at R is obtained as:
ρ c = ρ 1 , if g t e g t r , ρ T g t r g t e + g t r g t e g t r g j e + < ρ J g t e g t r g t r g j e max g t e g t r g t r g j e , ρ T g t r g t e + g t r g t e g t r g j e < ρ J ρ T g t r g t e + g t e g t r g t r g j e ρ c l , if g t e g t r , g t e g t r g t r g j e < ρ J ρ T g t r g t e + g t r g t e g t r g j e ρ T , if g t e g t r , ρ T g t r g t e + g t e g t r g t r g j e < ρ J ρ 2 or ρ 3 , otherwise ,
where ρ c l = ρ T g t r g t e + g t r g t e g t r g t e , ρ 1 = ρ T g t r g t e + ρ J g t r g j e + g t r g t e 2 g t r g t e ,
ρ 2 = min b + b 2 4 a c 2 a + , ρ c l , if g t e g t r min b + b 2 4 a c 2 a + , ρ T , if g t e < g t r , and ρ 3 = min b b 2 4 a c 2 a + , ρ c l , if g t e g t r min b b 2 4 a c 2 a + , ρ T , if g t e < g t r
in which a = 1 , b = 3 ρ T g t e + ( 2 α ) ρ J g j e + 3 g t r g t e 2 g t r g t e , and c = ( ρ T g t r g t e + g t r g t e + α g t e ) ( ρ T g t e + ρ J g j e + 1 ) + α g t e ( ρ T g t e + 1 ) 2 g t r g t e 2 . It is true that b 2 4 a c 0 , and the proof is given as:
Proof. 
Define f ( α ) = b 2 4 a c . With some mathematic manipulations, we can obtain:
f ( α ) = ( 2 α ) 2 ρ J 2 g t r 2 g j e 2 + ( 4 6 α ) ρ J g t r g j e ( ρ T g t r g t e + g t r + g t e ) + ( ρ T g t r g t e + g t r + g t e ) 2 4 g t r 2 g t e 2 .
Based on the property of the derivative, it is straightforward to know that f ( α ) is a decreasing function w.r.t. α for α [ 0 , 1 ] , and min α f ( α ) = f ( α ) α = 1 0 . □
Proof. 
The proof of Theorem 1 is presented in Appendix A. □
Notice that the one yielding the larger expected secrecy rate is regarded as ρ c between ρ 2 and ρ 3 ; meanwhile, the optimal transmit SNR of artificial interference is given by ρ i = ρ T ρ c . To get a better insight into the relationship between the optimal transmit SNR of the confidential message, ρ c , and trust degree α , we have the following corollary.
Corollary 1.
When the transmit SNR of the jamming signal goes to infinity, i.e., ρ J + , the optimal transmit SNR of the confidential message, ρ c , can be obtained as:
ρ c = 0 , if g t e g t r , 0 α < α 1 ρ α , if g t e g t r , α 1 α < α 2 g t e < g t r , 0 α < α 3 ρ c l , if g t e g t r , α 2 α < α 3 ρ T , if g t e g t r , g t e < g t r , α 3 α 1 ,
where ρ α = ρ T g t r g t e + g t r g t e + α g t e ( 2 α ) g t r g t e , α 1 = g t e g t r ρ T g t r g t e g t e + , α 2 = ρ T g t r g t e + g t r g t e ρ T g t r g t e + g t r + , and α 3 = ρ T g t r g t e + g t e g t r ρ T g t r g t e + g t e + .
Proof. 
The proof is given in Appendix C. □
Remark 1.
From Corollary 1, we observe that the optimal transmit SNR of the confidential message, ρ c , is mainly determined by the relationship among the trust degree, channel qualities, and the transmit SNR at T . If the eavesdropping channel quality is better than that of the legitimate channel such that g t e g t r , it is not secure to transmit any confidential message when α is small. With growing α within a moderate range, the transmit SNR of the confidential message basically depends on α. More specifically, T will reduce the power for artificial interference and allocate more power for the confidential message to exploit the cooperation of J fully. Furthermore, when J helps to jam with high probability, equivalently α is high, T relies on J to guarantee secure transmission and assigns all the power for confidential message. Notice that when the legitimate channel quality is good such that g t e < g t r , it is still secure to send the confidential message with an appropriate transmit SNR even if α is small.

4. Simulation Results

In this section, we evaluate the performance of the trust degree-based confidential cooperative communication and use the average gains of channel elements as { σ h t r 2 , σ h t e 2 , σ h j e 2 } = 20 , 20 , 20 dB, and the expected secrecy rates are averaged over 10 4 channel realizations.
In Figure 2, we plot the expected secrecy rates at R versus the trust degree of J , when the transmit SNRs at T and J are given by ρ T = ρ J = 30 dB. To compare with the proposed confidential cooperation scheme, we also plot the expected secrecy rate of the no cooperation case (NCC) ( α = 0 ). For the proposed confidential cooperation, the optimal transmit SNR of the confidential message at T for cooperation is obtained as ρ c in Theorem 1. In Figure 2, it is certified that the expected secrecy rate can be significantly improved by the jammer’s cooperation and increased with growing the trust degree of J , yielding a higher expected secrecy rate than NCC.
In Figure 3, we plot the expected secrecy rates at R versus the transmit SNR of the jamming signal at J , when the transmit SNR at T is given by ρ T = 30 dB. In this figure, we first observe that when the transmit SNR of the jamming signal increases from 5 dB to 60 dB, i.e., ρ J goes to infinity, as shown in Corollary 1, the expected secrecy rate at R can be increased through the cooperation of J , and T will assign more power for the confidential message with growing α to achieve a higher expected secrecy rate. However, the expected secrecy rate does not increase all the time and will become saturated with the growth of ρ J , as shown in (A5), which has no relationship with ρ J when ρ J goes to infinity.

5. Conclusions

In this paper, we investigated the confidential cooperative communication according to the jammer’s trust degree and exploited its characteristics to design efficient cooperative strategies. To maximize the expected secrecy rate, we derived the closed-form optimal transmit SNR of the confidential message based on the trust degree and observed that the expected secrecy rate will become saturated along with the increasing ρ J . Simulation results showed that T will achieve a better performance with more power assignment for the confidential message instead of artificial interference with the growing trust degree of J , which has a great influence on the performance of confidential cooperation in terms of the expected secrecy rate.

Author Contributions

Conceptualization, M.Z.; investigation, M.Z.; methodology, D.L.; supervision, W.F.; writing, original draft, M.Z.; writing, review and editing, H.G; all authors have read and approved the final manuscript.

Funding

This work of Mingxiong Zhao is supported in part by the National Natural Science Foundation of China under Grant 61801418, in part by Yunnan Applied Basic Research Projects under Grant 2019FD-12, in part by the Open Foundation of Key Laboratory in Software Engineering of Yunnan Province under Grant 2017SE203. This work of Hui Gao is supported by the National Natural Science Foundation of China under Grant 61401041 and 61671072.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A. Proof of Theorem 1

If g t e g t r , from (3), we first deal with the operation of [ x ] + in (3) and consider two conditions (i) ρ c ρ c l ρ T g t r g t e + g t r g t e g t r g t e and (ii) ρ c ρ c u ρ T g t r g t e + ρ J g t r g j e + g t r g t e g t r g t e to make the first and the second term in (3) non-negative. Notice that ρ c 0 and ρ J 0 . According to (i) and (ii), we investigate (3) and solve P as follows:
(1) If ρ c u ρ c ρ T , we obtain ρ J g t e g t r g t r g j e , and R ¯ s e ( ρ c ) = 0 .
(2) If ρ c l ρ c < ρ c u ρ T ,
R ¯ s e ( ρ c ) = α log 2 1 + ρ c g t e ( ρ T ρ c ) g t e + ρ J g j e + 1 log 2 ( 1 + ρ c g t r ) log 2 1 + ρ c g t e ( ρ T ρ c ) g t e + ρ J g j e + 1 ,
which is a concave function w.r.t. ρ c . Resorting to d R ¯ s e ( ρ c ) d ρ c = 0 , we can get ρ c o = ρ T g t r g t e + ρ J g t r g j e + g t r g t e 2 g t r g t e . Based on whether ρ c o lies in [ ρ c l , ρ c u ) , different situations are given as follows:
  • If ρ T g t r g t e + g t r g t e g t r g j e + ρ J g t e g t r g t r g j e , ρ c o [ ρ c l , ρ c u ) , the optimal transmit SNR of the confidential message that maximizes (A1) is obtained by ρ c = ρ T g t r g t e + ρ J g t r g j e + g t r g t e 2 g t r g t e ;
  • If ρ J min ρ T g t r g t e + g t r g t e g t r g j e + , g t e g t r g t r g j e , ρ c o [ 0 , ρ c l ] , the optimal transmit SNR of the confidential message is obtained by ρ c = ρ c l due to the concavity of (A1).
(3) If 0 ρ c ρ c l ρ c u ρ T or 0 ρ c ρ c l ρ T ρ c u , where the boundary point ρ c l can be included in this interval without affecting the optimal transmit SNR of confidential message ρ c , the formulation of R ¯ s e ( ρ c ) is the same, given by:
R ¯ s e ( ρ c ) = log 2 ( 1 + ρ c g t r ) α ¯ log 2 1 + ρ c g t e ( ρ T ρ c ) g t e + 1 α log 2 1 + ρ c g t e ( ρ T ρ c ) g t e + ρ J g j e + 1 ,
which is concave w.r.t. ρ c , and the proof is given in Appendix B. With the help of factorization, the optimal transmit SNR of the confidential message that maximizes (A2) is obtained by using d R ¯ s e ( ρ c ) d ρ c = 0 to get ρ c o , which is part of ρ 2 and ρ 3 in Theorem 1. Notice that it is necessary to check the feasibility of ρ c o whether it lies in [ 0 , ρ c l ] . If not, the boundary point is chosen as ρ c due to the concavity of (A2), and thus, the result in the second part of (2) in this Appendix can be classified in this part.
(4) If ρ c l ρ c ρ T < ρ c u , we obtain ρ J > g t e g t r g t r g j e , and the formulation of R ¯ s e ( ρ c ) is given by (A1). Resorting to d R ¯ s e ( ρ c ) d ρ c = 0 , we can get ρ c o = ρ T g t r g t e + ρ J g t r g j e + g t r g t e 2 g t r g t e . Based on the feasibility check, we can get the following results:
  • If ρ T g t r g t e + g t e g t r g t r g j e < ρ J , ρ c o > ρ T , the optimal transmit SNR of the confidential message is obtained by ρ c = ρ T due to the concavity of (A1);
  • If max g t e g t r g t r g j e , ρ T g t r g t e + g t r g t e g t r g j e < ρ J ρ T g t r g t e + g t e g t r g t r g j e , ρ c o ( ρ c l , ρ T ] , the optimal transmit SNR of the confidential message is obtained by ρ c = ρ T g t r g t e + ρ J g t r g j e + g t r g t e 2 g t r g t e ;
  • If g t e g t r g t r g j e < ρ J ρ T g t r g t e + g t r g t e g t r g j e , ρ c o [ 0 , ρ c l ] , the optimal transmit SNR of the confidential message is ρ c = ρ c l , and this result can be categorized into (3) in this Appendix.
If g t e < g t r , the formulation of R ¯ s e ( ρ c ) is given in (A2) with 0 ρ c ρ T < ρ c l , and the optimal transmit SNR of the confidential message is similar to that in (3).

Appendix B. Proof of the Concavity of (A2)

The following proof is to show the concavity of (A2). We first obtain the derivative of (A2) w.r.t. ρ c as:
d R ¯ s e ( ρ c ) d ρ c = 1 ln 2 g t r 1 + ρ c g t r α ¯ g t e ρ T g t e ρ c g t e + 1 α g t e ρ T g t e ρ c g t e + ρ J g j e + 1 .
To know whether (A2) is concave or not w.r.t ρ c , we further obtain its second derivative as:
d 2 R ¯ s e ( ρ c ) d ρ c 2 = 1 ln 2 g t r 2 ( 1 + ρ c g t r ) 2 + α ¯ g t e 2 ( ρ T g t e ρ c g t e + 1 ) 2 + α g t e 2 ( ρ T g t e ρ c g t e + ρ J g j e + 1 ) 2 .
Based on the expression of d 2 R ¯ s e ( ρ c ) d ρ c 2 above, the second derivative is negative, and thus, (A2) is concave w.r.t. ρ c [25].

Appendix C. Proof of Corollary 1

When ρ J + , we only need to consider Case (3), Case (4), and the case when g t e < g t r in Appendix A. If g t e g t r , (3) is recast as follows:
(1) If 0 ρ c ρ c l ρ T ρ c u ,
R ¯ s e ( ρ c ) = log 2 ( 1 + ρ c g t r ) α ¯ log 2 1 + ρ c g t e ( ρ T ρ c ) g t e + 1 ,
which is concave w.r.t. ρ c . Resorting to d R ¯ s e ( ρ c ) d ρ c = 0 , we have ρ c o = ρ T g t r g t e + g t r g t e + α g t e ( 2 α ) g t r g t e . Based on whether ρ c o lies in [ 0 , ρ c l ] , different situations are given as:
  • If 0 α < g t e g t r ρ T g t r g t e g t e + , ρ c o < 0 , the optimal transmit SNR of the confidential message is ρ c = 0 due to the concavity of (A5);
  • If g t e g t r ρ T g t r g t e g t e + α < ρ T g t r g t e + g t r g t e ρ T g t r g t e + g t r + , ρ c o [ 0 , ρ c l ) , the optimal transmit SNR of the confidential message that maximizes (A5) is ρ c = ρ T g t r g t e + g t r g t e + α g t e ( 2 α ) g t r g t e ;
  • If ρ T g t r g t e + g t r g t e ρ T g t r g t e + g t r + α < ρ T g t r g t e + g t e g t r ρ T g t r g t e + g t e + , ρ c o [ ρ c l , ρ T ] , the optimal transmit SNR of the confidential message is ρ c = ρ c l due to the concavity of (A5).
(2) If ρ c l ρ c ρ T ρ c u , where the boundary point ρ c l can be included in this interval without affecting the optimal transmit SNR of confidential message ρ c , R ¯ s e ( ρ c ) = α log 2 ( 1 + ρ c g t r ) , and the optimal transmit SNR of the confidential message is ρ c = ρ T .
If g t e < g t r , the formulation of R ¯ s e ( ρ c ) is the same as (A5) with 0 ρ c ρ T . Due to its concavity w.r.t. ρ c , we can get ρ c o = ρ T g t r g t e + g t r g t e + α g t e ( 2 α ) g t r g t e resorting to d R ¯ s e ( ρ c ) d ρ c = 0 . Based on whether ρ c o lies in [ 0 , ρ T ] , the following different situations are given as:
  • If 0 α < ρ T g t r g t e + g t e g t r ρ T g t r g t e + g t e + , ρ c o [ 0 , ρ T ] , the optimal transmit SNR of the confidential message is ρ c = ρ T g t r g t e + g t r g t e + α g t e ( 2 α ) g t r g t e ;
  • If ρ T g t r g t e + g t e g t r ρ T g t r g t e + g t e + α 1 , ρ c o > ρ T , the optimal transmit SNR of the confidential message is ρ c = ρ T due to the concavity of (A5).

References

  1. Zhang, M.; Chen, X.; Zhang, J. Social-aware relay selection for cooperative networking: An optimal stopping approach. In Proceedings of the 2014 IEEE International Conference on Communications (ICC), Sydney, Australia, 10–14 June 2014; pp. 2257–2262. [Google Scholar]
  2. Mao, H.; Feng, W.; Zhao, Y.; Ge, N. Joint social-position relationship based cooperation among mobile terminals. IEEE Commun. Lett. 2014, 18, 2165–2168. [Google Scholar] [CrossRef]
  3. Ryu, J.Y.; Lee, J.; Quek, T.Q. Trust degree based beamforming for MISO cooperative communication system. IEEE Commun. Lett. 2015, 19, 1957–1960. [Google Scholar] [CrossRef]
  4. Ryu, J.Y.; Lee, J.H. Trust Degree-Based MISO Cooperative Communications with Two Relay Nodes. Wirel. Commun. Mob. Comput. 2019. [Google Scholar] [CrossRef]
  5. Zhao, M.; Ryu, J.Y.; Lee, J.; Quek, T.Q.; Feng, S. Exploiting trust degree for multiple-antenna user cooperation. IEEE Trans. Wirel. Commun. 2017, 16, 4908–4923. [Google Scholar] [CrossRef]
  6. Sun, Y.L.; Han, Z.; Yu, W.; Liu, K.R. A Trust Evaluation Framework in Distributed Networks: Vulnerability Analysis and Defense Against Attacks. In Proceedings of the 25th IEEE International Conference on Computer Communications (INFOCOM 2006), Barcelona, Spain, 23–29 April 2006; pp. 1–13. [Google Scholar]
  7. Zhao, M.; Wang, X.; Feng, S. Joint Power Splitting and Secure Beamforming Design in the Multiple Non-Regenerative Wireless-Powered Relay Networks. IEEE Commun. Lett. 2015, 19, 1540–1543. [Google Scholar] [CrossRef] [Green Version]
  8. Mavoungou, S.; Kaddoum, G.; Taha, M.; Matar, G. Survey on threats and attacks on mobile networks. IEEE Access 2016, 4, 4543–4572. [Google Scholar] [CrossRef]
  9. Jameel, F.; Wyne, S.; Kaddoum, G.; Duong, T.Q. A comprehensive survey on cooperative relaying and jamming strategies for physical layer security. IEEE Commun. Surv. Tutor. 2018. [Google Scholar] [CrossRef]
  10. Vuppala, S.; Tolossa, Y.J.; Kaddoum, G.; Abreu, G. On the physical layer security analysis of hybrid millimeter wave networks. IEEE Trans. Commun. 2017, 66, 1139–1152. [Google Scholar] [CrossRef]
  11. Atallah, M.; Kaddoum, G. Secrecy Analysis in Wireless Network with Passive Eavesdroppers by Using Partial Cooperation. IEEE Trans. Veh. Technol. 2019. [Google Scholar] [CrossRef]
  12. Ryu, J.Y.; Lee, J.; Quek, T.Q. Confidential Cooperative Communication with Trust Degree of Potential Eavesdroppers. IEEE Trans. Wirel. Commun. 2016, 15, 3823–3836. [Google Scholar] [CrossRef]
  13. Tang, L.; Chen, H.; Li, Q. Social tie based cooperative jamming for physical layer security. IEEE Commun. Lett. 2015, 19, 1790–1793. [Google Scholar] [CrossRef]
  14. Wang, H.M.; Xu, Y.; Huang, K.W.; Han, Z.; Tsiftsis, T.A. Cooperative secure transmission by exploiting social ties in random networks. IEEE Trans. Commun. 2018, 66, 3610–3622. [Google Scholar] [CrossRef]
  15. Wang, L.; Wu, H.; Stüber, G.L. Cooperative jamming-aided secrecy enhancement in P2P communications with social interaction constraints. IEEE Trans. Veh. Technol. 2017, 66, 1144–1158. [Google Scholar] [CrossRef]
  16. Gong, X.; Chen, X.; Zhang, J. Social group utility maximization game with applications in mobile social networks. In Proceedings of the 2013 51st Annual Allerton Conference on Communication, Control, and Computing (Allerton), Monticello, IL, USA, 2–4 October 2013; pp. 1496–1500. [Google Scholar]
  17. Gong, X.; Chen, X.; Zhang, J. Social group utility maximization in mobile networks: From altruistic to malicious behavior. In Proceedings of the 2014 48th Annual Conference on Information Sciences and Systems (CISS), Princeton, NJ, USA, 19–21 March 2014; pp. 1–6. [Google Scholar]
  18. Chen, X.; Proulx, B.; Gong, X.; Zhang, J. Exploiting social ties for cooperative D2D communications: A mobile social networking case. IEEE Trans. Wirel. Commun. 2015, 23, 1471–1484. [Google Scholar] [CrossRef]
  19. Coon, J.P. Modelling trust in random wireless networks. In Proceedings of the 2014 11th International Symposium on Wireless Communications Systems (ISWCS), Barcelona, Spain, 26–29 August 2014; pp. 976–981. [Google Scholar]
  20. Li, J.; Li, R.; Kato, J. Future trust management framework for mobile ad hoc networks. IEEE Commun. Mag. 2008, 46, 108–114. [Google Scholar]
  21. Theodorakopoulos, G.; Baras, J.S. On trust models and trust evaluation metrics for ad hoc networks. IEEE J. Sel. Areas Commun. 2006, 24, 318–328. [Google Scholar] [CrossRef] [Green Version]
  22. Zouridaki, C.; Mark, B.L.; Hejmo, M.; Thomans, R.K. A quantitative trust establishment framework for reliable data packet delivery in MANETs. In Proceedings of the Milcom 2010 Military Communications Conference, San Jose, CA, USA, 31 October–3 November 2005; pp. 1–10. [Google Scholar]
  23. Changiz, R.; Halabian, H.; Yu, F.R.; Lambadaris, I.; Tang, H.; Mason, P.C. Trust establishment in cooperative wireless networks. In Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, Lexandria, VA, USA, 7 November 2005; pp. 1074–1079. [Google Scholar]
  24. Jorgensen, M.L.; Yanakiev, B.R.; Kirkelund, G.E.; Popovski, P.; Yomo, H.; Larsen, T. Shout to secure: Physical-layer wireless security with known interference. In Proceedings of the IEEE GLOBECOM 2007—IEEE Global Telecommunications Conference, Washington, DC, USA, 26–30 November 2007; pp. 33–38. [Google Scholar]
  25. Boyd, S.; Vandenberghe, L. Convex Optimization; Cambridge University Press: Cambridge, UK, 2004. [Google Scholar]
Figure 1. System model. Tu, transmit user; Ru, receive user; E, Eavesdropper.
Figure 1. System model. Tu, transmit user; Ru, receive user; E, Eavesdropper.
Entropy 21 00595 g001
Figure 2. The expected secrecy rate versus trust degree α , where ρ T = ρ J = 30 dB.
Figure 2. The expected secrecy rate versus trust degree α , where ρ T = ρ J = 30 dB.
Entropy 21 00595 g002
Figure 3. The expected secrecy rate versus the transmit SNR of jamming signal ρ J , where ρ T = 30 dB.
Figure 3. The expected secrecy rate versus the transmit SNR of jamming signal ρ J , where ρ T = 30 dB.
Entropy 21 00595 g003

Share and Cite

MDPI and ACS Style

Zhao, M.; Liu, D.; Gao, H.; Feng, W. Confidential Cooperative Communication with the Trust Degree of Jammer. Entropy 2019, 21, 595. https://doi.org/10.3390/e21060595

AMA Style

Zhao M, Liu D, Gao H, Feng W. Confidential Cooperative Communication with the Trust Degree of Jammer. Entropy. 2019; 21(6):595. https://doi.org/10.3390/e21060595

Chicago/Turabian Style

Zhao, Mingxiong, Di Liu, Hui Gao, and Wei Feng. 2019. "Confidential Cooperative Communication with the Trust Degree of Jammer" Entropy 21, no. 6: 595. https://doi.org/10.3390/e21060595

APA Style

Zhao, M., Liu, D., Gao, H., & Feng, W. (2019). Confidential Cooperative Communication with the Trust Degree of Jammer. Entropy, 21(6), 595. https://doi.org/10.3390/e21060595

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop