a hybrid scheme for secure two-way cooperative networks
DESCRIPTION
In wireless networks security is a concern aseavesdroppers can access information illegally.Intentional interference to eavesdroppers can degradethe effect of eavesdropper on wireless network. When anode can act as relay node and jammer node, theproblem of eavesdropping can be handled effectively.Recently Chen et al. proposed schemes which forsecuring two-way relay networks. In this scheme someintermediary nodes are chosen to ensure security. Thiskind of node can perform two duties. They are relayinginformation for effective communication and alsoenhancing security of the network by acting as jammerto degrade the impact of the eavesdropper. In this paperwe implemented that scheme practically in Microsoft.NET platform. We built a prototype application todemonstrate the proof of concept. The experimentsmade using our custom simulator reveal that thejamming model outperforms the traditional nonjammingschemes.TRANSCRIPT
International Journal of Computer Trends and Technology (IJCTT) – volume 4 Issue10 – Oct 2013
ISSN: 2231-2803 http://www.ijcttjournal.org Page3521
A Hybrid Scheme For Secure Two-Way
Cooperative Networks First Author Second Author
MS Suresh Reddy Student, Department of Computer Science and Engineering, Marri Laxman Reddy Institute of Technology, Dundigal, Hyderabad, Andhra Pradesh, India.
P Dayaker Assistant Professor, Department of Computer Science and Engineering, Marri Laxman Reddy Institute of Technology, Dundigal, Hyderabad, Andhra Pradesh, India.
Abstract -In wireless networks security is a concern as
eavesdroppers can access information illegally.
Intentional interference to eavesdroppers can degrade
the effect of eavesdropper on wireless network. When a
node can act as relay node and jammer node, the
problem of eavesdropping can be handled effectively.
Recently Chen et al. proposed schemes which for
securing two-way relay networks. In this scheme some
intermediary nodes are chosen to ensure security. This
kind of node can perform two duties. They are relaying
information for effective communication and also
enhancing security of the network by acting as jammer
to degrade the impact of the eavesdropper. In this paper
we implemented that scheme practically in Microsoft
.NET platform. We built a prototype application to
demonstrate the proof of concept. The experiments
made using our custom simulator reveal that the
jamming model outperforms the traditional non-
jamming schemes.
Keywords - Jamming, relation section techniques, two-
way relay networks
1. INTRODUCTION Wireless networks are vulnerable to attacks. Traditionally
cryptographic methods are used at higher layers to protect
networks. The fundamental security issues in wireless
networks were focused by Wyner [1] which focused on
building secure communications without the need for
private keys. Security at physical layer has been given
importance in research of late. Later on in [2], [3], [4], [1]
the security mechanisms proposed by Wyner were
extended in order to send messages over wireless media
confidentially. Many cooperative jamming schemes were
explored in [5], [6], and [7] in order to enhance security of
wireless networks. For peer to peer networks and cellular
networks recently two-way relay channels are used [8], [9],
and [10]. It is found that the performance of a network can
be improved by using jammer and relay selection,
especially in cooperative networks. The relay selection
scheme was also explored in [11] with multiple relays. The
results revealed that it exhibited increase in worse receive
signal – to – noise ratio. One way cooperative networks
were explored in [12] with many relay selection techniques.
Though there were many security mechanisms based on
physical layer, there is less research on the two-way
cooperative relay networks.
This paper implements a scheme that protects network from
eavesdropper in a two-way cooperative networks that
contain many intermediate nodes for forwarding data, one
eavesdropper and two sources. Some intermediate nodes
International Journal of Computer Trends and Technology (IJCTT) – volume 4 Issue10 – Oct 2013
ISSN: 2231-2803 http://www.ijcttjournal.org Page3522
act as jamming nodes that generate interference to the links
used by eavesdropper so as to protect network from them.
In order to ensure security to data many selection
algorithms are proposed. We also built a prototype
application that simulates the proof of concept. The
simulations revealed that the proposed scheme improve the
security of the network. The remainder of the paper is
organized as follows. Section II presents the problem
statement and various selection techniques proposed.
Section III presents experimental results while section IV
concludes the paper.
2. SYSTEM MODEL AND SELECTION
TECHNIQUES For demonstrating two-way relay networks and joint relay
and jammer selection process, we consider very simple
network with two source nodes named S1 and S2, a single
eavesdropper denoted as E, and multiple intermediary
nodes. The intermediate nodes are meant for transmission
of data. They strengthen signals and forward packets to
destination. Intermediate node can also be used as a
jammer. When it is used as jammer, it produces artificial
interference to the links used by eavesdropper in order to
protect network from him. The sample network and two
phases of communication are visualized in figure 1.
Fig. 1 – Sample two-way cooperative network
As seen in figure 1, the first phase is known as broadcasting
phase. In this phase, two source nodes send their data to
intermediate nodes. One of the intermediate nodes is
selected as jammer. For instance in figure 1, J1 is chosen as
jammer which sends interference signals to eavesdropper
continuously so as to degrade its effect on the network.
However, other nodes do not know the presence of jammer.
For this reason the interference also causes the source-relay
nodes links to degrade in performance. In phase 2, node R
is chosen as relay node while another intermediate node J2
is chosen as jammer node. However, the source nodes are
not able to reduce the interference from the jammer. A
channel fading environment is assumed in the two phases.
3. SELECTION TECHNIQUES WITHOUT
JAMMING Relay selection techniques without jamming are also
explored in the experiments. The techniques include
Conventional Selection (CS), and Optimal Selection (OS).
Eavesdropper channels are not considered in conventional
selection technique. The conventional selection is done as
follows.
The optimal selection, on the other hand, considers relay-
eavesdropper links in the relay mechanism with specific
knowledge. Optimal selection is done as follows.
International Journal of Computer Trends and Technology (IJCTT) – volume 4 Issue10 – Oct 2013
ISSN: 2231-2803 http://www.ijcttjournal.org Page3523
4. SELECTION TECHNIQUES WITH
JAMMING Many relay selection techniques are discussed in this
section. They are optimal selection with jamming (OSJ),
optimal switching (OW), and suboptimal selection with
jamming (SSJ). The first technique ensures the
maximization of secrecy rate nodes S1 and S2.
Optimal Switching technique is used to improve the
performance of network in terms of security. The jamming
idea is to introduce internal interferences to eavesdropper
so as to reduce their effect. However, the source and relay
nodes also have the impact of the interference. To
overcome this problem the switching between two models
known as OS and OSJ are used. The jammer threshold is
computed as follows.
Suboptimal Selection with Jamming technique is
developed keeping optimal selection metrics in mind.
When the knowledge about the links is not available
SINRs are computed as follows.
5. EXPERIMENTAL RESULTS Experiments are made with relay selection techniques with
and without jamming. The techniques used for experiments
include OS (Optimal Selection), CS (Conventional
Selection), SSJ (Suoptimal Slection with Jamming), OSJ
(Optimal Selection with Jamming), and OW (Optimal
Switching).
Fig. 1 - Ergodic secrecy rate vs. transmitted power
As can be seen in figure 1, the horizontal axis represents
transmitted power (Ps) while the veridical axis represents
ergodic secrecy rate. The results reveal that SSJ and OSJ
provide almost same performance while the best
performance is given by OW technique. More details about
the techniques can be found in [13].
0
1
2
3
4
5
6
1 2 3 4 5 6 7
Ergodic
Secrecy
Rate
Ps (dB)
OW
OSJ
SSJ
OS
CS
OSJ
OS
International Journal of Computer Trends and Technology (IJCTT) – volume 4 Issue10 – Oct 2013
ISSN: 2231-2803 http://www.ijcttjournal.org Page3524
Fig. 2 - Secrecy outage probability vs. transmitted power
As can be seen in figure 2, the horizontal axis represents
transmitted power (Ps) while the veridical axis represents
secrecy outage probability. The results reveal that the
selection schemes with jamming outperform the selection
schemes without jamming.
Fig. 4 – Ergodic secrecy rate vs. transmitted power (relays
are close to S1)
As can be seen in figure 4, the horizontal axis represents
transmitted power (Ps) while the veridical axis represents
ergodic secrecy rate. The results reveal that the OSJ and
SSJ are inefficient while the OW outperforms other
techniques.
CONCLUSIONS
In this paper we studied two way cooperative networks and
the relay selection issues with security constraints. The
network supports opportunistic selection of a relay node for
data transmission and two jamming nodes that can protect
network from eavesdroppers. The relay node enhances
communication between two nodes in the network. The
jamming nodes on the other hand are responsible to jam
traffic coming from eavesdroppers. The eavesdroppers thus
could not successfully perform their malicious activities as
the intentional interference from jamming nodes does not
allow them to do so. We built a prototype application to
demonstrate the proof of concept and found that the
jamming is an effective solution to protect networks from
eavesdroppers. The prototype works in two modes such as
jamming mode and non-jamming mode thus making use of
advantages of both modes. The experiments revealed that
highest secrecy rate is possible with the proposed system.
REFERENCES
[1] A. D. Wyner, “The wire-tap channel,” Bell System Technical
Journal, vol. 54, no. 8, pp. 1355–1387, Oct. 1975.
[2] P. Parada and R. Blahut, “Secrecy capacity of SIMO and slow
fading channels,” in Proceedings of IEEE International
Symposium on Information Theory, Adelaide, Australia, Sep. 2005.
0
10
20
30
40
50
60
0 10 20 30
Secr
ecy
Out
age
Pro
babi
lity
Ps[db]
CS
SS
OS
SS-MSIMR
OS-MMISR
SS-MMISR
OSW
00.5
11.5
22.5
33.5
44.5
1 2 3 4 5 6 7
Ergo
dic S
ecre
cy R
ate[
BPCU
]
Ps[db]
OW
OS
CS
OSJ
SSJ
International Journal of Computer Trends and Technology (IJCTT) – volume 4 Issue10 – Oct 2013
ISSN: 2231-2803 http://www.ijcttjournal.org Page3525
[3] I. Csisz´ar and J. K¨orner, “Broadcast channels with
confidential messages,” IEEE Transactions on Information Theory,
vol. 24, no. 3, pp. 339–348,
May 1978.
[4] S. K. Leung-Yan-Cheong and M. E. Hellman, “The Gaussian
wiretap Channel,” IEEE Transactions on Information Theory, vol.
24, no. 4, pp. 451–456, Jul. 1978.
[5] Jingge Zhu, Jianhua Mo, and Meixia Tao, “Cooperative secret
communication with artificial noise in symmetric interference
channel,” IEEE Communications Letters, vol. 14, no. 10, pp. 885–
887, Oct. 2010.
[6] L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, “Improving
wireless physical layer security via cooperating relays,” IEEE
Transactions on Signal Processing, vol. 58, no. 3, pp. 1875–1888,
Mar. 2010.
[7] L. Lai and H. E. Gamal, “The relay-eavesdropper channel:
Cooperation for secrecy,” IEEE Transactions on Information
Theory, vol. 54, no. 9, pp. 4005–4019, Sep. 2008.
[8] Lingyang Song, Yonghui Li, Anpeng Huang, Bingli Jiao, and
A. V. Vasilakos, “Differential modulation for bidirectional
relaying with analog network coding,” IEEE Transactions on
Signal Processing, vol. 58, no. 7, pp. 3933–3938, Jul. 2010.
[9] B. Rankov and A. Wittneben, “Spectral efficient protocols for
half-duplex fading relay channels,” IEEE Journal on Selected
Areas in Communications, vol. 25, no. 2, pp. 379–389, Feb. 2007.
[10] B. Rankov and A. Wittneben, “Achievable rate regions for the
twoway relay channel,” in Proceedings of IEEE International
Symposium on Information Theory, Seattle, USA, Jul. 2006.
[11] Yindi Jing,“A relay selection scheme for two-way amplify-
and-forward relay networks,” in Proceedings of International
Conference on Wireless Communications & Signal Processing,
Nov. 2009.
[12] I. Krikidis, J. Thompson, and S. Mclaughlin,“Relay selection
for secure cooperative networks with jamming,” IEEE
Transactions on Wireless Communications, vol. 8, no. 10, pp.
5003–5011, Oct. 2009.
[13] Jingchao Chen, Rongqing Zhang, Lingyang Song, Zhu Han,
Bingli Jiao, “Joint Relay and Jammer Selection for Secure Two-
Way Relay Networks”, IEEE, p1-5.
About the authors
1. MS Suresh Reddy
Student, Department of Computer Science and Engineering, Marri Laxman Reddy Institute of Technology, Dundigal, Hyderabad, Andhra Pradesh, India
2. P Dayaker received his M.Tech (Software Engineering) in 2010 from JNTU, Hyderabad, India, Now he is working as Assistant Professor in Dept.of CSE in MLR Institute of Technology, Hyderabad, A.P., India. He has more than 4 years experience in academics. He published a paper in International Journal on Network Protocols