Loading...

A genetic approach in relay-jammer selection and power allocation for physical layer security

Okati, N ; Sharif University of Technology | 2017

457 Viewed
  1. Type of Document: Article
  2. DOI: 10.1109/ISTEL.2016.7881844
  3. Publisher: Institute of Electrical and Electronics Engineers Inc , 2017
  4. Abstract:
  5. Node cooperation approaches improve physical layer security in wireless networks without applying data encryption. Selecting the appropriate nodes to cooperate as relays or friendly jammers, to degrade eavesdropper's link, is a challenging problem which has attracted a lot of attention in recent years. Various approaches, based on conventional exhaustive search, have been suggested for optimal relay-jammer selection and power allocation in the literature. The complexity of these methods is proportional to the number of intermediate nodes. As the number of intermediate nodes exceeds a specific bound, conventional exhaustive search appears infeasible due to high computational complexity. In this paper, we propose a novel approach based on genetic algorithm (GA), for relay-jammer selection, power allocation and computational complexity reduction. Our system model consists of a source-destination pair, one eavesdropper and a number of intermediate nodes which cooperate as relays or friendly jammers. Considering the achievable secrecy rate as the cost function for GA optimization, the proposed algorithm is performed in two steps. First, we determine the desired channel gains that maximize the secrecy rate using GA. In the second step, nodes for which the corresponding channel gains have the smallest deviation from the obtained values in the first step, will be chosen as relays or jammers. We compare the proposed method with two kinds of conventional exhaustive search techniques one with fixed and the other with adaptive power allocated to jammers. Simulation results show that the proposed method reduces computational complexity while attaining a secrecy rate close to conventional techniques. Also the power which is allocated to jammers during each phase of transmission will be declined using GA optimization. Despite of conventional exhaustive search, the complexity of the proposed algorithm is almost the same as the number of cooperative nodes increases. So, the proposed method will outperform the previous works in terms of simplicity, efficiency and security. © 2016 IEEE
  6. Keywords:
  7. Genetic algorithm ; Secrecy rate ; Complex networks ; Computational complexity ; Cost functions ; Cryptography ; Genetic algorithms ; Network layers ; Network security ; Optimization ; Achievable secrecy rates ; Computational complexity reductions ; Conventional techniques ; Cooperation ; Intermediate node ; Physical layer security ; Relay-jammer selection ; Source-destination pairs ; Jamming
  8. Source: 8th International Symposium on Telecommunications, IST 2016, 27 September 2016 through 29 September 2016 ; 2017 , Pages 374-379 ; 9781509034345 (ISBN)
  9. URL: https://ieeexplore.ieee.org/document/7881844