Physical Layer Security with the Aid of Compressive Sensing in the Presence of Non-Ideal Relays by Removing the Effect of Hardware Impairments by Providing an Iterative Method

Document Type : Original Article

Authors

1 Master's، Qom University of Technology, Qom, Iran.

2 Associate Professor, Department of Telecommunications and Electronics, Qom University of Technology, Qom, Iran.

Abstract

In wireless communications, the channel is available to everyone and therefore, any receiver in the telecommunication coverage area can receive the transmitted signal. In such cases, unauthorized users may use this feature to eavesdrop the information, disrupt data transmission, reduce network performance, and so on. Recently, using compressive sensing in physical layer security has attracted the attention of many researchers. Compressive sensing is very useful when the signals are sparse or compressible such as in image signal processing or image recognition. This is because it can be considered as an encryption system, sampling, compression and encryption, while maintaining a secret matrix. In this paper, we examine the physical layer security in a cooperative wireless communication based on several consecutive relays. In such a model system, the equivalent channel matrix is used as the secure measurement matrix. Since the majority of research work in this field consider relay hardware to be ideal and free of hardware impairments, in this research work, this practical assumption is made in the physical layer security with the help of compressive sensing. We consider a cooperative communication with multiple-hops. Finally, we will propose a solution to improve the secrecy performance of such a system. Simulation results show that in worst case, the screcy rate increases at least 10 percent and this would be increased to 120 percent in the best case. Moreover, computational complexity in terms of simulation run time is increased by 22 percent.

Keywords


Smiley face

https://creativecommons.org/licenses/by/4.0/

   [1]               M. Ragheb, S. M. S. Hemami, A. Kuhestani, D. W. K. Ng and L. Hanzo, “On the Physical Layer Security of Untrusted Millimeter Wave Relaying Networks: A Stochastic Geometry Approach,” IEEE Trans. Inf. Foren. Sec., vol. 17, pp. 53-68, 2022.
   [2]      M. Tarihi, “A survey on the physical layer security in wirless communication networks”, 4th conference on applicable research on computer engineering and signal processing, Nov. 2016 (in Persian). 
   [3]      C. E. Shannon, “Communication theory of secrecy systems,” Bell Syst. Tech. J., vol. 28, p. 656–715, 1949.  
   [4]      A. D. Wyner, “The wire-tap channel,” Bell Syst. Tech. J, vol. 54, no. 8, pp. 1355-1387, 1975.
   [5]      Y. Oohama, “Coding for Relay Channels with Confidential Messages,” Proceedings 2001 IEEE Information Theory Workshop, 2001.
   [6]      M. Tatar Mamaghani, A. Kuhestani, and H. Behroozi, “Can a multi-hop link relying on untrusted AF relays render security,” Wireless Net., Jan. 2021.
   [7]      M. Letafati, A. Kuhestani and H. Behroozi, “Three-Hop Untrusted Relay Networks with Hardware Imperfections and Channel Estimation Errors for Internet of Things,” IEEE Trans. Inf. Foren. Sec., Mar. 2020.
   [8]      R. G.Braunik, “Compressive Sensing,” IEEE Sigal Process. Mag., 2007.
   [9]      Y. Zhang, Y. Xiang, L. Y. Zhang, “Secure Wireless Communications Based on Compressive Sensing: A Survey”, IEEE Commun. Surv. Tut., vol. 21, pp. 1093-1111, 2019.
[10]      G. Han, X. Fu, Q. Lyu, “Compressed Sensing for Physical Layer Security in Single Relay Cooperative System”, 2019 IEEE International Conference on Signal, Information and Data Processing (ICSIDP);2019.
[11]      L. Qing, H. Guangyao and F. Xiaomei, “Physical Layer Security in Multi-Hop AF Relay Network Based on Compressed Sensing,” IEEE Commun. Lett., vol. 22, no. 9, pp. 1882-1885, Sept. 2018.
[12]      S. Chang, J. Li, X. Fu, and L. Zhang, “Energy harvesting for physical layer security in cooperative networks based on compressed sensing”, Entropy, vol. 19, no. 9, p. 462, 2017.
[13]      R. Dautov and G. R. Tsouri, “Establishing secure measurement matrix for compressed sensing using wireless physical layer security,” in Int. Conf. Comput. Network. Commun. (ICNC), pp. 354–358, 2013.
[14]      E. Bjornson, M. Matthaiou and M. Debbah, “A New Look at Dual-Hop Relaying: Performance Limits with Hardware Impairments,” IEEE Trans. Commun., vol. 61, no. 11, pp. 4512-4525, Nov. 2013.
[15]      V. Shahiri, A. Kuhestani and L. Hanzo, “Short-packet AF relaying for the IoT in the face of imperfect channel estimation and hardware impairments,” IEEE Trans. Green Commun. Net., vol. 6, no. 1, pp. 20-36, Mar. 2022.
[16]      A. Kuhestani, A. Mohammadi and P. L. Yeoh, “Security-reliability trade-off in cyber-physical cooperative systems with non-ideal untrusted relaying,” in Proc. IEEE 4th World Forum on Internet of Things (WF-IoT), 2018, pp. 552-557.
[17]      M. Fatehi, S. A. Mohajeran, J. Jahanshiri, “Investigation and simulation of hardware impairment on physical layer security in IoT Networks in presence of arbitrary number of eavesdroppers,” Electronic and cyber defense Journal, vol. 3, no. 10, 2023 (in Persian). 
[18]      A. Khalili Tirandaz, A. Kuhestani, “Security Evaluation of the Mutual Random Phase Injection Scheme for Secret Key Generation over Static Point-to-Point Communications,” Electronic and cyber defense Journal, vol. 10, no. 2, 2022 (in Persian).
[19]      M. Bloch, J. Barros, M. R. D. Rodrigues and S. W. McLaughlin, “Wireless information-theoretic security,” IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515-2534, June 2008.
[20]      L. Sun and Q. Du, “A review of physical layer security techniques for Internet of Things: Challenges and solutions,” Entropy, vol. 20, no. 10, p. 730, 2018
 
  • Receive Date: 07 August 2022
  • Revise Date: 08 November 2023
  • Accept Date: 16 December 2023
  • Publish Date: 18 January 2024