We investigate the physical-layer security of a wireless sensor network comprised of a source-destination pair, multiple decode-and-forward (DF) relays, and an eavesdropper. When the relays forward the source signal to the destination, they should dissipate certain power for driving their physical circuits (e.g., amplifiers and filters), in addition to the transmit power required for emitting radio signals. However, no existing work considers the circuit power when exploiting relays for enhancing the wireless security against eavesdropping. We thus propose the relay-selection based cooperative beamforming framework, where partial relays are selected to forward the source signal in a beamforming manner. We present two relay-selection strategies, namely, the exponential-complexity exhaustive search and linear-complexity relay ordering. For comparison purposes, we also evaluate the conventional all-relay based and best-relay based beamforming schemes, where all relays or only the best one is selected to assist the source-destination transmission. It is shown that the proposed beamforming schemes significantly outperform the conventional all-relay and best-relay based beamforming schemes in terms of secrecy capacity. Additionally, the relay-ordering based beamforming scheme almost achieves the same secrecy capacity as the exhaustive-search method, but with a reduced computational complexity.
1. Introduction
Wireless sensor networks (WSNs) provide efficient data acquisition and processing solutions for various applications such as factory automation, environment monitoring, and battlefield reconnaissance. Cooperative communication is a popular technique in WSNs to improve system reliability and throughput as sensor nodes are usually equipped with single antenna and the destination node might be out of the coverage of the source node. However, the broadcast nature of wireless medium brings not only the feasibility of sensor cooperation, but also the vulnerability to wiretapping. Although cryptographic techniques are widely used in modern communication systems, information leakage is still likely to happen if brute-force attack occurs. Hence, it is necessary to further enhance the overall system confidentiality through physical-layer security (PLS) schemes.
Wyner pioneered the study of PLS by proving that it is possible to communicate safely without a secret key in a degraded broadcast channel [1]. His results were extended to nondegraded channels [2] and Gaussian wiretap channels [3] in 1978 and were further extended to general fading wiretap channels in 2008 [4]. PLS has exerted a tremendous interest on a growing number of researchers ever since. Recently, a lot of attention has been drawn to the improvement of secrecy capacity (which is defined in [3] as the difference between the capacity of the legitimate link and that of the wiretapping link) by incorporating relays [5–9] and performing beamforming [7–12].
Beamforming technique is widely used in relay systems [13–15] as an effective way to improve the received signal-to-noise ratio (SNR) at the destination. The core idea of applying beamforming in traditional relay systems without security concerns is to exploit the magnitudes and phases of the relay-to-destination channels and accordingly adjust the transmit powers and phases of the signals that are to be transmitted from several relays bearing a common message, so as to combine the signals at the destination constructively [14]. However, for relay systems with security concerns, the beamforming technique needs to exploit the channel information of both the destination and the eavesdropper. And the objective is no longer the received SNR at the destination but the secrecy capacity.
Among the aforementioned works in the area of beamforming for PLS purposes, [7] studied beamforming schemes for decode-and-forward (DF), amplify-and-forward (AF), and cooperative jamming where all available relays were adopted, either to retransmit the source signal or to send an artificial noise to confound the eavesdropper. Null-space beamforming was proposed in [8] to hide the information signal in the null-space of the relay-eavesdropper channel. These beamforming schemes were designed with perfect channel information of the wiretapping link while in [9, 11, 12, 16, 17], the authors proposed their schemes based on imperfect channel information or even no channel information of the wiretapping link. Although the assumption of imperfect channel information or even no channel information of the wiretapping link is more practical, the models in these papers do not accord with WSNs since sensors are usually equipped with single antenna. Besides, relay-selection (RS) strategies have also been studied in [5, 6] where the single best relay that can provide the maximal secrecy capacity or minimal secrecy outage probability is selected. Although the best-relay-selection strategy is easy to deploy, it sacrifices some security performance. It will be pointed out that although the models and assumptions of the relay/multiantenna systems are different, a common conclusion that system security improves with the increase of relay/antenna number and relay/antenna transmit power can be drawn.
The above existing studies that exploit relays to enhance system security are designed with only consideration of transmit power. No attention was paid to circuit power consumption (CPC) which is indispensable for relays to drive the circuit blocks. As a matter of fact, in a WSN, the dense distribution of sensors allows them to transmit with a low power that might be comparable to or even overwhelmed by the circuit power, which makes the negligence of CPC improper. Furthermore, the sensor nodes are usually powered by batteries which provide energy for both signal transmission and processing. Hence, the traditional power constraints need to be modified in a WSN. The consequence of incorporating CPC is that the increase of relay number means the decrease of relay transmit power; thus, it is unclear whether system security still can be improved if more relays are adopted. In fact, [18–20] have revealed that, in multiantenna/cooperative systems without eavesdroppers, using more antennas/relays might degrade the system performance if the total power is constrained. However, no existing work considering CPC takes system security as a metric of interest. This motivates us to reveal whether the same result exists in a security-oriented cooperative WSN and how to select the best relays if it does.
The main contribution of our work can be described as follows. We take CPC into account to perform cooperative beamforming, whereas existing literature on the cooperative beamforming aided PLS fails to consider the CPC. Our work shows that when CPC is considered, adopting more relays may degrade the secrecy capacity performance, which, to the best of our knowledge, has not been revealed by any previous work. It is thus important but challenging to determine which relays should be selected to form an optimal beamforming vector. Although the exhaustive-search approach is effective in finding the optimal relays, its computational complexity grows exponentially with the number of relays. To this end, we propose a relay-ordering based beamforming scheme which has only a linear computational complexity but achieves nearly the same security performance as the exhaustive-search aided beamforming scheme does.
The remainder of this paper is organized as follows. Section 2 establishes the system model along with the total power constraint which includes both transmit power and circuit power. Section 3 first updates the conventional all-relay based and best-relay based beamforming schemes by incorporating CPC and then proposes two partial-relay-selection based beamforming schemes. In Section 4, the four schemes described in Section 3 are evaluated in terms of their secrecy capacity performance. Conclusions are drawn in Section 5.
2. System Model
Consider a cooperative WSN consisting of a source-destination pair with K helpers and an eavesdropper as shown in Figure 1. Each node is equipped with single antenna working in half-duplex mode. Only the helpers that can successfully decode the source signal are considered as candidate relays. We define the collection of candidate relays as decoding set. The source-relay, relay-destination, and relay-eavesdropper channels are denoted by , and , respectively. All the channels are independent and the channel between node A and node B follows a distribution, where with λ, , , and representing the wavelength, the distance between A and B, the transmit antenna gain at A, and the receive antenna gain at B, respectively. The additive white Gaussian noises (AWGNs) are assumed to follow a distribution.
A cooperative WSN in the presence of an eavesdropper. The relays in the decoding set are shaded. Solid line: legitimate link; dashed line: eavesdropping link.
Note that many of the previous beamforming designs assumed perfect instantaneous channel state information (CSI) of both the legitimate link and the eavesdropping link. In practical scenarios, however, the eavesdropper is probably passive, so it might be difficult to attain its instantaneous CSI due to the absence of feedback. Hence, following [6, 16, 17], in this paper, we assume that only statistical information of the eavesdropping link is priorly known since it is possible that the location of the eavesdropper is roughly known.
In the first hop, the source transmits , where s is normalized as and is the transmit power of the source node. In the second hop, each selected relay decodes its received signal, reencodes it, and then forwards a scaled version of the reencoded signal; that is, transmits , where represents the conjugate of and is the beamforming weight of , and is the transmit power. Denote the set of selected relays as . Apparently, if , .
The respective received signals at the destination and the eavesdropper can be expressed as
where and are the AWGNs at the legitimate destination and the eavesdropper.
To obtain the total power constraint on relays with CPC included in a generic way, we divide the CPC of each relay into two parts, one of which is independent of the transmit power and the other of which is dependent. For , both parts are 0; for , its CPC can be written as , where includes consumption terms of filters, mixers, and so on and is the consumption of the power amplifier. The terms in vary with different systems and are irrelative with whereas the relationship between and is , where ξ is the peak to average ratio and η is the drain efficiency [18]. The total power constraint on relays is
where is the cardinality. It is worth noticing that is also the number of nonzero elements in w; that is, , where is the 0-norm. Meanwhile, as has been mentioned in the previous section, secrecy capacity of a DF relay system grows with the total transmit power of relays. Hence, the optimal beamforming vector w satisfies
where and . Moreover, needs to satisfy , where is the ceil function, to avoid the impossible case that the whole power is consumed by circuitry.
3. Relay-Selection Based Beamforming Schemes for PLS
A widely used metric of interest in security-oriented systems is secrecy capacity , where and represent the capacity of the legitimate link and that of the eavesdropping link, respectively, and . However, since only statistical information of the eavesdropping link is assumed to be known, following [9, 16], we take the ergodic secrecy capacity over the distribution of the eavesdropper's CSI, that is, , as the objective instead. From (1), it can be easily derived that
where and (5) is derived after applying Jensen's Inequality to (4). Define
then serves as the lower bound of . Hence, the optimization problem can be written as
which can be further recast as
where and .
In order to prove that the optimal RS strategy is to select partial relays as well as for subsequent comparison purpose, we first update the conventional schemes where either all relays or only one best relay is selected, namely, the all-relay based and the best-relay based beamforming schemes; then we present the partial relay based schemes.
3.1. Conventional Beamforming Schemes for PLS
3.1.1. All-Relay Based Beamforming Scheme
Consider that all the candidate relays are selected to assist the source; that is, . The optimal beamforming solution is
where represents the unit-norm eigenvector of matrix X that corresponds to its largest eigenvalue . Substituting into (4), we have
This scheme only works when the power budget for relays is high enough to drive the circuit blocks in all M relays; that is, needs to be satisfied.
3.1.2. Best-Relay Based Beamforming Scheme
Opportunistic relaying is also a common relaying strategy where only one best relay is selected. The best relay, say , is selected as the one that maximizes ; that is,
The beamforming weight is .
Apparently, if , only the best-relay based scheme can be applied. While in the case of , according to the majorization theory [21], the eigenvalues of a positive semidefinite Hermitian matrix majorize the diagonal elements, thus,
Hence, the all-relay based scheme becomes the better choice in this case. As a result, the best choice over the whole power range should be a partial RS based beamforming scheme that adjusts the selected relays and their weight vector according to the channels and the power budget. The next subsection is going to discuss how to select partial relays and design their weight vector.
3.2. Proposed Beamforming Schemes for PLS
The objective in (8) is a Rayleigh quotient [22]; to maximize it the eigenvalue decomposition (EVD) method is usually used. However, the argument in this objective is self-constrained. It is infeasible to directly use the EVD method on this problem. To break the self-constraint, we need to preassume the relays to be selected. For simplicity, we assume and denote the set of selected relays as . By dropping the nonselected relays, the corresponding legitimate channel and the variance matrix of the eavesdropping channel can be written as and , respectively. Hence, the optimization problem becomes
where , , and . The objective achieves its maximal value
by adopting .
The next step is to determine the optimal relays to be selected; that is,
3.2.1. Exhaustive-Search Based Beamforming Scheme
It is obvious that the only way to obtain the optimal value of is to do exhaustive search. Given the maximal possible number of selected relays , the sample space of is (∅ is clearly impossible to be the optimal value of unless no relay can successfully decode the source signal, in which case, the system achieves zero secrecy capacity). The exhaustive-search based beamforming scheme can be described in Algorithm 1.
Algorithm 1 (exhaustive-search based beamforming scheme).
The optimal set of relays is selected according to .
The optimal weight vector for is obtained as .
3.2.2. Relay-Ordering Based Beamforming Scheme
It will be noticed that the computational complexity of the exhaustive-search scheme is exponential in network size. To overcome this disadvantage, we introduce relay ordering into the RS strategy so that the computation will be significantly reduced.
If the received SNRs are high, the optimization problem in (13) is approximate to
which yields
where represents the trace. Consequently, is a feasible relay-ordering criterion. This criterion can be understood by looking into the definition of secrecy capacity. Enlarging secrecy capacity is equivalent to improving the capacity of the legitimate link whilst keeping the capacity of the eavesdropping link as low as possible. A large indicates that the -destination channel is in relatively good condition, while the -eavesdropper distance is relatively large. Thus, adopting such a relay to forward the source signal is probably beneficial. In other words, the relay-ordering based beamforming scheme can be described in Algorithm 2.
Algorithm 2 (relay-ordering based beamforming scheme).
The algorithm is described as follows:
Order the candidate relays as .
Set , where ; for each , calculate according to (14).
The optimal set of relays is selected according to .
The optimal weight vector for is obtained as .
Remarks. (i) Firstly, although the relay-ordering criterion is obtained by assuming high received SNRs, if the interrelay distances are much smaller than the relay-eavesdropper distances (which is widely assumed in relay systems), the relay-ordering based scheme is indeed the optimal scheme. In this case, , the relay-ordering criterion becomes and the maximal achieved by the relay-ordering based scheme is
Meanwhile, achieved by any set of relays with any beamforming weight is
Apparently,
(ii) Secondly, there are only possible combinations of relays in the relay-ordering based beamforming scheme, so the computational complexity is whereas the computational complexity of the exhaustive-search based beamforming scheme is .
4. Simulation Results
This section examines the performance of the proposed schemes. For simplicity, some of the circuit blocks are omitted such as the encoder, decoder, and pulse shaping block. Analog-to-digital converter and digital-to-analog converter are also omitted since their power consumption is relative to the hardware type. The resulting can be written as , where is the consumption of the blocks in the transmitting side and is the consumption of the blocks in the receiving side. The subscripts filt, mix, syn, LNA, filr, and IFA stand for filters at the transmitting side, mixer, frequency synthesizer, low noise amplifier, filters at the receiving side, and intermediate frequency amplifier. Using the parameters in [18], we have mW. Note that the value of can be changed to extend the above schemes to include some other circuit blocks.
The number of helpers is set to 4, so the sample space of is . The probability of is , where is the probability of occurrence of outage over the source- channel [5] and is set to in our simulations. The helper-destination distances are set to 50 m and the helper-eavesdropper distances are set to d, , , and , where d is the reference helper-eavesdropper distance to show the relationship between the number of selected relays and the eavesdropper's location by varying d. The modulation method is 4 QAM (). The carrier frequency is 2.5 GHz and the antenna gains are 0 dB. The noise variance is modeled as , where dBm/Hz is the single-sided spectral density and MHz is the channel bandwidth. Every data point is averaged over 10,000 independent channel realizations.
Figure 2 shows the relationship between the average number of selected relays and the power budget for relays with the eavesdropper in two different locations. Since the curves of the two proposed schemes are close to each other, we provide Table 1 as well, to show the percentage error of the average number of adopted relays in the relay-ordering based scheme as compared with the optimal number obtained in the exhaustive-search based scheme.
Percentage error of the average number of adopted relays.
d (in m)
P (in dBm)
23
25
27
29
31
33
35
37
39
41
43
45
47
49
50
0%
0%
0%
0%
0%
0%
0%
0%
0%
0%
0%
0%
0%
0%
200
0%
0%
23.1%
4.1%
8.9%
6.0%
1.9%
1.6%
0.12%
0.14%
0%
0.07%
0.12%
0.01%
Average number of selected relays versus total power budget.
Notice that a total power budget of 29 dBm is enough to drive all the circuit blocks in all helpers. However, the average optimal number of relays obtained by exhaustive search is only 2.09 when m and 1.66 when m. It can also be seen from both Figure 2 and Table 1 that, in the case of small d, the two schemes show perfect match, while, in the case of large d, the two schemes have a slight difference, but only in medium power range. This difference is attributed to the growing deviation between (13) and (16) when d grows. However, in practice, the value of d is usually small since sensor nodes are densely distributed.
It is worth mentioning that, according to Figure 2, for a fixed power budget, the farther the eavesdropper is, the fewer relays we should adopt. This indicates that as the helper-eavesdropper distance increases, the benefit brought by the increase of transmit power surpasses that by the increase of relay number.
Figure 3 compares different schemes in terms of the secrecy capacity they achieve with m. The results of the conventional schemes are illustrated for the purpose of benchmarking. The proposed schemes obviously outperform the conventional ones in the whole power range. To be specific, in low power range and high power range, the proposed schemes have the advantage of the best-relay based scheme and that of the all-relay based scheme, respectively, while in medium power range, they outperform the conventional schemes both. This figure also clearly states that if CPC is considered in the total power constraint, adopting more relays may degrade the system security.
Performance comparison of different beamforming schemes.
5. Conclusion
We investigated beamforming schemes in a cooperative WSN for PLS with consideration of both transmit power and circuit power. We first revealed that the optimal beamforming scheme should be performed along with a partial RS strategy and then provided two partial RS based beamforming schemes, namely, the exhaustive-search based scheme and the relay-ordering based scheme, both of which adjust the selected relays dynamically according to the channels and the power budget. Simulation results show that our schemes combine the advantage of the all-relay based scheme in high power range and that of the best-relay based scheme in low power range. Moreover, the relay-ordering based scheme achieves almost the same secrecy capacity as the exhaustive-search based scheme does, but with a dramatically reduced computational complexity.
Footnotes
Competing Interests
The authors declare that they have no competing interests.
Acknowledgments
This work was supported by the Natural Science Foundation of China under Grants 61302101 and 61401223 and by the Graduate Innovation Plan of Jiangsu Province under Grant CXZZ12_0463.
References
1.
WynerA. D.The wire-tap channelThe Bell System Technical Journal19755481355138710.1002/j.1538-7305.1975.tb02040.xMR0408979
2.
CsiszarI.KornerJ.Broadcast channels with confidential messagesIEEE Transactions on Information Theory197824333934810.1109/TIT.1978.1055892
3.
Leung-Yan-CheongS. K.HellmanM. E.The Gaussian wire-tap channelIEEE Transactions on Information Theory197824445145610.1109/tit.1978.1055917MR0504361
4.
GopalaP. K.LaiL.El GamalH.On the secrecy capacity of fading channelsIEEE Transactions on Information Theory200854104687469810.1109/tit.2008.928990MR25911282-s2.0-54749106691
5.
ZouY.WangX.ShenW.Optimal relay selection for physical-layer security in cooperative wireless networksIEEE Journal on Selected Areas in Communications201331102099211110.1109/jsac.2013.1310112-s2.0-84884537599
6.
YangW.WangS.XuX.Cooperative transmission for security enhancement in clustered wireless sensor networksInternational Journal of Distributed Sensor Networks20152015775145610.1155/2015/7514562-s2.0-84937000766
7.
DongL.HanZ.PetropuluA. P.PoorH. V.Improving wireless physical layer security via cooperating relaysIEEE Transactions on Signal Processing20095831875188810.1109/TSP.2009.2038412
8.
WangH.-M.YinQ.WangW.XiaX.-G.Joint null-space beamforming and jamming to secure af relay systems with individual power constraintProceedings of the 38th IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '13)May 2013Vancouver, Canada2911291410.1109/icassp.2013.66381902-s2.0-84890524371
9.
WangX.WangK.ZhangX.-D.Secure relay beamforming with imperfect channel side informationIEEE Transactions on Vehicular Technology20136252140215510.1109/tvt.2012.22306572-s2.0-84879149313
10.
WangH.-M.YinQ.XiaX.-G.Distributed beamforming for physical-layer security of two-way relay networksIEEE Transactions on Signal Processing20126073532354510.1109/tsp.2012.2191543MR29432562-s2.0-84862635573
11.
ChenX.ChenH.-H.Physical layer security in multi-cell MISO downlinks with incomplete CSI—a unified secrecy performance analysisIEEE Transactions on Signal Processing201462236286629710.1109/tsp.2014.2362890MR32815232-s2.0-84910151930
12.
WangH.-M.ZhengT.XiaX.-G.Secure MISO wiretap channels with multiantenna passive eavesdropper: artificial noise vs. artificial fast fadingIEEE Transactions on Wireless Communications20151419410610.1109/twc.2014.23321642-s2.0-84921405314
13.
Havary-NassabV.ShahbazpanahiS.GramiA.LuoZ.-Q.Distributed beamforming for relay networks based on second-order statistics of the channel state informationIEEE Transactions on Signal Processing20085694306431610.1109/tsp.2008.925945MR25171782-s2.0-65449132856
JingY.JafarkhaniH.Network beamforming using relays with perfect channel informationIEEE Transactions on Information Theory20095562499251710.1109/tit.2009.2018175MR25983842-s2.0-66949167419
16.
LinP.-H.LaiS.-H.LinS.-C.SuH.-J.On secrecy rate of the generalized artificial-noise assisted secure beamforming for wiretap channelsIEEE Journal on Selected Areas in Communications20133191728174010.1109/jsac.2013.1309072-s2.0-84883698532
17.
BaldiM.ChiaraluceF.LaurentiN.TomasinS.RennaF.Secrecy transmission on parallel channels: theoretical limits and performance of practical codesIEEE Transactions on Information Forensics and Security20149111765177910.1109/tifs.2014.23489152-s2.0-84907528055
18.
CuiS.GoldsmithA. J.BahaiA.Energy-efficiency of MIMO and cooperative MIMO techniques in sensor networksIEEE Journal on Selected Areas in Communications20042261089109810.1109/jsac.2004.8309162-s2.0-4344710765
19.
JayaweeraS. K.Virtual MIMO-based cooperative communication for energy-constrained wireless sensor networksIEEE Transactions on Wireless Communications20065598498910.1109/TWC.2006.16333502-s2.0-33744745602
20.
ZhouZ.ZhouS.CuiS.CuiJ.-H.Energy-efficient cooperative communication in a clustered wireless sensor networkIEEE Transactions on Vehicular Technology20085763618362810.1109/tvt.2008.9187302-s2.0-57049085115
21.
MarshallA.OlkinI.ArnoldB.Inequalities: Theory of Majorization and Its Applications19792ndNew York, NY, USAAcademic Press
22.
GradshteynI. S.RyzhikI. M.Table of Integrals, Series, and Products20077thSan Diego, Calif, USAElsevierEdity by A. Jeffrey and D. Zwillinger