1. Introduction
Due to the broadcast nature of wireless communication, the threats of eavesdropping and information leakages have increased sharply and the security issue becomes a common concern. The traditional encryption technology uses cryptographic methods in the upper layer of the system, which is crackable and insufficient with the rapid growth of computing power. Therefore, secure communication in the lower layer of the system has been studied and the physical layer security has become a frontier research. Unlike cryptographic methods, the principle of physical layer security technology is to use the difference between the legal channel and the eavesdropping channel to achieve secure communication of the system, which is also its advantage [
1,
2]. The concept of physical layer security is first introduced by Wyner in a one-hop communication system [
3]. With the wide application of relays, many researchers have extended this technology to relay systems [
4,
5,
6,
7]. In order to utilize the limited resource of the communication system to maximize the secrecy rate, efficient resource allocation is essential in physical layer security.
The two-way relay communication systems has attracted much attention in the past few years due to its ability in combating the half-duplex constraint of relay nodes and improving the data transmission efficiency [
8,
9,
10]. Due to the advantages of physical layer security, many studies on two-way cooperative communication systems have considered security issue from a physical layer perspective. The research scenarios can be divided into two cases: (1) External eavesdropper [
11,
12], in which an illegitimate eavesdropper that does not belong to the network tries to decode the confidential information, and (2) untrusted relay [
13,
14,
15,
16,
17,
18,
19], in which the relay is assumed to be untrustworthy and acts as an eavesdropper.
In the two-way untrusted relay system, the physical security was first studied in [
13], in which the authors proved this system can achieve secure communication without external friendly jammer. The authors in [
14] employed artificial noise and studied power allocation in the two-way untrusted relay system with channel estimation errors. Ref. [
15] studied the power allocation in the two-way system with multiple untrusted relays. In the two-way untrusted relay system with multi-antenna, the authors in [
16] proposed a joint beamforming and suboptimal power allocation scheme to maximize the sum secrecy rate of the system. The problem of optimal power allocation for two-way untrusted relaying networks with an external jammer was examined in [
17]. In [
18], the authors studied secure relay selection for two-way untrusted relaying networks. Secure beamforming for full-duplex multiple-input–multiple-output (MIMO) two-way untrusted relay systems was considered in [
19]. In other scenarios, the authors in [
20] proposed machine learning techniques to conserve the position confidentiality of roaming position-based services (PBSs) users. In [
21], the authors proposed a whale optimization algorithm to solve the resource allocation problem in an Internet of Things (IoT) system to reduce the total communication cost.
The above related works are all based on the single-carrier system, so the resources that need to be allocated in the system are the transmission power only. In two-way relay assisted orthogonal frequency division multiplexing (OFDM) systems, channel gains of one subcarrier in one hop differ from another hop, and system capacity can be maximized by subcarrier pairing and power allocation [
22]. The joint resource allocation in the secure OFDM one-way system was studied in some previous works [
23,
24,
25]; however, due to the differences in system models, the existing resource allocation schemes cannot be applied in an OFDM two-way untrusted relay system. A summary of related work is presented in
Table 1. To the best of the authors’ knowledge, secure resource allocation jointly considering subcarrier pairing and power allocation for a two-way cooperative OFDM system with untrusted relaying has not been studied in the literature.
In this paper, our main innovation is to study the secure resource allocation jointly considering subcarrier pairing and power allocation for a two-way cooperative OFDM system with untrusted relaying, including constructing the system model, formulating the optimization problem, and proposing an effective algorithm to solve the non-convex problem. Our goal is to achieve the secure communication in the OFDM two-way communication system with untrusted relaying. We use resource allocation to enhance the security performance of the system by maximizing the sum secrecy rate of the system under individual power constraints of each transmit node. The key idea of our resource allocation algorithm is to decouple the non-convex optimization problem into several brief subproblems and relax them to convex ones.
The major contribution of this paper are twofold:
1. We introduce a two-way cooperative OFDM system with an untrusted relay and formulate the resource allocation problem to maximize the sum secrecy rate under individual power constraints, which include the subcarrier pairing and power allocation.
2. To solve the problem, we propose a joint resource allocation algorithm based on alternative optimization method. The problem is solved by divided into four subproblems. In particular, we show that the complexity of the solution is polynomial in the number of subcarriers. According to the numerical results, in a high signal-to-noise ratio (SNR) scenario, the proposed algorithm improves the achievable sum secrecy rate of the system by more than 15% over conventional algorithms.
The remainder of this paper is organized as follows.
Section 2 describes the system model and derives the formulation of the sum secrecy rate.
Section 3 formulates the optimization problem and presents an efficient joint resource allocation algorithm based on alternative optimization (AO).
Section 4 demonstrates the simulation results to illustrate the performance of the proposed algorithm. Finally, this paper is concluded in
Section 5.
2. System Model
We consider a two-way cooperative OFDM system with untrusted relaying, as shown in
Figure 1, where two users, denoted as
and
, wish to exchange confidential information via an untrusted relay
. The two-way relay operates in a half-duplex mode using the amplify-and-forward (AF) protocol. All communication nodes are assumed to be equipped with a single antenna. We assume that there are no direct links between
and
due to the long distance between them. The users-to-relay channels are considered to be reciprocal, occupying the same bandwidth and experiencing frequency-selective fading. Each OFDM channel is composed of
N orthogonal subcarriers.
Particularly, the relay is assumed trusted at the service level and untrusted at the data level, as in [
26]. Service-level trust entails following the AF protocol as expected. This involves for relays to feedback true CSI, adapt their power according to system schedule, and forward the amplified version of received signal without modification. Since the relay is data-level untrusted, the source imposes security constraints on relays. This is to prevent the untrusted relay from extracting useful information from its received signal.
The transmission from the users to the relay is on a timeframe basis with each frame consisting of multiple OFDM symbols. Each frame is further divided into two time slots. In the first time slot, both
and
send signals to
simultaneously on all subcarriers. We denote the channel coefficients of
to
and
to
on the
i-th subcarrier as
and
, respectively, for
. We further assume that the transmit powers of
and
on the
i-th subcarrier are
and
, respectively. Then, the received signal at
on the
i-th subcarrier in the first time slot can be given by
where
and
denote symbol of
and
’s signal on the
i-th subcarrier, respectively.
denotes the additive white Gaussian noise (AWGN) signal at the relay on the
i-th subcarrier and the noise power is
.
In the second time slot,
amplifies the received signals
on the
i-th subcarrier with a constant gain and forwards them to both
and
on the
-th subcarrier. Note that the subcarrier index
may not be as same as
i and they form a subcarrier pair
, and each subcarrier in
to
is paired with only one subcarrier in
to
. Since each subcarrier has different channel gains, subcarrier pairing can utilize subcarrier diversity to enhance system performance. We denote the transmit power of
on the
-th subcarrier as
. Let
represent the power gain at
to normalize the power of the signal transmitted, i.e.,
Following that, the received signal at
and
from
on the
-th subcarrier in the second time slot can be given by
and
where
and
denote the AWGN at
and
on the
-th subcarrier with variances
. Assuming that both user
and
can perfectly estimate the channel state information (CSI) for channels
and
, the self-interference terms can be eliminated perfectly at both users (first term in (
3) and second term in (
4)). Therefore, the received signal at
and
can be expressed as
Then, the resultant SNR at
and
on the subcarrier pair
can be represented as
and
where
and
are effective channel coefficients. Then, the transmission rate at
and
on the subcarrier pair
can be expressed as
and
, respectively.
As mentioned before, the relay is considered to be untrusted and tries to eavesdrop on the confidential signal. The untrusted relay employs successive the interference cancellation (SIC) method to decode the mixed signal, which requires the relay to decode one user’s signal and remove it from the mixed signals before decoding another user’s signal. This creates two situations that we need to discuss separately: (1) The SIC is successful, which means the relay successfully decodes one user’s signal. In this case, the relay will not experience interference while it decodes another user’s signal. Since the signal will weaken in the transmission of relay forward to the user, the eavesdropping rate of relay must be greater than the transmission rate of the user, so the system cannot achieve secure communication and the resource allocation is meaningless. (2) The SIC is unsuccessful, then the untrusted relay decodes one of the users’ signals by treating the other user as noise, which is called the single-user decode mode [
27]. In this case, the resource allocation can achieve secure communication of the system. Therefore, in the following derivation, the untrusted relay adopts the single-user decode mode. The eavesdropping rate at
on
and
over the
i-th subcarrier can be computed from (
1) and is given by
and
Therefore, the sum secrecy rate of the system on subcarrier pair
can be formulated as
where
.
In this paper, our aim is to jointly design the resource allocation scheme of power allocation and subcarrier pairing to maximize the sum secrecy rate of the system, with the constraints of individual power budgets per node. We define
as the set of power allocation scheme, and it satisfies the individual power constraints, which are
where
,
, and
denote the transmitting power budgets on the user
A, the user
B, and the relay
R, respectively.
In addition to the power constraints, the system must also satisfy the subcarrier pairing constraint that guarantees that each subcarrier is paired strictly with one subcarrier. We define
as the set of subcarrier pairing scheme;
indicates that the
i-th subcarrier in the first slot is paired with the
-th subcarrier in the second slot. The subcarrier pairing constraint can be given by
4. Simulation Results
In simulation, the signal fading follows the Rayleigh distribution. For simplicity, the power constraints of the users and relay are assumed to be the same. The distance between user and is 2 km, and the relay is located at the center of their connection. Three degraded benchmarks, namely, the channel-based power allocation with subcarrier pairing (CBA with SP), equal power allocation with subcarrier pairing (EPA with SP), and equal power allocation without subcarrier pairing (EPA without SP), are considered for comparisons. Since the computational complexity of the algorithms is a polynomial of the number of subcarriers, the sorting scale of the simulation depends on the number of subcarriers, and we perform simulations with subcarriers ranging from 4 to 32.
The CBA with SP algorithm first allocates power according to the equivalent channel coefficient of each subcarrier, with more power allocated to subcarriers with better channels. Then, the algorithm uses the Hungarian method for subcarrier pairing. Differently, the EPA with SP algorithm first allocates power equally on subcarriers and then uses the Hungarian method for subcarrier pairing. The EPA without SP algorithm only allocates power equally on subcarriers, where the subcarrier index for pairing is the same, i.e., .
Two conventional algorithms are also presented for comparison. The first algorithm is the SNR-based allocation (SBA) scheme proposed in [
7]. This algorithm defines an SNR threshold and assumes that when the eavesdropping SNR of the relay is less than the threshold, the untrusted relay cannot decode the confidential signals, so the eavesdropping rate is 0. Then, the primal non-convex problem can be simplified to a convex problem. The second algorithm is the derivative algorithm (DA) proposed in [
17]. This algorithm splits the primal multiple-variable problem into several univariate problems and obtains the solution of these problems by derivation.
In all resource allocation schemes, a central controller acts as service provider, which is assumed to have perfect knowledge of all CSI. The users, as service requesters, provide their own power budgets and CSI to the service provider, and the service provider utilizes this information for subcarrier pairing and power allocation in order to ensure secure communication for users.
The sum secrecy rate achieved by different algorithms is shown in
Figure 3. The numerical results are based on average of 200 Monte Carlo simulations. We can see that the proposed algorithm achieves higher sum secrecy rate than the three benchmarks. In a high SNR regime, the proposed algorithm improves the achievable sum secrecy rate of the system by more than 15% over the three degraded benchmarks and two conventional algorithms.
Figure 3 also shows that the CBA algorithm performs better than the EPA algorithm, which indicates that the subcarrier pairing can effectively improve secrecy performance of the system. The SBA algorithm has the worst performance, because in the two-way untrusted relay system, the small eavesdropping SNR of the relay will result in the decrease of the transmission rate of the users. Hence, the sum secrecy rate of the system will also be reduced. The performance of the DA algorithm is between the CBA algorithm and the EBA algorithm, because the optimization problem is non-convex and the DA algorithm is only suitable for convex problems.
Figure 4 compares the sum secrecy rate achieved by different algorithms with respect to the number of subcarriers. It can be seen that the proposed algorithm significantly outperforms other schemes, especially with more subcarriers. This is because the conventional algorithms in benchmarks cannot make efficient use of the diversity of subcarriers. Furthermore, since the power and bandwidth of the system are limited, the sum secrecy rate will increase with the growth of the number of subcarriers at first, and finally converge. Therefore, the slope of
Figure 4 will gradually decrease.
Figure 5 shows the power allocation scheme on different subcarriers by the proposed algorithm. The corresponding effective channel coefficients of subcarriers are presented in
Table 2. It can be seen that for the same subcarrier, if
, then
, which proves our remark in
Section 3. We can also see that the proposed algorithm tends to allocate more power to subcarriers with similar channel gains on
to
and
to
. This is because the untrusted relay decodes one of the users’ signals by treating the other user as noise. Therefore, the allocated power on the subcarrier with similar channel gains on
to
and
to
can more effectively reduce the eavesdropping rate and increase the sum secrecy rate.
Figure 6 compares the sum secrecy rate achieved by different algorithms with respect to the distance from the user to the relay. The proposed algorithm has better performance than algorithms in the benchmarks at any location of the relay. Particularly, from
Figure 6, it can be seen that the sum secrecy rate achieved by all algorithms reaches the maximum when the distance from the relay
to the user
is 1 km, i.e., the distance from
to
is equal to the distance from
to
. This is because when the distances from
to
and
to
are closer, the channel fading parameters of the subcarriers on
to
and
to
become similar. As mentioned above, the allocated power on the subcarrier with similar channel gains on
to
and
to
can more effectively reduce the eavesdropping rate and increase the sum secrecy rate. Therefore, the sum secrecy rate of the system increases as the distances between the relay and the two users become closer.
Particularly, when the untrusted relay is not cooperative and could alter the power to undermine the strategy, the proposed algorithm can still effectively allocate resource, because the power allocation of the untrusted relay is decoupled from the primal problem in the proposed algorithm. Therefore, the proposed algorithm still works well with the variation of the relay power. In
Figure 7, we limit the user’s power to 20 dBm, and the untrusted relay can alter its transmit power. Since the untrusted relay is not cooperative, it will always allocate power equally to each subcarrier.
Figure 7 compares the sum secrecy rate achieved by different algorithms in this scenario. It can be seen that our proposed algorithm has the best performance, which also confirms our analysis.