Next Article in Journal
Research on Dynamic Process and Droplet Splash of Laser-Induced Cavitation Bubble Collapse within a Droplet
Previous Article in Journal
Application of Image Processing in Evaluation of Hydraulic Fracturing with Liquid Nitrogen: A Case Study of Coal Samples from Karaganda Basin
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Cooperative Jamming-Assisted Untrusted Relaying Based on Game Theory for Next-Generation Communication Systems

1
Department of Electrical and Computer Engineering, Texas A&M University, College Station, TX 77843, USA
2
Department of Electrical and Computer Engineering, COMSATS University Islamabad, Islamabad 45550, Pakistan
3
Department of Intelligent Mechatronics Engineering and Convergence Engineering for Intelligent Drone, Sejong University, Seoul 05006, Republic of Korea
4
School of Electronics and Computer Science, University of Southampton, Southampton SO17 1BJ, UK
*
Author to whom correspondence should be addressed.
Appl. Sci. 2023, 13(13), 7863; https://doi.org/10.3390/app13137863
Submission received: 16 May 2023 / Revised: 26 June 2023 / Accepted: 28 June 2023 / Published: 4 July 2023

Abstract

:
In this contribution, we investigate the performance of an untrusted relaying system when Cooperative Jammers (CJs) are available. We propose two scenarios, Untrusted Relaying-aided Multiple Cooperative-Jammers-based Simultaneous Transmission (UR-MCJST) and an Untrusted Relaying-aided Multiple Cooperative Jammers-based Time-Division Transmission (UR-MCJTDT). The performances of both UR-MCJST and UR-MCJTDT schemes are investigated. The source node is the primary user (PU) that has access to a transmission bandwidth. An untrusted relay is employed for improving the reliability of the PU transmission, while CJs are invoked for improving the secrecy rate of the PU transmission. The transmission strategy for the scheme proposed in this paper is split into three unique phases. The first phase is called the broadcast-and-jamming phase, while the second phase is called the relaying phase, and the final phase is called CJ’s secondary phase, which is used for transmitting the secondary user message. More explicitly, CJs transmit noise for impairing the untrusted relay node’s ability to decode the message during the broadcast-and-jamming phase. In compensation for their help, CJs are allocated part of the available spectrum by the PU for their transmission during the secondary transmission phase. A Stackelberg leader–follower game was considered between the PU and the CJs, while a power control game that is based on the well-known Nash equilibrium is employed by the CJs. Furthermore, an investigation into the effect of invoking simultaneous transmission and time-division-based transmission scenarios during the CJs’ secondary transmission phase was carried out. Finally, we evaluated the achievable secrecy rate of the PU and the utility rate of the CJs in our proposed scheme.

1. Introduction

Security and reliability are crucial for any wireless communication system, especially in the case of ultra-dense 5G and beyond networks. The wireless medium has a broadcast nature, which makes it a major challenge in ensuring security while maintaining reliability in the presence of unauthorized users [1]. Shannon was the first to provide the foundations for secrecy in communication between legitimate parties over a noiseless channel [2], while Wyner presented the discrete memory-less wiretap channel, ensuring secrecy and reliability among the legitimate parties in the presence of an eavesdropper over the noisy communication medium [3]. It was found in [4] that both reliability and confidentiality can be ensured for the broadcast channel with the aid of two receivers.
To properly scale, adapt, and deliver quantum-safe security solutions for 6G connectivity, the security of ultra-dense networks is crucial. Hence, there arises the need for a bottom-up strategy using all security planes over the general communication stack. In this regard, physical-layer security (PLS) is a leading contender [5]. PLS has attracted a lot of attention because it is capable of using the channel’s impairment, including noise, fading, interference, synchronization and location, to provide security against an eavesdropper without data encryption at the upper layers [1,6,7,8]. More specifically, PLS takes the advantage of the random nature of noise and fading channel for minimizing the leaking of information to an eavesdropper. Explicitly employing the Cooperative/Friendly Jammer (CJ) has been known to be one of the most important PLS methods, where legitimate nodes communicate secretly with the help of an external jammer that transmits a jamming signal to perturb the eavesdropper [9,10]. Recently, unmanned aerial vehicles have also been investigated as CJs for improving PLS [11,12,13].
Cooperative communications, as mentioned in the cited work [14,15], present an appealing approach to accomplish reliable and efficient transmission. The wireless transmission’s broadcast nature enables relay terminals to receive signals without incurring additional costs. Moreover, cooperative communications generally take advantage of decreased path loss, resulting in enhanced power efficiency, as emphasized in the studies [16,17].
The introduction of 6G presents a complex dilemma. Since the majority of connecting devices are anticipated to utilize the existing spectrum, the number of networking devices is predicted to increase at an accelerated rate, raising concerns about spectrum scarcity. This issue calls into question 6G’s viability as an upcoming networking paradigm. Cognitive radio networks (CRNs) are seen as the most promising solution for resolving spectrum shortages in 6G networks [18,19]. The licensed/primary users (PUs) and unlicensed/secondary users (SUs) of the network can agree on interference limits that allow a variety of devices from the primary and secondary networks to share the same frequency band. More specifically, CRN allows the SUs to use its spectrum based on certain conditions, which can be occupied by the PUs, or their slot might be empty, hence accommodating more users [20,21,22]. Dynamic Spectrum Access (DSA) [20] technology, which divides the currently unoccupied spectrum between the licensed PUs and unlicensed SUs in a dynamically changing radio environment, is the foundation of the CRN concept. Based on how the SUs acquire and use the primary spectrum, CRN transmissions can be divided into three main branches: interweave, underlay, and overlay DSA methods [23,24]. In both the interweave and underlay schemes, the PU has no knowledge of the secondary transmission because the SU transmits in a spectrum hole in the interweave DSA mechanism, while the SU transmits its information within the interference threshold of the primary transmitter in an underlay scheme. Both interweave and underlay will introduce slight degradation to the primary transmission. While cognition is employed to reduce interference at the destination of both the PU’s and SU’s destination in the CRN, the overlay transmission model focuses on the interference reduction or cancellation method. The SU should have access to the PU’s codebooks in order to cancel out the interference [23].
A two-stage Stackelberg game was proposed in [25] to analyze the participation level of the mobile users and the optimal incentive mechanism of the CSP using backward induction. Similarly, ref. [26] proposed a two-stage Stackelberg game-based computational offloading mechanism in which the mobile edge nodes (leaders) set the appropriate price for their computational resources and the industrial IoT devices (followers) formulate their utility functions by considering the social interaction among each other. The work proposed a dynamic iterative algorithm for Nash equilibrium. In [27], the authors exploited the concept of a social tie in CJs, where the source and jammers are smart phones carried by humans who have diverse social relationships. The jammers would be more willing to become the CJs for the source–destination pair that has a closer tie with them.

Literature Review Comparison

Most of the works consider the relaying terminal as a trusted node, while the eavesdropper is considered as an outsider that is not part of the communication infrastructure [28,29,30]. Furthermore, in cooperative cognitive radio networks [31], the spectrum is shared among the licensed and unlicensed users, where the relay terminals can be part of the unlicensed users. In such a scenario, the relay node may not be trustworthy and could be a potential eavesdropper [32,33,34]
The concept of untrusted relays was initially explored in [35], where the destination played the role of a jammer during the broadcast phase to ensure secrecy for the source and destination pair. Osorio et al. [36] investigated the secrecy rate performance of an amplify-and-forward (AF) relaying network with an untrusted relay, employing destination-based jamming to enable secure transmissions. Ku et al. [37] considered a two-way relaying scheme involving a large-scale multiple-antenna base station (BS), a single-antenna mobile user (MU), and a multiple-antenna external jammer, analyzing the ergodic secrecy sum rate, which was found to improve with an increasing number of untrusted relays.
To enhance the secrecy rate performance of systems using an untrusted relay and a multiple-antenna destination, Zhao et al. [38] proposed a novel full-duplex destination jamming scheme with optimal antenna selection. The analytical curves presented in [38] were verified to align well with the simulation results. Jiang et al. [39] considered an untrusted relay-based network where the source transmitted a confidential message to both the relay and the destination, while the destination transmitted a jamming signal to the relay. The Non-orthogonal AF (NAF) and Orthogonal AF (OAF) protocols were examined in [39], with the source-destination (S-D) link being considered in both the source-broadcasting and relaying phases in the NAF scenario, whereas in the OAF scenario, the S-D link was only involved in the source-broadcasting phase.
The topic of secrecy transmission with multiple untrusted relays was explored in [40]. Specifically, the study focused on the use of cooperative jammers to safeguard the transmitted confidential signal against eavesdropping. These cooperative jammers employed techniques such as transmitting noise [9,41] or sending codewords [42,43] to counteract eavesdroppers. Most of the existing works in this area have investigated jamming methods involving the destination or utilizing altruistic nodes [44,45].
Game theoretic secrecy maximization techniques have been investigated in [34,46,47]. Jamming through non-altruistic nodes was considered in [48], where the communication is secured through these nodes, and in return, they are considered as the SUs in the network. Specifically, the jammers would be given access to the spectrum of the PUs for their secondary transmissions. Furthermore, a Stackelberg-based game was presented in [46], for the enhancement of the PU’s secrecy rate. In the study by Al et al. in [49], a cognitive radio network (CRN) was examined, consisting of a primary transmission involving a PU transmitter (PT) and PU receiver (PR), as well as a secondary transmission involving an SU transmitter (ST) and SU receiver (SR). The ST in [49] was considered as a trusted relay for the PT, and the cooperation between the PT and ST was utilized to establish physical layer security using a multilevel Stackelberg game. Throughout the network, all transmissions were susceptible to potential eavesdropping attacks.
The study demonstrated that employing spectrum leasing, where secondary access is traded for cooperation, is a promising framework for enhancing the secrecy rate in CRNs. This finding was highlighted in [49].
In Zhang et al. [47], a two-way untrusted relay-based network was studied, incorporating a Stackelberg game between the sources and friendly jammers. The objective was to investigate the cooperation dynamics and strategies between the sources and jammers to optimize the network performance.
In H et al. [50], the focus was on a cooperation scenario between primary users (PUs) and untrusted secondary users (SUs) in cognitive radio networks. The SUs were willing to assist the PUs by relaying their messages in exchange for sharing the PUs’ spectrum. However, a concern arose regarding the PUs’ reluctance to accept this assistance due to the untrustworthiness of the SUs, which may attempt unauthorized decoding of the PUs’ messages. The study aimed to address the challenges and trade-offs associated with the cooperation between PUs and untrusted SUs in order to establish secure and efficient communication in cognitive radio networks.
A distributed mechanism to improve the secrecy rate using CJs without a relaying network was investigated in [48], where the eavesdropper is considered to be an outside entity. CJs access the spectrum allocated to them simultaneously, which may cause significant interference to all CJs. The scheme in [48] was extended to the case where the eavesdropper is considered to be an untrusted AF relay (UR) in [51] and a single CJ is used. We will refer to the scheme in [48] as the Cooperative Jamming-based Simultaneous Transmission (CJST) scheme and to the untrusted relaying-aided CJST scheme in [51] as UR-CJST throughout the paper. A secure cooperative network consisting of a source, a destination, a group of untrusted AF relays and a passive eavesdropper whose location was unknown was proposed in [52]. The joint cooperative beamforming, jamming and power allocation strategy was considered to protect the confidential information while at the same time satisfying the required QoS at the destination. In [53], an untrusted relay is considered for enabling secure device-to-device communication by deploying a directional-dedicated jammer. As the jammer is directional, its impact is only on the untrusted relay but not on the destination device. In [54], a trusted relay employing an external eavesdropper is considered, and the impact of the relay, jammer and eavesdropper locations on the secrecy capacity is presented. Dedicated jamming nodes are beneficial in terms of improving the secrecy rate, but it would incur an additional burden on the existing infrastructure; therefore, non-altruistic solutions are financially more beneficial.
Against this backdrop, in this contribution, we investigate the employment of non-altruistic multiple CJs for an untrusted relaying case and further propose a time-division transmission scenario, where all CJs access their dedicated channels in a time-division fashion. A literature review comparison is summarized in Table 1. In addition, we present a classification structure in Figure 1, which classifies the cited contributions for security in the communication networks presented in Table 1. More explicitly, our contributions are stated in the novelty statement below:
  • We investigate the secrecy rate of the PU and the utility rate of the CJs/SUs, based on the locations of the CJs for the AF-based untrusted relaying case.
  • The model of the Stackelberg game between PU and CJs, as well as that of the power control game among CJs, are derived and investigated when an untrusted relaying terminal is employed.
  • We extend the CJST scheme in [48] to the case where the eavesdropper is considered to be an untrusted relay. We further extend the single CJ-assisted UR-CJST scheme [51] to multiple CJs, which we refer to as Untrusted Relaying-aided Multiple Cooperative Jammers-based Simultaneous Transmission (UR-MCJST).
  • Finally, an Untrusted Relaying-aided Multiple Cooperative Jammers-based Time-Division Transmission (UR-MCJTDT) scheme is proposed, where time division is considered in the utility phase. The performances of both UR-MCJST and UR-MCJTDT schemes are investigated.
The outline of the paper is as follows. Section 2 presents the system model of our proposed schemes, and Section 3 presents the proposed transmission scenarios, while Section 4 shows the results of the proposed scheme in addition to their discussions. Finally, we present the conclusions in Section 5.

2. System Model

In this section, we describe the system parameters, the cooperative jamming model used in our system, the Stackelberg game between PU and CJs, and the power control game between CJs.

2.1. Cooperative Jamming Model

We consider an AF-based cooperative communication system, which consists of a source node (S), a destination node (D), an untrusted relay node (R), N number of cooperative jammer nodes ( C J i ) and N number of CJ’s destination nodes ( D J i ), where i = { 1 , , N } [55]. It is assumed that each node has a single antenna. Our suggested system is divided into three phases depending on time slots. In more detail, the phases are as follows: the source information transmission denoted as the first phase in this paper, the relaying and jamming signal transmission denoted as the second phase, while in the end, the cooperative jammer will transmit its own information/message denoted as the third phase, as is depicted in Figure 2. During the first phase, the CJs will also transmit a jamming signal in addition to the source data transmission.
The information symbols conveyed by the PU, cooperative jammers, and untrusted relay are denoted by the symbols X { . } , Y { . } and Z { . } , respectively. The first phase, second phase, and third phase transmissions are denoted by the subscripts t 1 , t 2 , and t 3 , respectively. The eavesdropper is an outside entity as was presented in the two-phase model provided in [48]. In this paper, we consider the eavesdropper as an untrusted relay, which is not an outside entity and hence poses a different challenge. The time slot T of the overall transmission is scaled to unity. The primary transmission is kept as a time slot fraction α 1 . That time slot will be equally divided into the first and second phase, i.e., we have a α 2 duration for each of the two phases.
In the third phase, the CJs will receive a reward, with the remaining ( 1 α ) period being devoted to their non-altruistic jamming contribution. As a reward, we take into account two transmission strategies for the SUs throughout their designated third slot. These are the UR-MCJST scenario described in Section 3.1 and the UR-MCJTDT scenario described in Section 3.2. In the UR-MCJST scenario, all jammers simultaneously access the allocated bandwidth during the third phase time slot of duration ( 1 α ) . However, for the UR-MCJTDT scenario, the access time is equally divided to 1 α N for each jammer during the third phase of transmission.
The wireless channel considered between different transceiver pairs represented as a pair ( k , r ) is denoted by h k r = G k r . h ¯ k r , where h ¯ k r is the Rayleigh fading coefficient, G k r = ( d S D d k r ) ρ is the reduced distance related path gain [17,56], and ρ is the pathloss exponent, while the distance between the two transceivers is represented as d k r . The received SNR at node r will be defined as γ k r = | h k r | 2 N 0 , where N 0 / 2 is the noise variance per dimension. Furthermore, P s is the source’s power, and P C J i is the ith jammer’s power. The ratio of the power invested for transmitting jamming signals to that invested for the CJ’s secondary transmission is given by β .

2.2. Stackelberg Game Model

The Stackelberg game involves a leader and a follower, where the follower acts according to the strategy chosen by the leader. In our case, the PU or the source will act as the leader, while CJs will act as the followers. The PU’s optimal strategy ( α * , β * ) would maximize its secrecy rate R s , while the power level of the i t h jammer P C J i * is selected to maximize its utility rate U C J i , as is illustrated in Figure 3. The PU’s optimal strategy and the CJ’s power choice are jointly referred to as the Stackelberg equilibrium. We assume that CJs are honest and trustworthy, where they do not deviate from transmitting jamming signals based on a power ratio of β determined by the PU, and they do not turn malicious. All PUs and CJs are also assumed to be selfish and rational, which mimic a non-altruistic behavior.
Once the PU has decided the optimal strategy ( α * , β * ), the CJs will respond with a set of power choices P C J i * , where J { 1 , , N } is the set of chosen jammers. Since there are multiple CJs in our scheme, all chosen J CJs will need to compete among themselves. The outcome of the competition is a set of power choices that can be described by the game-theoretical concept of the Nash equilibrium (NE), where any unilateral deviation in the player’s strategy would not produce any gain [57]. (The NE considered in this paper is based on [48], which considers all the values of α and β for its calculation and hence gives the best results. In comparison, iterative algorithms for NE have been presented in [25,26], which will give optimum results, as they incur lower computational complexity.) The power control game of [48] was modified and adapted to our relaying-based cooperative jamming system, as will be described in the following section.

3. Transmission Scenarios

In this section, the power control game is presented for both the simultaneous trans-mission-based UR-MCJST scenario and the time-division transmission-based UR-MCJTDT scenario.

3.1. UR-MCJST Scenario

The S and CJs play the game known as the leader–follower Stackelberg game. In this game, the source acts as the leader, and CJs are assigned the role of the followers, as shown in Figure 3. The S, which is the leader, will first allocate the time fraction α to be used during the first and second phases, then the chosen set of CJs J { 1 , , N } , where N is the total number of available CJs, as well as the power ratio β . Here, α is normalized to one. The power ratio β will be defined as in [48]:
β = 𝔼 [ Y { C J i , t 1 , α 2 } 2 ] 𝔼 [ Y { C J i , t 3 , 1 α } 2 ] ,
where 𝔼 [ Y { C J i , t 1 , α 2 } 2 ] is the average power for the ith CJ denoted as C J i for transmitting a jamming signal during the first phase, while 𝔼 [ Y { C J i , t 3 , 1 α } 2 ] will be C J i ’s average power for its own transmission during the third phase. K is a factor that represents the number of transmitted symbols by the PU denoted as S for the complete normalized interval. S transmits the symbols X { t 1 , α 2 } during the first time slot only, i.e., we have X { t 2 , α 2 } = 0 and X { t 3 , 1 α } = 0 . Consequently, the total power that is represented as P s can be calculated by employing the following equation, which is the revised form of Equation (1) in [48]:
P s = 1 K t 1 = 1 α 2 K 𝔼 [ X { t 1 , α 2 } 2 ] + 1 K t 2 = α 2 K + 1 α K 𝔼 [ X { t 2 , α 2 } 2 ] + 1 K t 3 = α K + 1 K 𝔼 [ X { t 3 , 1 α } 2 ] = 1 K t 1 = 1 α 2 K 𝔼 [ X { t 1 , α 2 } 2 ] = α 2 𝔼 [ X { t 1 , α 2 } 2 ] ,
and thus, we have:
𝔼 [ X { t 1 , α 2 } 2 ] = 2 P s α .
Furthermore, the CJs will not be transmitting during the second transmission phase, i.e., 𝔼 [ Y { C J i , t 2 , α 2 } 2 ] = 0 . Therefore, the ith CJ’s transmission power will be given by:
P C J i = 1 K t 1 = 1 α 2 K 𝔼 [ Y { C J i , t 1 , α 2 } 2 ] + 1 K t 2 = α 2 K + 1 α K 𝔼 [ Y { C J i , t 2 , α 2 } 2 ] + 1 K t 3 = α K + 1 K 𝔼 [ Y { C J i , t 3 , 1 α } 2 ] = α 2 𝔼 [ Y { C J i , t 1 , α 2 } 2 ] + ( 1 α ) 𝔼 [ Y { C J i , t 3 , 1 α } 2 ] .
By integrating the power ratio β from Equation (1) into Equation (4), we obtain the following expression:
𝔼 [ Y { C J i , t 1 , α 2 } 2 ] = κ 1 P C J i ,
where κ 1 = β α β 2 + 1 α and
𝔼 [ Y { C J i , t 3 , 1 α } 2 ] = κ 1 β P C J i .
During the first phase, S sends the signal X { t 1 , α 2 } as its message to the receiver denoted by D and an untrusted relay R. At the same time, non-altruistic CJs transmit the jamming signal Y { C J i , t 1 , α 2 } N ( 0 , 1 ) to ensure that a secure communication between the S and D has been carried out over the wireless channel as shown in Figure 2. During the first phase, the signals that will be received at R and D can be represented, respectively, as
y r = h s r 2 P s α X { t 1 , α 2 } + i J h C J i r κ 1 P C J i Y { C J i , t 1 , α 2 } + w r
and
y d ( 1 ) = h s d 2 P s α X { t 1 , α 2 } + i J h C J i d κ 1 P C J i Y { C J i , t 1 , α 2 } + w d ( 1 )
where w r and w d ( 1 ) are the AWGN noise at R and D, respectively. Afterward, R will relay the received signal y r to D using an amplify and forward strategy during the second phase; consequently, the signal received at the D can be represented as:
y d ( 2 ) = h r d η r y r + w d ( 2 ) ,
where w d ( 2 ) denotes the AWGN noise at the D. The amplification factor η r can be computed as:
η r = 1 2 P s α | h s r | 2 + i J κ 1 P C J i | h C J i r | 2 + N 0 .
By substituting (7) and (10) into (9), we obtain:
y d ( 2 ) = η r h r d h s r 2 P s α X { t 1 , α 2 } + i J η r h r d h C J i r κ 1 P C J i Y { C J i , t 3 , α 2 } + η r h r d w r + w d ( 2 ) .
By summing the two received signals, specifically y d ( 1 ) from Equation (8) and y d ( 2 ) from Equation (11), we obtain the following expression:
y d = h s d 2 P s α X { t 1 , α 2 } + i J h C J i d κ 1 P C J i Y { C J i , t 1 , α 2 } + i J η r h r d h C J i r κ 1 P C J i Y { C J i , t 3 , α 2 } + η r h r d h s r 2 P s α X { t 1 , α 2 } + η r h r d w r + w d ,
Here, we define w d as the sum of w d ( 1 ) and w d ( 2 ) , and η r is provided in Equation (10). Since Y C J i , t 1 , α 2 is typically assumed to be known at receiver D, we can subtract the second and third terms from y d in Equation (12) to yield:
y d = h s d 2 P s α X { t 1 , α 2 } + η r h r d h s r 2 P s α X { t 1 , α 2 } + η r h r d w r + w d .
We can calculate the S N R at D as follows:
γ D = h s d 2 2 P s α + | η r | 2 | h r d | 2 | h s r | 2 2 P s α | η r | 2 | h r d | 2 N 0 + 2 N 0 = 2 α γ s d γ s r + γ s d κ 1 i J γ C J i r + γ s r γ r d + γ s d α 2 γ r d + γ s r + α 2 κ 1 i J γ C J i r + α
where γ s r = P s | h s r | 2 N 0 , γ s d = P s | h s d | 2 N 0 , γ C J i r = P C J i r | h C J i r | 2 N 0 and γ r d = | h r d | 2 N 0 . Similarly, from (7), we can derive the received S N R at the relay as:
γ R ; C J i = | h s r | 2 2 P s α i J | h C J i r | 2 κ 1 P C J i + N 0 = γ s r α 2 κ 1 i J γ C J i r + α 2 .
The achievable rate at the destination R D for the multiple jammers case can be computed as:
R D = α 2 log ( 1 + γ D ) ,
Similarly, the achievable rate at the untrusted relay is given by:
R R = α 2 log ( 1 + i J γ R ; C J i ) ,
where γ R ; C J i is the S N R at the ith relay given by (15). The achievable S-D secrecy rate is the measure of how much information is transmitted from S to D without being revealed to the eavesdropper, which is given by:
R s = max { 0 , ( R D R R ) } .
Each CJ transmits an average power of κ 1 β , as given by (6), during the third phase. Hence, the SNR at the CJ’s destination is given by:
γ C J i D J i = κ 1 β P C J i | h C J i D J i | 2 κ 1 β j J , j i | h C J j D J i | 2 P C J j + N 0 = | h C J i D J i | 2 P C J i j J , j i | h C J j D J i | 2 P C J j + β κ 1 N 0 ,
Here, h C J i D J i denotes the fading channel coefficient between the ith jammer and the corresponding destination D J i of that jammer. Additionally, the power of the ith jammer, represented as P C J i , is subject to the power budget constraint P ¯ C J i , which ensures that P C J i does not exceed P ¯ C J i . Notice that there is interference from other CJs, who transmit to their destinations at the same time. (The utility rate of a node functioning as a cooperative jammer is determined by its attainable reliable communication rate toward its destination D J i , considering the time-bandwidth fraction ( 1 α ) . This utility rate is evaluated in relation to the cost associated with the total transmission power.) The utility rate of the ith jammer can then be computed as:
U C J i ( α , β , J ; P C J i ) = ( 1 α ) log 2 1 + γ C J i D J i c i P C J i
where the per unit transmission power cost for the ith jammer is denoted by c i . The followers’ response refers to the power levels selected by the jammers for transmission. A Nash equilibrium occurs when no jammer has motivation to alter their power level, considering the power levels chosen by the other jammers [48]:
P C J i J * ( α , β ; J ) = arg max P C J i J ( α , β ; J ) U C J i ( α , β , J ; P C J i ) s . t . 0 < P C J < P ¯ C J i .
By equating the derivative of the utility rate U C J i with respect to P C J i to zero, we can find the optimal power allocation for each jammer, which is expressed as follows:
U C J i ( α , β , J ; P C J i ) P C J i | P C J j J , j i = P C J j J , j i * = 0 , i J
By deriving (22) using (20), we can determine the optimal power distribution for each jammer, which was determined to be:
P C J i J * ( α , β ; J ) = 1 α c i ln ( 2 ) β κ 1 | h C J i D J i | 2 j J , j i | h C J j D J i | 2 | h C J i D J i | 2 P C J j * ( α , β ; J ) 0 P ¯ C J i .
Note that in the situation of weak interference, NE exists and is distinct [58], i.e., for the case where the interference matrix H is defined as [ H ] C J j D J i = | h C J j D J i | 2 , it will be strictly diagonally dominant, i.e., j J , j i | h C J j D J i | 2 | h C J i D J i | 2 < 1 . The D J i in our simulation is nearer to the C J i than other C J j where i j . The interference matrix H exhibits strict diagonal dominance, indicating that the diagonal elements are significantly larger than the off-diagonal elements, and hence, this property leads to an apparent NE.
Figure 3 presents the Stackelberg game established for optimizing the values of α * and β * , which can be calculated from:
( α * , β * ) = arg max α , β R s ( α , β ; P C J i J * ( α , β ; J ) s . t . 0 < α 1 , 0 < β < .
As shown in Figure 3, the source (leader) provides the cooperative jammer (follower) the initial information of α and β . The cooperative jammer calculates the optimized power using (21). The optimized power is used by the source to maximize its secrecy rate. The iterations between the source and cooperative jammer continue until optimized values of α * and β * are attained for providing the maximum secrecy rate.

3.2. UR-MCJTDT Scenario

Note that the UR-MCJST scenario described in Section 3.1 requires weak interference for the NE to exist. It is hence rational to derive an interference-free scenario. More specifically, in the time-division-based UR-MCJTDT scenario, each of the selected CJs is allocated a time-bandwidth fraction of 1 α N , for an interference-free transmission during the third phase. In this interference-free UR-MCJTDT scenario, NE will always exist.
In a similar fashion to the UR-MCJST scenario, each jammer in this case will emit a noise signal during the initial α / 2 period. This behavior of the jammers remains consistent across both scenarios. Then, the relay node will transmit during the second α / 2 duration as shown in Figure 2. The remaining ( 1 α ) time-bandwidth fraction will then be divided for all N selected CJs, where each CJ can enjoy an interference-free allocation of 1 α N during the third phase. The power ratio β for the UR-MCJTDT scenario can be calculated as:
β ˜ = 𝔼 ˜ [ Y { C J i , t 1 , α 2 } 2 ] 𝔼 ˜ [ Y { C J i , t 3 , 1 α N } 2 ] ,
where the mean power used by the ith jammer for transmitting the jamming signal in the first phase and consequently its own information in the third phase will be denoted by 𝔼 ˜ [ Y C J i , t 1 , α 2 2 ] and 𝔼 ˜ [ Y C J i , t 3 , 1 α N 2 ] , respectively. These represent the power levels associated with the jamming signal and the CJ’s own data transmission during the respective phases.
The total power utilized by the S represented as P s will be similar to (2). However, the transmission power for the ith CJ is given by:
P ˜ C J i = 1 K t 1 = 1 α 2 K 𝔼 ˜ [ Y { C J i , t 1 , α 2 } 2 ] + 1 K t 2 = α 2 K + 1 α K 𝔼 ˜ [ Y { C J i , t 2 , α 2 } 2 ] + 1 K t 3 = α + 1 α N ( i 1 ) K + 1 α + 1 α N i K 𝔼 ˜ [ Y { C J i , t 3 , 1 α N } 2 ] = α 2 𝔼 ˜ [ Y { C J i , t 1 , α 2 } 2 ] + 1 α N 𝔼 ˜ [ Y { C J i , t 3 , 1 α N } 2 ] .
By integrating the power ratio β ˜ from Equation (25) into Equation (26), we obtain:
𝔼 ˜ [ Y { C J i , t 1 , α 2 } 2 ] = κ 2 P ˜ C J i ,
where κ 2 = β ˜ α β ˜ 2 + 1 α N and
𝔼 ˜ [ Y { C J i , t 3 , 1 α N } 2 ] = N κ 2 β ˜ P ˜ C J i .
The SNR at D and R are similar to those given by (14) and (15), except that κ 2 is used instead of κ 1 , i.e., they are given by:
γ D ˜ = 2 α γ s d γ s r + γ s d κ 2 i J γ ˜ C J i r + γ r d γ s r + γ s d α 2 γ r d + γ s r + α 2 κ 2 i J γ ˜ C J i r + α 2
and
γ ˜ R ; C J i = γ s r α 2 κ 2 i J γ ˜ C J i r + α 2 ,
respectively. Based on these SNR values, the achievable rates R D and R R as well as the secrecy rate R s ˜ , can be computed from (16), (17) and (18), respectively.
By contrast, the SNR at the CJ’s destination for this orthogonal transmission scenario is computed as:
γ ˜ C J i D J i = κ 2 β ˜ P ˜ C J i | h C J i D J i | 2 N 0 = | h C J i D J i | 2 P ˜ C J i β ˜ κ 2 N 0 ,
The utility rate of the selected jammers C J i J in the orthogonal scenario can be derived as follows:
U ˜ C J i ( α , β ˜ , J ; P ˜ C J i ) = 1 α N log 2 1 + γ ˜ C J i D J i c i P ˜ C J i .
By comparing the SNR formulas in (31) and (19), we see that the UR-MCJTDT scenario has a higher SNR because it has no interference at the denominator. However, the time-bandwidth of the UR-MCJTDT scenario is reduced by N times, compared to those of the UR-MCJST scenario, as seen in (32) and (20). Based on a partial derivative of  U ˜ C J i in (32), The optimal power allocation for each jammer can be calculated in a similar manner as Equation (22), yielding the following expression:
P ˜ C J i J * ( α , β ˜ ; J ) = 1 α c i ln ( 2 ) β ˜ κ 2 | h C J i D J i | 2 0 P ¯ C J i ,
where NE always exists because there is no interference term from other CJs; hence, it can be decoupled (p. 141 [48]). Based on the best power allocation in (33), the optimized values of α * and β * can be calculated from (24) by the leader/source.

4. Results and Discussions

Having investigated the game theoretical aspect of the proposed schemes in Section 2, let us now evaluate our simulation results. The first set of simulations consider N = 3 CJs, where the positions of C J 2 and C J 3 are fixed, while the impact of changing the location of C J 1 (mobile jammer) is investigated. The (x, y) location coordinates of of S, R, C J 2 , C J 3 and D are given at the caption of the figures. In this scenario, the pathloss exponent was chosen to be ρ = 4 , with P s / N 0 = P ¯ C J i = 10 (mW) and c = 0.25 (bit/s/Hz/mW). The jammers’ destinations are considered to be a fraction of the distance between the S and D, i.e., d j = d s d / 4 from its jammer transmitter location, where d s d is the distance between S to D and is measures in meters. In order to compare UR-MCJST and UR-MCJTDT scenarios when the α and β values are fixed, we set the α and β values to 0.65 and 1, respectively, in this first set of simulations.
Figure 4 illustrates the secrecy rate and the corresponding utility rate for the sender S and the cooperative jammer C J i in the case of the UR-MCJST scenario employed by the jammers. On the other hand, Figure 5 shows the secrecy rate and the corresponding utility rate when the jammers adopt the UR-MCJTDT scenario. We found from Figure 4a that the secrecy rate drops to 1.2042 (bit/s/Hz) and 1.43 (bit/s/Hz) when C J 1 gets closer to C J 2 at (22,43) and C J 3 at (26,50), respectively, in the UR-MCJST scenario. This is due to high interference levels at the jammers’ destination, i.e., when the interference matrix H is no longer strictly diagonally dominant. Since the power used during the third phase has to be small when two CJs are close to each other, the jamming power used during the first phase also needs to be small because we have β = 1 . When the jamming power used during the first phase is small, the achievable rate by the untrusted relay would be higher, which would result in a low secrecy rate for the PU. Similarly, the utility rate of C J 1 also drops when it is closer to C J 2 or C J 3 due to the use of lower power during the third phase. As expected, this effect is mitigated in the UR-MCJTDT scenario, as seen in Figure 5a, because the transmission power of each CJ causes no interference to other CJs during the third transmission phase.
Note that there is another drop in the secrecy rate when C J 1 gets closer to R, which gives a secrecy rate of 1.3951 (bit/s/Hz) and 1.3983 (bit/s/Hz) at location (25,25) for Figure 4a and Figure 5a, respectively. However, after considering all factors including the effect of the locations of CJ’s destination nodes, a local minimum of the secrecy rate (of value 1.3883 (bit/s/Hz)) is located at (23,23) in Figure 4a. Similarly, Figure 5a also shows a minimum value of 1.3901 (bit/s/Hz) at location (23,23). This is due to the fact that the jamming signals would form part of the amplification factor, as seen in (10), which will be forwarded to the destination node, as shown in (13). As we note from the secrecy rate region of the UR-MCJTDT scenario depicted in Figure 5a, the best location for C J 1 is farther away from the relay node, while the effect of the other CJs’ locations is negligible compared to that of the UR-MCJST scenario shown in Figure 4a. Furthermore, the utility rate of the UR-MCJTDT scenario is not affected by the relay location because the relayed signal during the second phase is independent of the third-phase transmission. Note that the utility rate of C J 1 in the UR-MCJTDT scenario is constant and is higher than that of the UR-MCJST scenario, as seen in Figure 4b and Figure 5b.
Our second set of simulations explores the effect of increasing the number of CJs, i.e., N, when both the Stackelberg game and power control game were invoked for optimal performance. We compare our results with the baseline Stackelberg and the power-control-based algorithms in [46,48]. The optimum values of α and β are determined by the source, while the optimum jammer power values are determined by the jammer, as seen in the Stackelberg leader–follower game in Figure 3. In the non-relaying scheme of CJST [48], both the secrecy rate and utility rate would improve as the number of CJs increases. However, when relaying is invoked in our UR-MCJST scenario, it is interesting to see from Figure 6 that as N increases, the secrecy rate drops. Hence, the CJST scenario is not desirable when an untrusted relay is involved. By contrast, our proposed UR-MCJTDT scenario works well in the untrusted relaying system, where the secrecy rate improves as N increases, as seen in Figure 6. However, it appears that we only need N = 3 CJs in our case, when the SNR used is 10 dBm. We can also see from Figure 6 that our proposed algorithms outperform the baseline Stackelberg in [46] and the power control algorithm in [48]. The optimized α * and β * chosen by the source, as well as the average optimized CJ power of all N CJs given by P C J * = 1 N i N P C J i * , are shown in Figure 6 and Figure 7. For example, when N = 2 , we have α * = 0.93 , β * = 6 and P ˜ C J * = 0.41 (mWatts) for the orthogonal scenario. Furthermore, as seen in Figure 7, the per user utility rates of the UR-MCJTDT and UR-MCJST scenarios are similar. However, the CJs in the UR-MCJTDT scenario can achieve the same utility rate with less power, when compared to the UR-MCJST scenario. For example, as seen in Figure 7 when N = 3 , the average CJ power is P C J * = 0.18 (mWatts) and P ˜ C J * = 0.93 (mWatts) for the UR-MCJST and UR-MCJTDT scenarios, respectively. We also compared the utility rate results with the baseline Stackelberg and the power-control-based algorithms in [46,48]. Here, we can see that the per user utility rate increases with increasing available C J s in the case of the baseline algorithms, but the overall utility rate will be higher in the proposed scheme, as we have employed multiple C J s , while the baseline scheme chooses a better C J among the available C J s .

5. Conclusions

We have proposed and investigated a cooperative jamming-assisted untrusted relaying scheme, where the Stackelberg game was invoked between the PU and the CJs, while a power control game was employed by the CJs. It has been noted that when an untrusted relay is present, the UR-MCJST benchmark scheme suffers from a reduced secrecy rate, when the number of CJs are increased. Moreover, the proposed UR-MCJTDT scenario can maintain the same utility rate as the benchmark scheme while allowing the CJs to use a lower transmission power. The PU’s secrecy rate of the UR-MCJTDT scheme is significantly better than that of the UR-MCJST scheme, while maintaining the same utility rates for the CJs. However, UR-MCJTDT can sometimes be inefficient in terms of resource utilization because the data are divided into discrete time slots, and each slot is allocated to a specific user for transmission. This means that even if a particular user has only a small amount of data to transmit, it still occupies a full time slot. In such cases, UR-MCJST performs well initially, but as the number of users increases, interference becomes a challenge. This creates a trade-off between time-division transmission, which ensures isolated time slots for each user but may use more resources, and simultaneous transmission, which maximizes resource utilization but risks increased interference with a higher user count. Furthermore, the secrecy rate of the benchmark scheme depends on the locations of the relay node and the CJs. However, the secrecy rate of the proposed UR-MCJTDT scheme is mainly influenced by the location of the relay node. The simulation results indicated that three CJs are sufficient to support a secure transmission when one untrusted relay is employed, as investigated in the proposed scheme. The optimum number of relaying nodes and CJs for a given system is worth further investigation in future work.

Author Contributions

This article was prepared through the collective efforts of all the authors. Conceptualization, N.Z., B.A., M.F.U.B., B.M.L. and S.X.N.; Critical review, N.Z., B.A., M.F.U.B., S.X.N. and M.A.J.; Writing—original draft, N.Z., B.A., M.F.U.B. and S.X.N.; Writing—review and editing, M.F.U.B., B.M.L., S.X.N. and M.A.J. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Korean government (MSIT) under grant NRF-2023R1A2C1002656 and was supported by the MSIT (Ministry of Science and ICT), Korea, under grant IITP-2023-RS-2022-00156345 (ICT Challenge and Advanced Network of HRD Program).

Data Availability Statement

Data is available upon request from the first author.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Zou, Y.; Zhu, J.; Wang, X.; Hanzo, L. A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends. Proc. IEEE 2016, 104, 1727–1765. [Google Scholar] [CrossRef]
  2. Shannon, C.E. Communication theory of secrecy systems. Bell Syst. Tech. J. 1949, 28, 656–715. [Google Scholar] [CrossRef]
  3. Wyner, A.D. The wiretap channel. Bell Syst. Tech. J. 1975, 54, 1355–1387. [Google Scholar] [CrossRef]
  4. Csiszar, J.; Korner, J. Broadcast channels with confidential messages. IEEE Trans. Inf. Theory 1978, 24, 339–348. [Google Scholar] [CrossRef] [Green Version]
  5. Mucchi, L.; Jayousi, S.; Caputo, S.; Panayirci, E.; Shahabuddin, S.; Bechtold, J.; Morales, I.; Stoica, R.A.; Abreu, G.; Haas, H. Physical-Layer Security in 6G Networks. IEEE Open J. Commun. Soc. 2021, 2, 1901–1914. [Google Scholar] [CrossRef]
  6. Yang, N.; Wang, L.; Geraci, G.; Elkashlan, M.; Yuan, J.; Renzo, M.D. Safeguarding 5G wireless communication networks using physical layer security. IEEE Commun. Mag. 2015, 53, 20–27. [Google Scholar] [CrossRef]
  7. Kong, Z.; Yang, S.; Wang, D.; Hanzo, L. Robust Beamforming and Jamming for Enhancing the Physical Layer Security of Full Duplex Radios. IEEE Trans. Inf. Forensics Secur. 2019, 14, 3151–3159. [Google Scholar] [CrossRef] [Green Version]
  8. Zhang, J.; Rajendran, S.; Sun, Z.; Woods, R.; Hanzo, L. Physical Layer Security for the Internet of Things: Authentication and Key Generation. IEEE Wirel. Commun. 2019, 26, 92–98. [Google Scholar] [CrossRef] [Green Version]
  9. Tekin, E.; Yener, A. The general Gaussian multiple-access and two-way wiretap channels: Achievable rates and Cooperative Jamming. IEEE Trans. Inf. Theory 2008, 54, 2735–2751. [Google Scholar] [CrossRef] [Green Version]
  10. Zhou, X.; Tao, M.; Kennedy, R. Cooperative jamming for secrecy in decentralized wireless networks. In Proceedings of the IEEE International Conference on Communications (ICC), Ottawa, ON, Canada, 10–15 June 2012; pp. 2339–2344. [Google Scholar] [CrossRef]
  11. Zhou, Y.; Yeoh, P.L.; Chen, H.; Li, Y.; Schober, R.; Zhuo, L.; Vucetic, B. Improving Physical Layer Security via a UAV Friendly Jammer for Unknown Eavesdropper Location. IEEE Trans. Veh. Technol. 2018, 67, 11280–11284. [Google Scholar] [CrossRef]
  12. Li, A.; Wu, Q.; Zhang, R. UAV-enabled cooperative jamming for improving secrecy of ground wiretap channel. IEEE Wirel. Commun. Lett. 2018, 8, 181–184. [Google Scholar] [CrossRef] [Green Version]
  13. Sun, X.; Ng, D.W.K.; Ding, Z.; Xu, Y.; Zhong, Z. Physical layer security in UAV systems: Challenges and opportunities. arXiv 2019, arXiv:1909.06785. [Google Scholar] [CrossRef] [Green Version]
  14. Sendonaris, A.; Erkip, E.; Aazhang, B. User Cooperation Diversity Part I: System Description. IEEE Trans. Commun. 2003, 51, 1927–1938. [Google Scholar] [CrossRef] [Green Version]
  15. Laneman, N.; Tse, D.N.C.; Wornell, G.W. Cooperative diversity in wireless networks: Efficient protocols and outage behavior. IEEE Trans. Inf. Theory 2004, 50, 3062–3080. [Google Scholar] [CrossRef]
  16. Dohler, M.; Li, Y. Cooperative Communications: Hardware, Channel and PHY; John Wiley: Hoboken, NJ, USA, 2009. [Google Scholar]
  17. Ng, S.X.; Li, Y.; Vucetic, B.; Hanzo, L. Distributed Irregular Codes Relying on Decode-and-Forward Relays as Code Components. IEEE Trans. Veh. Technol. 2015, 64, 4579–4588. [Google Scholar] [CrossRef] [Green Version]
  18. Khan, A.U.; Abbas, G.; Abbas, Z.H.; Bilal, M.; Shah, S.C.; Song, H. Reliability Analysis of Cognitive Radio Networks With Reserved Spectrum for 6G-IoT. IEEE Trans. Netw. Serv. Manag. 2022, 19, 2726–2737. [Google Scholar] [CrossRef]
  19. Khan, A.U.; Abbas, G.; Abbas, Z.H.; Khan, W.U.; Waqas, M. Spectrum utilization efficiency in CRNs with hybrid spectrum access and channel reservation: A comprehensive analysis under prioritized traffic. Future Gener. Comput. Syst. 2021, 125, 726–742. [Google Scholar] [CrossRef]
  20. Haykin, S. Cognitive radio: Brain-empowered wireless communications. IEEE J. Sel. Areas Commun. 2005, 23, 201–220. [Google Scholar] [CrossRef]
  21. Chen, Y.; Yu, G.; Zhang, Z.; Chen, H.; Qiu, P. On cognitive radio networks with opportunistic power control strategies in fading channels. IEEE Trans. Wirel. Commun. 2008, 7, 2752–2761. [Google Scholar] [CrossRef]
  22. Letaief, K.B.; Zhang, W. Cooperative Communications for Cognitive Radio Networks. Proc. IEEE 2009, 97, 878–893. [Google Scholar] [CrossRef] [Green Version]
  23. Goldsmith, A.; Jafar, S.A.; Maric, I.; Srinivasa, S. Breaking Spectrum Gridlock With Cognitive Radios: An Information Theoretic Perspective. Proc. IEEE 2009, 97, 894–914. [Google Scholar] [CrossRef]
  24. Zaidi, S.A.R.; McLernon, D.C.; Ghogho, M. Breaking the Area Spectral Efficiency Wall in Cognitive Underlay Networks. IEEE J. Sel. Areas Commun. 2014, 32, 2205–2221. [Google Scholar] [CrossRef]
  25. Nie, J.; Luo, J.; Xiong, Z.; Niyato, D.; Wang, P. A Stackelberg Game Approach Toward Socially-Aware Incentive Mechanisms for Mobile Crowdsensing. IEEE Trans. Wirel. Commun. 2019, 18, 724–738. [Google Scholar] [CrossRef]
  26. Li, F.; Yao, H.; Du, J.; Jiang, C.; Qian, Y. Stackelberg Game-Based Computation Offloading in Social and Cognitive Industrial Internet of Things. IEEE Trans. Ind. Inform. 2020, 16, 5444–5455. [Google Scholar] [CrossRef]
  27. Tang, L.; Chen, H.; Li, Q. Social Tie Based Cooperative Jamming for Physical Layer Security. IEEE Commun. Lett. 2015, 19, 1790–1793. [Google Scholar] [CrossRef]
  28. Krikidis, I.; Thompson, J.S.; McLaughlin, S. Relay selection for secure cooperative networks with jamming. IEEE Trans. Wirel. Commun. 2009, 8, 5003–5011. [Google Scholar] [CrossRef]
  29. Bao, V.N.Q.; Linh-Trung, N.; Debbah, M. Relay selection schemes for dual-hop networks under security constraints with multiple eavesdroppers. IEEE Trans. Wirel. Commun. 2013, 12, 6076–6085. [Google Scholar] [CrossRef] [Green Version]
  30. Dong, L.; Han, Z.; Petropulu, A.P.; Poor, H.V. Improving wireless physical layer security via cooperating relays. IEEE Trans. Signal Process. 2010, 58, 1875–1888. [Google Scholar] [CrossRef]
  31. Liang, W.; Ng, S.X.; Hanzo, L. Cooperative Overlay Spectrum Access in Cognitive Radio Networks. IEEE Commun. Surv. Tutor. 2017, 19, 1924–1944. [Google Scholar] [CrossRef] [Green Version]
  32. Ali, B.; Zamir, N.; Butt, M.F.U.; Ng, S.X. Physical layer security: Friendly jamming in an untrusted relay scenario. In Proceedings of the 2016 24th European Signal Processing Conference (EUSIPCO), Budapest, Hungary, 28 August–2 September 2016; pp. 958–962. [Google Scholar] [CrossRef] [Green Version]
  33. Ali, B.; Zamir, N.; Ng, S.X.; Butt, M.F.U. Distributed Matching Algorithms: Maximizing Secrecy in the Presence of Untrusted Relay. Radioengineering 2017, 26, 601–610. [Google Scholar] [CrossRef]
  34. Saad, W.; Zhou, X.; Maham, B.; Basar, T.; Poor, H.V. Tree Formation with Physical Layer Security Considerations in Wireless Multi-Hop Networks. IEEE Trans. Wirel. Commun. 2012, 11, 3980–3991. [Google Scholar] [CrossRef] [Green Version]
  35. He, X.; Yener, A. Cooperation with an untrusted relay: A secrecy perspective. IEEE Trans. Inf. Theory 2010, 56, 3807–3827. [Google Scholar] [CrossRef] [Green Version]
  36. Moya Osorio, D.P.; Alves, H.; Benitez Olivo, E.E. On the Secrecy Performance and Power Allocation in Relaying Networks With Untrusted Relay in the Partial Secrecy Regime. IEEE Trans. Inf. Forensics Secur. 2020, 15, 2268–2281. [Google Scholar] [CrossRef] [Green Version]
  37. Kuhestani, A.; Mohammadi, A.; Yeoh, P.L. Optimal Power Allocation and Secrecy Sum Rate in Two-Way Untrusted Relaying Networks With an External Jammer. IEEE Trans. Commun. 2018, 66, 2671–2684. [Google Scholar] [CrossRef]
  38. Zhao, R.; Tan, X.; Chen, D.H.; He, Y.C.; Ding, Z. Secrecy Performance of Untrusted Relay Systems With a Full-Duplex Jamming Destination. IEEE Trans. Veh. Technol. 2018, 67, 11511–11524. [Google Scholar] [CrossRef]
  39. Jiang, W.; Gong, Y.; Xiao, Q.; Liao, Y. Secrecy Rate Maximization for Untrusted Relay Networks With Nonorthogonal Cooperative Transmission Protocols. IEEE Trans. Veh. Technol. 2018, 67, 6325–6339. [Google Scholar] [CrossRef]
  40. Sun, L.; Zhang, T.; Li, Y.; Niu, H. Performance study of two-hop amplify-and-forward systems with untrustworthy relay nodes. IEEE Trans. Veh. Technol. 2012, 61, 3801–3807. [Google Scholar] [CrossRef]
  41. Yan, S.; Yang, N.; Land, I.; Malaney, R.; Yuan, J. Three Artificial-Noise-Aided Secure Transmission Schemes in Wiretap Channels. IEEE Trans. Veh. Technol. 2018, 67, 3669–3673. [Google Scholar] [CrossRef] [Green Version]
  42. Lai, L.; Gamal, H.L. The relay–eavesdropper channel: Cooperation for secrecy. IEEE Trans. Inf. Theory 2008, 54, 4005–4019. [Google Scholar] [CrossRef]
  43. Ekrem, E.; Ulukus, S. Secrecy in cooperative relay broadcast channels. IEEE Trans. Inf. Theory 2011, 57, 137–155. [Google Scholar] [CrossRef] [Green Version]
  44. Khodakarami, H.; Lahouti, F. Link Adaptation with Untrusted Relay Assignment: Design and Performance Analysis. IEEE Trans. Commun. 2013, 61, 4874–4883. [Google Scholar] [CrossRef]
  45. Sun, L.; Ren, P.; Du, Q.; Wang, Y.; Gao, Z. Security-Aware Relaying Scheme for Cooperative Networks With Untrusted Relay Nodes. IEEE Commun. Lett. 2015, 19, 463–466. [Google Scholar] [CrossRef]
  46. Wu, Y.; Liu, K.J.R. An Information Secrecy Game in Cognitive Radio Networks. IEEE Trans. Inf. Forensics Secur. 2011, 6, 831–842. [Google Scholar] [CrossRef] [Green Version]
  47. Zhang, R.; Song, L.; Han, Z.; Jiao, B. Physical Layer Security for Two-Way Untrusted Relaying With Friendly Jammers. IEEE Trans. Veh. Technol. 2012, 61, 3693–3704. [Google Scholar] [CrossRef]
  48. Stanojev, I.; Yener, A. Improving Secrecy Rate via Spectrum Leasing for Friendly Jamming. IEEE Trans. Wirel. Commun. 2013, 12, 134–145. [Google Scholar] [CrossRef] [Green Version]
  49. Al-Talabani, A.; Deng, Y.; Nallanathan, A.; Nguyen, H.X. Enhancing Secrecy Rate in Cognitive Radio Networks via Multilevel Stackelberg Game. IEEE Commun. Lett. 2016, 20, 1112–1115. [Google Scholar] [CrossRef] [Green Version]
  50. Jeon, H.; McLaughlin, S.W.; Kim, I.M.; Ha, J. Secure Communications with Untrusted Secondary Nodes in Cognitive Radio Networks. IEEE Trans. Wirel. Commun. 2014, 13, 1790–1805. [Google Scholar] [CrossRef]
  51. Zamir, N.; Ali, B.; Butt, M.F.U.; Ng, S.X. Improving secrecy rate via cooperative jamming based on Nash Equilibrium. In Proceedings of the 24th European Signal Processing Conference (EUSIPCO), Budapest, Hungary, 28 August–2 September 2016; pp. 235–239. [Google Scholar] [CrossRef] [Green Version]
  52. Moradikia, M.; Bastami, H.; Kuhestani, A.; Behroozi, H.; Hanzo, L. Cooperative Secure Transmission Relying on Optimal Power Allocation in the Presence of Untrusted Relays, A Passive Eavesdropper and Hardware Impairments. IEEE Access 2019, 7, 116942–116964. [Google Scholar] [CrossRef]
  53. Izanlou, M.; Mohammadi, A.; Dosaranian-Moghadam, M. Impact of imperfect channel state information on the physical layer security in D2D wireless networks using untrusted relays. Wirel. Pers. Commun. 2021, 116, 341–368. [Google Scholar] [CrossRef]
  54. Hayajneh, M.; Gulliver, T.A. Physical Layer Security in Two-Way SWIPT Relay Networks with Imperfect CSI and a Friendly Jammer. Entropy 2023, 25, 122. [Google Scholar] [CrossRef]
  55. Ali, B. Rate Optimization and Resource Allocation in Cooperative Cognitive Radio Networks. Ph.D. Thesis, COMSATS Institute of Information Technology Islamabad, Islamabad, Pakistan, 2017. [Google Scholar]
  56. Ochiai, P.M.H.; Tarokh, V. Design and analysis of collaborative diversity protocols for wireless sensor networks. In Proceedings of the IEEE Vehicular Technology Conference, (VTC-04 Fall), Los Angeles, CA, USA, 26–29 September 2004; pp. 4645–4649. [Google Scholar] [CrossRef]
  57. Osborne, M.J.; Rubenstein, A. A Course in Game Theory; MIT Press: Cambridge, MA, USA, 1994. [Google Scholar]
  58. Simeone, O.; Stanojev, I.; Savazzi, S.; Bar-Ness, Y.; Spagnolini, U.; Pickholtz, R. Spectrum Leasing to Cooperating Secondary Ad Hoc Networks. IEEE J. Sel. Areas Commun. 2008, 26, 203–213. [Google Scholar] [CrossRef]
Figure 1. Classification structure for secure communication networks based on Table 1.
Figure 1. Classification structure for secure communication networks based on Table 1.
Applsci 13 07863 g001
Figure 2. System model for cooperative jamming.
Figure 2. System model for cooperative jamming.
Applsci 13 07863 g002
Figure 3. Stackelberg interaction between the PU (leader) and the cooperative jamming node (follower).
Figure 3. Stackelberg interaction between the PU (leader) and the cooperative jamming node (follower).
Applsci 13 07863 g003
Figure 4. UR-MCJST scenario with specified locations. S is at ( 0 , 0 ) , R is at ( 25 , 25 ) and D is at ( 50 , 50 ) while C J 1 is mobile, C J 2 is at ( 22 , 43 ) and C J 3 is at ( 26 , 50 ) , α = 0.65 and β = 1 . (a) The secrecy rate with reference to the location of the mobile jammer. (b) Average utility rate for the mobile jammer.
Figure 4. UR-MCJST scenario with specified locations. S is at ( 0 , 0 ) , R is at ( 25 , 25 ) and D is at ( 50 , 50 ) while C J 1 is mobile, C J 2 is at ( 22 , 43 ) and C J 3 is at ( 26 , 50 ) , α = 0.65 and β = 1 . (a) The secrecy rate with reference to the location of the mobile jammer. (b) Average utility rate for the mobile jammer.
Applsci 13 07863 g004
Figure 5. UR-MCJTDT scenario with specified locations. S is at ( 0 , 0 ) , R is at ( 25 , 25 ) and D is at the location ( 50 , 50 ) while C J 1 is mobile, C J 2 is at ( 22 , 43 ) and C J 3 is at ( 26 , 50 ) , α = 0.65 and β = 1 . (a) The secrecy rate with reference to the location of mobile Jammer. (b) Average utility rate for the mobile jammer.
Figure 5. UR-MCJTDT scenario with specified locations. S is at ( 0 , 0 ) , R is at ( 25 , 25 ) and D is at the location ( 50 , 50 ) while C J 1 is mobile, C J 2 is at ( 22 , 43 ) and C J 3 is at ( 26 , 50 ) , α = 0.65 and β = 1 . (a) The secrecy rate with reference to the location of mobile Jammer. (b) Average utility rate for the mobile jammer.
Applsci 13 07863 g005
Figure 6. Optimized secrecy rate comparison with the baseline Stackelberg in [46] and the power control algorithm in [48].
Figure 6. Optimized secrecy rate comparison with the baseline Stackelberg in [46] and the power control algorithm in [48].
Applsci 13 07863 g006
Figure 7. Optimized utility rate per user comparison with the baseline Stackelberg in [46] and the power control algorithm in [48].
Figure 7. Optimized utility rate per user comparison with the baseline Stackelberg in [46] and the power control algorithm in [48].
Applsci 13 07863 g007
Table 1. Literature review comparison table (Here ✓ and ✗ refers to consideration and non-consideration of the scenario in the proposed work respectively).
Table 1. Literature review comparison table (Here ✓ and ✗ refers to consideration and non-consideration of the scenario in the proposed work respectively).
S/No.Related WorksRelayingUntrusted Relay ( UR ) / Eve ( E ) No. of Relays ( S / M )Cognitive Radio ( CR ) Simultaneous Transmission ( MCJST ) Time-Division Transmission ( MCJTDT ) Y { CJ i , t 1 } Is Known to the DJamming Node ( D / R / CJ / S )
1Krikidis et al. 2009 [28]ESR
2Dong et al. 2010 [30]EMR
3He et al. 2010 [35] U R S N / A
4Ekrem et al. 2011 [43]ES N / A
5Wu et al. 2011 [46]E C J
6Sun et al. 2012 [40] U R SD
7Zhang et al. 2012 [47] U R S C J
8Saad et al. 2012 [34]E N / A
9Khodakarami et al. 2013 [44] U R M N / A
10Bao et al. 2013 [29]ES N / A
11Stanojev et al. 2013 [48]ES C J
12Jeon et al. 2014 [50] S U act as a U R S N / A
13Sun et al. 2015 [45] U R SD
14Al-Talabani et al. 2016 [49]ES ( S C J S T ) C J
15Zamir et al. 2016 [51] U R S ( S C J C T ) C J
16Ali et al. 2017 [33] U R S C J
17Zhou et al. 2018 [11]E C J
18Li et al. 2018 [12]E C J
19Kuhestani et al. 2018 [37] U R M C J
20Zhao et al. 2018 [38] U R S C J
21Jiang et al. 2018 [39] U R SD
22Yan et al. 2018 [41]E N / A S
23Osorio et al. 2020 [36] U R SD
24Izanlou et al. 2021 [53] U R S C J
25Hayajneh et al. 2023 [54]ES C J
26Our proposed scheme U R S C J
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Zamir, N.; Ali, B.; Butt, M.F.U.; Javed, M.A.; Lee, B.M.; Ng, S.X. Cooperative Jamming-Assisted Untrusted Relaying Based on Game Theory for Next-Generation Communication Systems. Appl. Sci. 2023, 13, 7863. https://doi.org/10.3390/app13137863

AMA Style

Zamir N, Ali B, Butt MFU, Javed MA, Lee BM, Ng SX. Cooperative Jamming-Assisted Untrusted Relaying Based on Game Theory for Next-Generation Communication Systems. Applied Sciences. 2023; 13(13):7863. https://doi.org/10.3390/app13137863

Chicago/Turabian Style

Zamir, Nida, Bakhtiar Ali, Muhammad Fasih Uddin Butt, Muhammad Awais Javed, Byung Moo Lee, and Soon Xin Ng. 2023. "Cooperative Jamming-Assisted Untrusted Relaying Based on Game Theory for Next-Generation Communication Systems" Applied Sciences 13, no. 13: 7863. https://doi.org/10.3390/app13137863

APA Style

Zamir, N., Ali, B., Butt, M. F. U., Javed, M. A., Lee, B. M., & Ng, S. X. (2023). Cooperative Jamming-Assisted Untrusted Relaying Based on Game Theory for Next-Generation Communication Systems. Applied Sciences, 13(13), 7863. https://doi.org/10.3390/app13137863

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop