Relay Selection Schemes for Dual-Hop Networks under Security Constraints with Multiple Eavesdroppers

IEEE Transactions on Wireless Communications - Tập 12 Số 12 - Trang 6076-6085 - 2013
Vo Nguyen Quoc Bao1, Nguyen Linh-Trung2, Merouane Debbah3
1Department of Telecommunications, Posts and Telecommunications Institute of Technology, Ho Chi Minh City, Vietnam
2Faculty of Electronics and Telecommunications, Vietnam National University, Hanoi, Vietnam
3Alcatel-Lucent Chair on Flexible Radio, SUPELEC, Gif-sur-Yvette, France

Tóm tắt

In this paper, we study opportunistic relay selection in cooperative networks with secrecy constraints, where a number of eavesdropper nodes may overhear the source message. To deal with this problem, we consider three opportunistic relay selection schemes. The first scheme tries to reduce the overheard information at the eavesdroppers by choosing the relay having the lowest instantaneous signal-to-noise ratio (SNR) to them. The second scheme is conventional selection relaying that seeks the relay having the highest SNR to the destination. In the third scheme, we consider the ratio between the SNR of a relay and the maximum among the corresponding SNRs to the eavesdroppers, and then select the optimal one to forward the signal to the destination. The system performance in terms of probability of non-zero achievable secrecy rate, secrecy outage probability and achievable secrecy rate of the three schemes are analyzed and confirmed by Monte Carlo simulations.

Từ khóa

#Rayleigh fading #security constraints #achievable secrecy rate #secrecy outage probability #Shannon capacity #relay selection

Tài liệu tham khảo

10.1109/LCOMM.2006.1603370

10.1109/24.693785

roberts, 2004, Signals and Systems Analysis Using Transform Methods and MATLAB

papoulis, 2002, Probability random variables and stochastic processes

10.1109/LCOMM.2008.071987

10.1109/TWC.2009.081561

10.1109/LSP.2010.2092427

10.1109/TCOMM.2011.041111.100128

junsu, 2012, Combined relay selection and cooperative beamforming for physical layer security, J Commun Netw, 14, 364, 10.1109/JCN.2012.6292243

yupeng, 0, Relay selection and scaling law in destination assisted physical layer secrecy systems, Proc 2012 IEEE Statistical Signal Processing Workshop, 381

10.1049/iet-com.2011.0638

shi, 0, Relay self-selection for secure cooperative in amplify-and-forward networks, Proc 2012 International ICST Conference on Communications and Networking in China, 581

chunxiao, 0, Secrecy rates for relay selection in OFDMA networks, Proc 2011 International Conference on Communications and Mobile Computing, 158

10.1109/ICASSP.2011.5946995

gradshteyn, 2007, Table of Integrals Series and Products

10.1109/ISIT.2006.261613

yingbin, 2009, Compound wiretap channels, EURASIP J Wireless Commun, 2009, 1

10.1109/TIT.2008.928272

10.1109/ITA.2009.5044960

abramowitz, 1972, Handbook of Mathematical Functions with Formulas Graphs and Mathematical Tables

dong, 0, Secure wireless communications via cooperation, Proc 2008 Allerton Conference on Communication Control and Computing, 1132

10.1109/LSP.2012.2195490

10.1109/TIFS.2009.2020776

10.1109/TIT.2004.838089

10.1049/el:20073267

10.1109/MCOM.2004.1341264

li, 0, Research on secrecy capacity oriented relay selection for mobile cooperative networks, Proc 2011 IEEE International Conference on Cloud Computing and Intelligence Systems, 443

10.1109/TWC.2009.090323

10.1109/TSP.2012.2235433

10.1109/TWC.2007.06020050

10.1049/iet-com.2009.0634

10.1109/18.720551

10.1109/TIT.2007.905002