• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

Opportunistic relay selection for cooperative networks with secrecy constraints (2010)

by I Krikidis
Venue:IET Communications
Add To MetaCart

Tools

Sorted by:
Results 1 - 10 of 11
Next 10 →

Secure communication via an untrusted non-regenerative relay in fading channels

by Jing Huang, Student Member, Amitav Mukherjee, A. Lee Swindlehurst - IEEE Trans. Signal Process , 2013
"... Abstract—We investigate a relay network where the source can potentially utilize an untrusted non-regenerative relay to augment its direct transmission of a confidential message to the destination. Since the relay is untrusted, it is desirable to protect the confiden-tial data from it while simultan ..."
Abstract - Cited by 9 (6 self) - Add to MetaCart
Abstract—We investigate a relay network where the source can potentially utilize an untrusted non-regenerative relay to augment its direct transmission of a confidential message to the destination. Since the relay is untrusted, it is desirable to protect the confiden-tial data from it while simultaneously making use of it to increase the reliability of the transmission. We first examine the secrecy outage probability (SOP) of the network assuming a single antenna relay, and calculate the exact SOP for three different schemes: di-rect transmission without using the relay, conventional non-regen-erative relaying, and cooperative jamming by the destination. Sub-sequently, we conduct an asymptotic analysis of the SOPs to deter-mine the optimal policies in different operating regimes. We then generalize to the multi-antenna relay case and investigate the im-pact of the number of relay antennas on the secrecy performance. Finally, we study a scenario where the relay has only a single RF chain which necessitates an antenna selection scheme, and we show that unlike the case where all antennas are used, under certain conditions the cooperative jamming scheme with antenna selection provides a diversity advantage for the receiver. Numerical results are presented to verify the theoretical predictions of the preferred transmission policies. Index Terms—Cooperative jamming, outage probability, phys-ical layer security, relay networks, wiretap channel. I.

Energy Efficiency of Cooperative Jamming Strategies in Secure Wireless Networks

by Mostafa Dehghan, Dennis L. Goeckel, Majid Ghaderi, Zhiguo Ding
"... Energy efficient secure communication in wireless networks in the presence of eavesdroppers is considered. For a secure transmission to the destination, a set of intermediate “jammer ” nodes are chosen to generate artificial noise that confuses the eavesdropper. We consider two jamming strategies: b ..."
Abstract - Cited by 8 (2 self) - Add to MetaCart
Energy efficient secure communication in wireless networks in the presence of eavesdroppers is considered. For a secure transmission to the destination, a set of intermediate “jammer ” nodes are chosen to generate artificial noise that confuses the eavesdropper. We consider two jamming strategies: beamforming and cooperative diversity. Previous research has focused largely on cooperative beamforming strategies, but we demonstrate a number of scenarios where a cooperative diversity strategy is desirable. This motivates approaches which selectively switch between the two strategies, from which significant energy savings can often be realized. In our simulations, energy savings of up to 60 % are observed in the simulated networks.

1Relay Selection Schemes for Dual-Hop Networks under Security Constraints with Multiple Eavesdroppers

by Vo Nguyen, Quoc Bao, Nguyen Linh-trung, Senior Member
"... Abstract—In this paper, we study opportunistic relay selection in cooperative networks with secrecy constraints, where a number of eavesdropper nodes may overhear the source message. To deal with this problem, we consider three opportunistic relay selection schemes. The first scheme tries to reduce ..."
Abstract - Cited by 5 (0 self) - Add to MetaCart
Abstract—In this paper, we study opportunistic relay selection in cooperative networks with secrecy constraints, where a number of eavesdropper nodes may overhear the source message. To deal with this problem, we consider three opportunistic relay selection schemes. The first scheme tries to reduce the overheard information at the eavesdroppers by choosing the relay having the lowest instantaneous signal-to-noise ratio (SNR) to them. The second scheme is conventional selection relaying that seeks the relay having the highest SNR to the destination. In the third scheme, we consider the ratio between the SNR of a relay and the maximum among the corresponding SNRs to the eavesdroppers, and then select the optimal one to forward the signal to the destination. The system performance in terms of probability of non-zero achievable secrecy rate, secrecy outage probability and achievable secrecy rate of the three schemes are analyzed and confirmed by Monte Carlo simulations. Index Terms—Rayleigh fading, security constraints, achievable secrecy rate, secrecy outage probability, Shannon capacity, relay selection. I.
(Show Context)

Citation Context

...ecrecy rates of a Gaussian wiretap channel. In [22], Krikidis et al. proposed a new relay selection scheme to improve the Shannon capacity of confidential links by using a jamming technique. Then, in =-=[23]-=-, by taking into account of the relay-eavesdropper links in the relay selection metric, they also introduced an efficient way to select the best relay and its performance in terms of secrecy outage pr...

Secure Multiuser Communications in Multiple Amplify-and-Forward Relay Networks

by Lisheng Fan, Xianfu Lei, Trung Q. Duong, Senior Member, Maged Elkashlan, George K. Karagiannidis , 2014
"... Abstract—This paper proposes relay selection to increase the physical layer security in multiuser cooperative relay networks with multiple amplify-and-forward relays, in the presence of mul-tiple eavesdroppers. To strengthen the network security against eavesdropping attack, we present three criteri ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
Abstract—This paper proposes relay selection to increase the physical layer security in multiuser cooperative relay networks with multiple amplify-and-forward relays, in the presence of mul-tiple eavesdroppers. To strengthen the network security against eavesdropping attack, we present three criteria to select the best relay and user pair. Specifically, criteria I and II study the re-ceived signal-to-noise ratio (SNR) at the receivers, and perform the selection by maximizing the SNR ratio of the user to the eavesdroppers. To this end, criterion I relies on both the main and eavesdropper links, while criterion II relies on the main links only. Criterion III is the standard max-min selection criterion, which maximizes the minimum of the dual-hop channel gains of main links. For the three selection criteria, we examine the system secrecy performance by deriving the analytical expressions for the secrecy outage probability. We also derive the asymptotic analysis

A Class of Selection Criteria Achieving Full Diversity in AF Opportunistic Relaying

by Xu Chen, Ting-wai Siu, Qing F. Zhou, Francis C. M. Lau
"... Abstract—The way to select the “best ” relay for forwarding the received signal to the destination is critical in opportunistic relaying. In this paper, we analyze the asymptotic outage probability of the amplify-and-forward opportunistic relaying (AF-OR) under a generalized selection criterion term ..."
Abstract - Add to MetaCart
Abstract—The way to select the “best ” relay for forwarding the received signal to the destination is critical in opportunistic relaying. In this paper, we analyze the asymptotic outage probability of the amplify-and-forward opportunistic relaying (AF-OR) under a generalized selection criterion termed as the max-generalized-mean (MGM) selection criterion. We show that this generalized selection framework can be regarded as a class of selection criteria achieving full diversity in the AF-OR, encompassing the conventional selection criteria as special cases. The asymptotic outage probability can be further minimized by optimizing the parameters associated with the MGM selection criterion. It is shown that under this generalized selection framework, the conventional max-min selection criterion is optimal for the AF-OR in the sense that it achieves the minimum outage probability. I.
(Show Context)

Citation Context

...and distributed opportunistic relaying approach has been proposed to select the “best” relay for forwarding the signal from the source instead of utilizing all relays to transmit at the same time [4] =-=[5]-=-. It is shown that the opportunistic relaying can achieve the same diversitymultiplexing tradeoff as the distributed space-time coding. Furthermore, the opportunistic relaying adapts itself to the dis...

Transactions on Communications Secure Switch-and-Stay Combining (SSSC) for Cognitive Relay Networks

by Lisheng Fan, Shengli Zhang, Trung Q. Duong, Senior Member, George K. Karagiannidis
"... Abstract—In this paper, we study a two-phase underlay cog-nitive relay network, where there exists an eavesdropper who can overhear the message. The secure data transmission from the secondary source to secondary destination is assisted by two decode-and-forward (DF) relays. Although the traditional ..."
Abstract - Add to MetaCart
Abstract—In this paper, we study a two-phase underlay cog-nitive relay network, where there exists an eavesdropper who can overhear the message. The secure data transmission from the secondary source to secondary destination is assisted by two decode-and-forward (DF) relays. Although the traditional opportunistic relaying technique can choose one relay to provide the best secure performance, it needs to continuously have the channel state information (CSI) of both relays, and may result in a high relay switching rate. To overcome these limitations, a secure switch-and-stay combining (SSSC) protocol is proposed where only one out of the two relays is activated to assist the secure data transmission, and the secure relay switching occurs when the relay cannot support the secure communication any longer. This security switching is assisted by either instantaneous or statistical eavesdropping CSI. For these two cases, we study the system secure performance of SSSC protocol, by deriving the analytical secrecy outage probability as well as an asymptotic expression for the high main-to-eavesdropper ratio (MER) region. We show that SSSC can substantially reduce the system com-plexity while achieving or approaching the full diversity order of opportunistic relaying in the presence of the instantaneous or statistical eavesdropping CSI. Index Terms—Secure switch-and-stay combining (SSSC), cog-nitive relay networks, secure communication, diversity order. I.
(Show Context)

Citation Context

...relay network has been studied in [12], and it is found that the placement of the DF relay can also affect the system secure metrics, such as secrecy capacity and SOP. For multiuser DF relay networks =-=[13]-=-, opportunistic relaying can be used to exploit the channel fluctuation among relays, and hence the full diversity of wireless system can be achieved. To further enhance the network security, the othe...

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, ACCEPTED FOR PUBLICATION 1 Relay Selection Schemes for Dual-Hop Networks under Security Constraints with Multiple Eavesdroppers

by Vo Nguyen, Quoc Bao, Nguyen Linh-trung, Senior Member, Senior Member
"... Abstract—In this paper, we study opportunistic relay selection in cooperative networks with secrecy constraints, where a num-ber of eavesdropper nodes may overhear the source message. To deal with this problem, we consider three opportunistic relay selection schemes. The first scheme tries to reduce ..."
Abstract - Add to MetaCart
Abstract—In this paper, we study opportunistic relay selection in cooperative networks with secrecy constraints, where a num-ber of eavesdropper nodes may overhear the source message. To deal with this problem, we consider three opportunistic relay selection schemes. The first scheme tries to reduce the overheard information at the eavesdroppers by choosing the relay having the lowest instantaneous signal-to-noise ratio (SNR) to them. The second scheme is conventional selection relaying that seeks the relay having the highest SNR to the destination. In the third scheme, we consider the ratio between the SNR of a relay and the maximum among the corresponding SNRs to the eavesdroppers, and then select the optimal one to forward the signal to the destination. The system performance in terms of probability of non-zero achievable secrecy rate, secrecy outage probability and achievable secrecy rate of the three schemes are analyzed and confirmed by Monte Carlo simulations. Index Terms—Rayleigh fading, security constraints, achievable secrecy rate, secrecy outage probability, Shannon capacity, relay selection. I.
(Show Context)

Citation Context

...ecrecy rates of a Gaussian wiretap channel. In [22], Krikidis et al. proposed a new relay selection scheme to improve the Shannon capacity of confidential links by using a jamming technique. Then, in =-=[23]-=-, by taking into account of the relay-eavesdropper links in the relay selection metric, they also introduced an efficient way to select the best relay and its performance in terms of secrecy outage pr...

Secure Multiuser Multiple Amplify-and-Forward Relay Networks in Presence of Multiple Eavesdroppers

by Lisheng Fan, Xianfu Lei, Trung Q. Duong, Maged Elkashlan, George K. Karagiannidis
"... Abstract—In this paper, we study the information-theoretical security of a downlink multiuser cooperative relaying network with multiple intermediate amplify-and-forward (AF) relays, where there exist multiple eavesdroppers which can overhear the message. To prevent the wiretap and strength the netw ..."
Abstract - Add to MetaCart
Abstract—In this paper, we study the information-theoretical security of a downlink multiuser cooperative relaying network with multiple intermediate amplify-and-forward (AF) relays, where there exist multiple eavesdroppers which can overhear the message. To prevent the wiretap and strength the network security, we select one best relay and user pair, so that the selected user can receive the message from the base station assisted by the selected relay. The relay and user selection is performed by maximizing the ratio of the received signal-to-noise ratio (SNR) at the user to the eavesdroppers, which is based on both the main and eavesdropper links. For the considered system, we derive the closed-form expression of the secrecy outage probability, and provide the asymptotic expression in high main-to-eavesdropper ratio (MER) region. From the asymptotic analysis, we can find that the system diversity order is equivalent to the number of relays regardless of the number of users and eavesdroppers. I.
(Show Context)

Citation Context

...he physical layer security of a cooperative DF relaying network in [14], and pointed out that the relay placement could affect the system secrecy outage probability substantially. The authors in [15]–=-=[17]-=- studied the information-theoretical security of cooperative networks with multiple DF relays, and applied relay selection to enhance the system security by exploiting the channel fluctuation among re...

1Secure Communication Via an Untrusted Non-Regenerative Relay in Fading Channels

by Jing Huang, Amitav Mukherjee, A. Lee Swindlehurst
"... We investigate a relay network where the source can potentially utilize an untrusted non-regenerative relay to augment its direct transmission of a confidential message to the destination. Since the relay is untrusted, it is desirable to protect the confidential data from it while simultaneously mak ..."
Abstract - Add to MetaCart
We investigate a relay network where the source can potentially utilize an untrusted non-regenerative relay to augment its direct transmission of a confidential message to the destination. Since the relay is untrusted, it is desirable to protect the confidential data from it while simultaneously making use of it to increase the reliability of the transmission. We first examine the secrecy outage probability (SOP) of the network assuming a single antenna relay, and calculate the exact SOP for three different schemes: direct transmission without using the relay, conventional non-regenerative relaying, and cooperative jamming by the destination. Subsequently, we conduct an asymptotic analysis of the SOPs to determine the optimal policies in different operating regimes. We then generalize to the multi-antenna relay case and investigate the impact of the number of relay antennas on the secrecy performance. Finally, we study a scenario where the relay has only a single RF chain which necessitates an antenna selection scheme, and we show that unlike the case where all antennas are used, under certain conditions the cooperative jamming scheme with antenna selection provides a diversity advantage for the receiver. Numerical results are presented to verify the theoretical predictions of the preferred transmission policies.

unknown title

by Xiaojun Sun, Chunming Zhao
"... ar ..."
Abstract - Add to MetaCart
Abstract not found
(Show Context)

Citation Context

...TION Due to the broadcast nature of the transmission medium, wireless communications cause serious security issues in practice. Information-theoretic security has received much attention recently [1]-=-=[9]-=-. The information-theoretic security was pioneered by Wyner [1]. Later, the work in [2][3] extended Wyner’s work to broadcast channels and Gaussian channels, respectively. Recently, the information-th...

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University