Results 1 - 10
of
11
Secure communication via an untrusted non-regenerative relay in fading channels
- IEEE Trans. Signal Process
, 2013
"... Abstract—We investigate a relay network where the source can potentially utilize an untrusted non-regenerative relay to augment its direct transmission of a confidential message to the destination. Since the relay is untrusted, it is desirable to protect the confiden-tial data from it while simultan ..."
Abstract
-
Cited by 9 (6 self)
- Add to MetaCart
Abstract—We investigate a relay network where the source can potentially utilize an untrusted non-regenerative relay to augment its direct transmission of a confidential message to the destination. Since the relay is untrusted, it is desirable to protect the confiden-tial data from it while simultaneously making use of it to increase the reliability of the transmission. We first examine the secrecy outage probability (SOP) of the network assuming a single antenna relay, and calculate the exact SOP for three different schemes: di-rect transmission without using the relay, conventional non-regen-erative relaying, and cooperative jamming by the destination. Sub-sequently, we conduct an asymptotic analysis of the SOPs to deter-mine the optimal policies in different operating regimes. We then generalize to the multi-antenna relay case and investigate the im-pact of the number of relay antennas on the secrecy performance. Finally, we study a scenario where the relay has only a single RF chain which necessitates an antenna selection scheme, and we show that unlike the case where all antennas are used, under certain conditions the cooperative jamming scheme with antenna selection provides a diversity advantage for the receiver. Numerical results are presented to verify the theoretical predictions of the preferred transmission policies. Index Terms—Cooperative jamming, outage probability, phys-ical layer security, relay networks, wiretap channel. I.
Energy Efficiency of Cooperative Jamming Strategies in Secure Wireless Networks
"... Energy efficient secure communication in wireless networks in the presence of eavesdroppers is considered. For a secure transmission to the destination, a set of intermediate “jammer ” nodes are chosen to generate artificial noise that confuses the eavesdropper. We consider two jamming strategies: b ..."
Abstract
-
Cited by 8 (2 self)
- Add to MetaCart
Energy efficient secure communication in wireless networks in the presence of eavesdroppers is considered. For a secure transmission to the destination, a set of intermediate “jammer ” nodes are chosen to generate artificial noise that confuses the eavesdropper. We consider two jamming strategies: beamforming and cooperative diversity. Previous research has focused largely on cooperative beamforming strategies, but we demonstrate a number of scenarios where a cooperative diversity strategy is desirable. This motivates approaches which selectively switch between the two strategies, from which significant energy savings can often be realized. In our simulations, energy savings of up to 60 % are observed in the simulated networks.
1Relay Selection Schemes for Dual-Hop Networks under Security Constraints with Multiple Eavesdroppers
"... Abstract—In this paper, we study opportunistic relay selection in cooperative networks with secrecy constraints, where a number of eavesdropper nodes may overhear the source message. To deal with this problem, we consider three opportunistic relay selection schemes. The first scheme tries to reduce ..."
Abstract
-
Cited by 5 (0 self)
- Add to MetaCart
(Show Context)
Abstract—In this paper, we study opportunistic relay selection in cooperative networks with secrecy constraints, where a number of eavesdropper nodes may overhear the source message. To deal with this problem, we consider three opportunistic relay selection schemes. The first scheme tries to reduce the overheard information at the eavesdroppers by choosing the relay having the lowest instantaneous signal-to-noise ratio (SNR) to them. The second scheme is conventional selection relaying that seeks the relay having the highest SNR to the destination. In the third scheme, we consider the ratio between the SNR of a relay and the maximum among the corresponding SNRs to the eavesdroppers, and then select the optimal one to forward the signal to the destination. The system performance in terms of probability of non-zero achievable secrecy rate, secrecy outage probability and achievable secrecy rate of the three schemes are analyzed and confirmed by Monte Carlo simulations. Index Terms—Rayleigh fading, security constraints, achievable secrecy rate, secrecy outage probability, Shannon capacity, relay selection. I.
Secure Multiuser Communications in Multiple Amplify-and-Forward Relay Networks
, 2014
"... Abstract—This paper proposes relay selection to increase the physical layer security in multiuser cooperative relay networks with multiple amplify-and-forward relays, in the presence of mul-tiple eavesdroppers. To strengthen the network security against eavesdropping attack, we present three criteri ..."
Abstract
-
Cited by 1 (1 self)
- Add to MetaCart
Abstract—This paper proposes relay selection to increase the physical layer security in multiuser cooperative relay networks with multiple amplify-and-forward relays, in the presence of mul-tiple eavesdroppers. To strengthen the network security against eavesdropping attack, we present three criteria to select the best relay and user pair. Specifically, criteria I and II study the re-ceived signal-to-noise ratio (SNR) at the receivers, and perform the selection by maximizing the SNR ratio of the user to the eavesdroppers. To this end, criterion I relies on both the main and eavesdropper links, while criterion II relies on the main links only. Criterion III is the standard max-min selection criterion, which maximizes the minimum of the dual-hop channel gains of main links. For the three selection criteria, we examine the system secrecy performance by deriving the analytical expressions for the secrecy outage probability. We also derive the asymptotic analysis
A Class of Selection Criteria Achieving Full Diversity in AF Opportunistic Relaying
"... Abstract—The way to select the “best ” relay for forwarding the received signal to the destination is critical in opportunistic relaying. In this paper, we analyze the asymptotic outage probability of the amplify-and-forward opportunistic relaying (AF-OR) under a generalized selection criterion term ..."
Abstract
- Add to MetaCart
(Show Context)
Abstract—The way to select the “best ” relay for forwarding the received signal to the destination is critical in opportunistic relaying. In this paper, we analyze the asymptotic outage probability of the amplify-and-forward opportunistic relaying (AF-OR) under a generalized selection criterion termed as the max-generalized-mean (MGM) selection criterion. We show that this generalized selection framework can be regarded as a class of selection criteria achieving full diversity in the AF-OR, encompassing the conventional selection criteria as special cases. The asymptotic outage probability can be further minimized by optimizing the parameters associated with the MGM selection criterion. It is shown that under this generalized selection framework, the conventional max-min selection criterion is optimal for the AF-OR in the sense that it achieves the minimum outage probability. I.
Transactions on Communications Secure Switch-and-Stay Combining (SSSC) for Cognitive Relay Networks
"... Abstract—In this paper, we study a two-phase underlay cog-nitive relay network, where there exists an eavesdropper who can overhear the message. The secure data transmission from the secondary source to secondary destination is assisted by two decode-and-forward (DF) relays. Although the traditional ..."
Abstract
- Add to MetaCart
(Show Context)
Abstract—In this paper, we study a two-phase underlay cog-nitive relay network, where there exists an eavesdropper who can overhear the message. The secure data transmission from the secondary source to secondary destination is assisted by two decode-and-forward (DF) relays. Although the traditional opportunistic relaying technique can choose one relay to provide the best secure performance, it needs to continuously have the channel state information (CSI) of both relays, and may result in a high relay switching rate. To overcome these limitations, a secure switch-and-stay combining (SSSC) protocol is proposed where only one out of the two relays is activated to assist the secure data transmission, and the secure relay switching occurs when the relay cannot support the secure communication any longer. This security switching is assisted by either instantaneous or statistical eavesdropping CSI. For these two cases, we study the system secure performance of SSSC protocol, by deriving the analytical secrecy outage probability as well as an asymptotic expression for the high main-to-eavesdropper ratio (MER) region. We show that SSSC can substantially reduce the system com-plexity while achieving or approaching the full diversity order of opportunistic relaying in the presence of the instantaneous or statistical eavesdropping CSI. Index Terms—Secure switch-and-stay combining (SSSC), cog-nitive relay networks, secure communication, diversity order. I.
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, ACCEPTED FOR PUBLICATION 1 Relay Selection Schemes for Dual-Hop Networks under Security Constraints with Multiple Eavesdroppers
"... Abstract—In this paper, we study opportunistic relay selection in cooperative networks with secrecy constraints, where a num-ber of eavesdropper nodes may overhear the source message. To deal with this problem, we consider three opportunistic relay selection schemes. The first scheme tries to reduce ..."
Abstract
- Add to MetaCart
(Show Context)
Abstract—In this paper, we study opportunistic relay selection in cooperative networks with secrecy constraints, where a num-ber of eavesdropper nodes may overhear the source message. To deal with this problem, we consider three opportunistic relay selection schemes. The first scheme tries to reduce the overheard information at the eavesdroppers by choosing the relay having the lowest instantaneous signal-to-noise ratio (SNR) to them. The second scheme is conventional selection relaying that seeks the relay having the highest SNR to the destination. In the third scheme, we consider the ratio between the SNR of a relay and the maximum among the corresponding SNRs to the eavesdroppers, and then select the optimal one to forward the signal to the destination. The system performance in terms of probability of non-zero achievable secrecy rate, secrecy outage probability and achievable secrecy rate of the three schemes are analyzed and confirmed by Monte Carlo simulations. Index Terms—Rayleigh fading, security constraints, achievable secrecy rate, secrecy outage probability, Shannon capacity, relay selection. I.
Secure Multiuser Multiple Amplify-and-Forward Relay Networks in Presence of Multiple Eavesdroppers
"... Abstract—In this paper, we study the information-theoretical security of a downlink multiuser cooperative relaying network with multiple intermediate amplify-and-forward (AF) relays, where there exist multiple eavesdroppers which can overhear the message. To prevent the wiretap and strength the netw ..."
Abstract
- Add to MetaCart
(Show Context)
Abstract—In this paper, we study the information-theoretical security of a downlink multiuser cooperative relaying network with multiple intermediate amplify-and-forward (AF) relays, where there exist multiple eavesdroppers which can overhear the message. To prevent the wiretap and strength the network security, we select one best relay and user pair, so that the selected user can receive the message from the base station assisted by the selected relay. The relay and user selection is performed by maximizing the ratio of the received signal-to-noise ratio (SNR) at the user to the eavesdroppers, which is based on both the main and eavesdropper links. For the considered system, we derive the closed-form expression of the secrecy outage probability, and provide the asymptotic expression in high main-to-eavesdropper ratio (MER) region. From the asymptotic analysis, we can find that the system diversity order is equivalent to the number of relays regardless of the number of users and eavesdroppers. I.
1Secure Communication Via an Untrusted Non-Regenerative Relay in Fading Channels
"... We investigate a relay network where the source can potentially utilize an untrusted non-regenerative relay to augment its direct transmission of a confidential message to the destination. Since the relay is untrusted, it is desirable to protect the confidential data from it while simultaneously mak ..."
Abstract
- Add to MetaCart
We investigate a relay network where the source can potentially utilize an untrusted non-regenerative relay to augment its direct transmission of a confidential message to the destination. Since the relay is untrusted, it is desirable to protect the confidential data from it while simultaneously making use of it to increase the reliability of the transmission. We first examine the secrecy outage probability (SOP) of the network assuming a single antenna relay, and calculate the exact SOP for three different schemes: direct transmission without using the relay, conventional non-regenerative relaying, and cooperative jamming by the destination. Subsequently, we conduct an asymptotic analysis of the SOPs to determine the optimal policies in different operating regimes. We then generalize to the multi-antenna relay case and investigate the impact of the number of relay antennas on the secrecy performance. Finally, we study a scenario where the relay has only a single RF chain which necessitates an antenna selection scheme, and we show that unlike the case where all antennas are used, under certain conditions the cooperative jamming scheme with antenna selection provides a diversity advantage for the receiver. Numerical results are presented to verify the theoretical predictions of the preferred transmission policies.