Results 1 -
5 of
5
Secure Multiuser Communications in Multiple Amplify-and-Forward Relay Networks
, 2014
"... Abstract—This paper proposes relay selection to increase the physical layer security in multiuser cooperative relay networks with multiple amplify-and-forward relays, in the presence of mul-tiple eavesdroppers. To strengthen the network security against eavesdropping attack, we present three criteri ..."
Abstract
-
Cited by 1 (1 self)
- Add to MetaCart
Abstract—This paper proposes relay selection to increase the physical layer security in multiuser cooperative relay networks with multiple amplify-and-forward relays, in the presence of mul-tiple eavesdroppers. To strengthen the network security against eavesdropping attack, we present three criteria to select the best relay and user pair. Specifically, criteria I and II study the re-ceived signal-to-noise ratio (SNR) at the receivers, and perform the selection by maximizing the SNR ratio of the user to the eavesdroppers. To this end, criterion I relies on both the main and eavesdropper links, while criterion II relies on the main links only. Criterion III is the standard max-min selection criterion, which maximizes the minimum of the dual-hop channel gains of main links. For the three selection criteria, we examine the system secrecy performance by deriving the analytical expressions for the secrecy outage probability. We also derive the asymptotic analysis
On the Security of Cooperative Single Carrier Systems On the Security of Cooperative Single Carrier Systems
"... Abstract In this paper, the impact of multiple eavesdroppers on cooperative single carrier systems with multiple relays and multiple destinations is examined. To achieve the secrecy diversity gains in the form of opportunistic selection, a two-stage scheme is proposed for joint relay and destinatio ..."
Abstract
- Add to MetaCart
(Show Context)
Abstract In this paper, the impact of multiple eavesdroppers on cooperative single carrier systems with multiple relays and multiple destinations is examined. To achieve the secrecy diversity gains in the form of opportunistic selection, a two-stage scheme is proposed for joint relay and destination selection, in which, after the selection of the relay with the minimum effective maximum signal-to-noise ratio (SNR) to a cluster of eavesdroppers, the destination that has the maximum SNR from the chosen relay is selected. In order to accurately assess the secrecy performance, the exact and asymptotic expressions are obtained in closedform for the ergodic secrecy rate in frequency selective fading. Based on the asymptotic analysis, key design parameters such as multiplexing gain, and power cost are characterized, from which new insights are drawn. Moreover, it is concluded that capacity ceiling occurs when the average received power at the eavesdropper is proportional to the counterpart at the destination. IEEE Global Communications Conference (GLOBECOM) This work may not be copied or reproduced in whole or in part for any commercial purpose. Permission to copy in whole or in part without payment of fee is granted for nonprofit educational and research purposes provided that all such whole or partial copies include the following: a notice that such copying is by permission of Mitsubishi Electric Research Laboratories, Inc.; an acknowledgment of the authors and individual contributions to the work; and all applicable portions of the copyright notice. Copying, reproduction, or republishing for any other purpose shall require a license with payment of fee to Mitsubishi Electric Research Laboratories, Inc. All rights reserved. Abstract-In this paper, the impact of multiple eavesdroppers on cooperative single carrier systems with multiple relays and multiple destinations is examined. To achieve the secrecy diversity gains in the form of opportunistic selection, a two-stage scheme is proposed for joint relay and destination selection, in which, after the selection of the relay with the minimum effective maximum signal-to-noise ratio (SNR) to a cluster of eavesdroppers, the destination that has the maximum SNR from the chosen relay is selected. In order to accurately assess the secrecy performance, the exact and asymptotic expressions are obtained in closedform for the ergodic secrecy rate in frequency selective fading. Based on the asymptotic analysis, key design parameters such as multiplexing gain, and power cost are characterized, from which new insights are drawn. Moreover, it is concluded that capacity ceiling occurs when the average received power at the eavesdropper is proportional to the counterpart at the destination.
Secure Multiuser Multiple Amplify-and-Forward Relay Networks in Presence of Multiple Eavesdroppers
"... Abstract—In this paper, we study the information-theoretical security of a downlink multiuser cooperative relaying network with multiple intermediate amplify-and-forward (AF) relays, where there exist multiple eavesdroppers which can overhear the message. To prevent the wiretap and strength the netw ..."
Abstract
- Add to MetaCart
(Show Context)
Abstract—In this paper, we study the information-theoretical security of a downlink multiuser cooperative relaying network with multiple intermediate amplify-and-forward (AF) relays, where there exist multiple eavesdroppers which can overhear the message. To prevent the wiretap and strength the network security, we select one best relay and user pair, so that the selected user can receive the message from the base station assisted by the selected relay. The relay and user selection is performed by maximizing the ratio of the received signal-to-noise ratio (SNR) at the user to the eavesdroppers, which is based on both the main and eavesdropper links. For the considered system, we derive the closed-form expression of the secrecy outage probability, and provide the asymptotic expression in high main-to-eavesdropper ratio (MER) region. From the asymptotic analysis, we can find that the system diversity order is equivalent to the number of relays regardless of the number of users and eavesdroppers. I.
Secure Relay and Jammer Selection for Physical Layer Security
"... Abstract—Secure relay and jammer selection for physical-layer security is studied in a wireless network with multiple interme-diate nodes and eavesdroppers, where each intermediate node ei-ther helps to forward messages as a relay, or broadcasts noise as a jammer.We derive a closed-form expression f ..."
Abstract
- Add to MetaCart
(Show Context)
Abstract—Secure relay and jammer selection for physical-layer security is studied in a wireless network with multiple interme-diate nodes and eavesdroppers, where each intermediate node ei-ther helps to forward messages as a relay, or broadcasts noise as a jammer.We derive a closed-form expression for the secrecy outage probability (SOP), and we develop two relay and jammer selection methods for SOP minimization. In both methods a selection vector and a corresponding threshold are designed and broadcast by the destination to ensure each intermediate node knows its own role while knowledge of the relay and jammer set is kept secret from all eavesdroppers. Simulation results show the SOP of the proposed methods are very close to that obtained by an exhaustive search, and that maintaining the privacy of the selection result greatly im-proves the SOP performance. Index Terms—Cooperative jamming, physical layer security, relay selection, secrecy outage probability. I.
Transactions on Wireless Communications 1 Limited Rate Feedback Scheme for Resource Allocation in Secure Relay-Assisted OFDMA Networks
"... Abstract—In this paper, we consider the problem of resource allocation for secure communications in decode-and-forward (DF) relay-assisted Orthogonal Frequency-Division Multiple Ac-cess (OFDMA) networks. In our setting, users want to securely communicate to the base station (BS) with the help of a s ..."
Abstract
- Add to MetaCart
(Show Context)
Abstract—In this paper, we consider the problem of resource allocation for secure communications in decode-and-forward (DF) relay-assisted Orthogonal Frequency-Division Multiple Ac-cess (OFDMA) networks. In our setting, users want to securely communicate to the base station (BS) with the help of a set of relay stations (RSs) in the presence of multiple eavesdroppers. We assume that all channel state information (CSI) of the legitimate links and only the channel distribution information (CDI) of the eavesdropper links are available. We formulate our problem as an optimization problem whose objective is to maximize the sum secrecy rate of the system subject to individual transmit power constraint for each user and RS. As a first work which considers limited feedback schemes for secure communications in cooperative OFDMA networks, we consider the limited-rate feedback case where in addition to transmit power and subcarrier assignments, channel quantization should be performed and boundary regions of channels should be computed. We further consider the noisy feedback channel. We solve our problem using the dual Lagrange approach and propose an iterative algorithm whose convergence is analyzed. Using simulations, we evaluate the performance of the proposed scheme in numerous situations. Index Terms – Physical (PHY) layer security, limited feedback, eavesdropper, decode-and-forward (DF) relay. I.