Relay selection for physical layer security in Decode-and-forward two-way relay networks

被引:2
作者
Zhou, Nanrun [1 ,2 ]
Chen, Xun [1 ]
Li, Chisheng [1 ]
Lai, Qingwu [1 ]
机构
[1] Department of Electronic Information Engineering, Nanchang University
[2] Shanghai Key Laboratory of Integrate Administration Technologies for Information Security, School of Information Security Engineering, Shanghai Jiao Tong University
来源
Journal of Information and Computational Science | 2013年 / 10卷 / 18期
关键词
Cooperative communications; Decode-and-forward; Physical-layer security; Relay selection; Two-way relay;
D O I
10.12733/jics20102372
中图分类号
学科分类号
摘要
Relay selection for physical layer security is investigated in Decode-and-forward (DF) two-way relay networks, consisting of a group of intermediate nodes, two sources, and one eavesdropper. Three intermediate nodes are selected in the two transmission phases. One intermediate node is selected to perform the relaying operation, and the other two are selected to transmit the jamming to deteriorate the eavesdropping channels. It is found that the cooperative jamming scheme outperforms the conventional non-jamming scheme in the common scenario, where the intermediate nodes are distributed dispersedly. However, when the intermediate nodes cluster gets close to the sources, it is not superior any more due to the strong interference on the destinations. Therefore, an instantaneous switching between the nonjamming scheme and the jamming scheme is proposed to avoid the negative interference. The hybrid scheme is validated to well improve the secrecy performance of DF two-way relay networks via simulation analyses. © 2013 Binary Information Press.
引用
收藏
页码:5821 / 5828
页数:7
相关论文
共 7 条
  • [1] Wyner A.D., The wire-tap channel, Bell System Technical Journal, 54, 8, pp. 1355-1387, (1975)
  • [2] Csisz'ar I., Korner J., Broadcast channels with confidential messages, IEEE Transactions on Information Theory, 24, 3, pp. 339-348, (1978)
  • [3] Leung-Yan-cheong S.K., Hellman M.E., The Gaussian wiretap channel, IEEE Transactions on Information Theory, 24, 4, pp. 451-456, (1978)
  • [4] Krikidis I., Opportunistic relay selection for cooperative networks with secrecy constraints, IET Communications, 4, 15, pp. 1787-1791, (2010)
  • [5] Krikidis I., Thompson J., Mclaughlin S., Relay selection for secure cooperative networks with jamming, IEEE Transactions on Wireless Communications, 8, 10, pp. 5003-5011, (2009)
  • [6] Nguyen V.H., Quoc B.V.N., Study of relay selection for dual-hop networks under secrecy constraints with multiple eavesdroppers, Proc. of the 2011 International Conference on Advanced Technologies for Communications, pp. 89-92, (2011)
  • [7] Chen J., Zhang R., Song L., Et al., Joint relay and jammer selection for secure two-way relay networks, IEEE Transactions on Information Forensics and Security, 7, 1, pp. 310-320, (2012)