The Delay-Security Trade-off in Two-hop Buffer-Aided Relay Wireless Network

被引:6
作者
Liao, Xuening [1 ,2 ]
Wu, Zhenqiang [2 ]
Zhang, Yuanyu [1 ]
Jiang, Xiaohong [1 ]
机构
[1] Future Univ Hakodate, Sch Syst Informat Sci, Hakodate, Hokkido, Japan
[2] Shaanxi Normal Univ, Sch Comp Sci, Xian, Peoples R China
来源
PROCEEDINGS 2016 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS NANA 2016 | 2016年
关键词
Two-hop relay networks; physical layer security; delay; buffer-aided relaying; SELECTION; DIVERSITY; SECRECY;
D O I
10.1109/NaNA.2016.15
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Two-hop relay wireless networks serve as a class of attractive network model for the performance study of general multi-hop wireless networks, understanding their fundamental security and delay performance have been critical issues for them to support various applications with different quality of service requirements. This paper studies the end-to-end delay of a two-hop buffer-aided relay wireless network with multiple relays and an eavesdropper intercepting both the source-relay link and relay-destination link. To derive the end-to-end delay, we first apply Markov chain to calculate the average queue length. With the help of secure transmission probability, the average queue length and Little's Law, we then obtain the end-to-end delay of the concerned network. Finally, simulation and numerical results are provided to verify our theoretical analysis and also to illustrate the delay-security trade-off.
引用
收藏
页码:173 / 177
页数:5
相关论文
共 19 条
[1]   Performance evaluation of multiuser diversity in multiuser two-hop cooperative multi-relay wireless networks using maximal ratio combining over Rayleigh fading channels [J].
Al-Mistarihi, Mamoun F. ;
Mohaisen, Rami ;
Sharaqa, Ashraf ;
Shurman, Mohammad M. ;
Darabkh, Khalid A. .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2015, 28 (01) :71-90
[2]  
Chen G., 2014, IEEE T INF FORENSICS, V9
[3]   Artificial Noise Generation from Cooperative Relays for Everlasting Secrecy in Two-Hop Wireless Networks [J].
Goeckel, Dennis ;
Vasudevan, Sudarshan ;
Towsley, Don ;
Adams, Stephan ;
Ding, Z. ;
Leung, K. .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2011, 29 (10) :2067-2076
[4]   Cooperative Beamforming and User Selection for Improving the Security of Relay-Aided Systems [J].
Hoang, Tiep M. ;
Duong, Trung Q. ;
Suraweera, Himal A. ;
Tellambura, Chintha ;
Poor, H. Vincent .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2015, 63 (12) :5039-5051
[5]   Capacity bounds and power allocation for wireless relay channels [J].
Host-Madsen, A ;
Zhang, JS .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2005, 51 (06) :2020-2040
[6]  
Huang J., 2015, IEEE T WIRELESS COMM, V14
[7]  
Jahan Sarwar, 2015, J COMPUTER COMMUNICA, V3, P21
[8]   On Secrecy Capacity Scaling in Wireless Networks [J].
Koyluoglu, O. Ozan ;
Koksal, Can Emre ;
El Gamal, Hesham .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2012, 58 (05) :3000-3015
[9]   Buffer-Aided Relay Selection for Cooperative Diversity Systems without Delay Constraints [J].
Krikidis, Ioannis ;
Charalambous, Themistoklis ;
Thompson, John S. .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2012, 11 (05) :1957-1967
[10]   Cooperative diversity in wireless networks: Efficient protocols and outage behavior [J].
Laneman, JN ;
Tse, DNC ;
Wornell, GW .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2004, 50 (12) :3062-3080