Capacity Scaling and Diversity Order for Secure Cooperative Relaying With Untrustworthy Relays

被引:47
作者
Kim, Jung-Bin [1 ]
Lim, Jaesung [2 ]
Cioffi, John M. [1 ,3 ]
机构
[1] Stanford Univ, Dept Elect Engn, Stanford, CA 94305 USA
[2] Ajou Univ, Dept Comp Engn, Suwon 443749, South Korea
[3] King Abdulaziz Univ, Dept Comp Sci, Jeddah 21413, Saudi Arabia
基金
新加坡国家研究基金会;
关键词
Cooperative relaying; physical layer security; secrecy capacity; intended jamming (IJ); distributed beamforming (DBF); opportunistic relaying (OR); capacity scaling; diversity order; SECRECY CAPACITY; BROADCAST CHANNELS; AMPLIFY; COMMUNICATION; TRANSMISSION; INFORMATION;
D O I
10.1109/TWC.2015.2413784
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper presents an investigation of the secrecy performance of amplify-and-forward (AF) distributed beamforming (DBF) and opportunistic relaying (OR) through K untrustworthy relays. The capacity scaling and achievable diversity order of a secure communication are derived for K -> infinity and in high signal-to-noise-ratio (SNR) regimes, respectively. The DBF is shown to convey confidential messages with a capacity scaling of 1/2 logK regardless of the trustworthiness of the relays, even without intended jamming (IJ), where 1/2 logK corresponds to the maximal capacity scaling of cooperative relaying in non-eavesdropping environments. However, using multiple untrustworthy relays worsens the secrecy performance of the OR, and as K increases, the secrecy capacity converges to zero. When secrecy outage performance with IJ is considered, the achievable diversity order for both the DBF and OR is limited to one. However, only the DBF exploits the benefits using multiple untrustworthy relays, and its secrecy outage probability decreases exponentially as K increases.
引用
收藏
页码:3866 / 3876
页数:11
相关论文
共 37 条
[1]   Outage minimization with limited feedback for the fading relay channel [J].
Ahmed, N ;
Khojastepour, MA ;
Sabharwal, A ;
Aazhang, B .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2006, 54 (04) :659-669
[2]   Cooperative communications with outage-optimal opportunistic relaying [J].
Bletsas, Aggelos ;
Shin, Hyundong ;
Win, Moe Z. .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2007, 6 (09) :3450-3460
[3]   Wireless information-theoretic security [J].
Bloch, Matthieu ;
Barros, Joao ;
Rodrigues, Miguel R. D. ;
McLaughlin, Steven W. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) :2515-2534
[4]  
Bölcskei H, 2006, IEEE T WIREL COMMUN, V5, P1433, DOI 10.1109/TWC.2006.04263
[5]   Joint Relay and Jammer Selection for Secure Two-Way Relay Networks [J].
Chen, Jingchao ;
Zhang, Rongqing ;
Song, Lingyang ;
Han, Zhu ;
Jiao, Bingli .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (01) :310-320
[6]  
CSISZAR I, 1978, IEEE T INFORM THEORY, V24, P339, DOI 10.1109/TIT.1978.1055892
[7]   IDENTITY-BASED KEY MANAGEMENT IN MOBILE AD HOC NETWORKS: TECHNIQUES AND APPLICATIONS [J].
Da Silva, Eduardo ;
Dos Santos, Aldri L. ;
Albini, Luiz Carlos P. ;
Lima, Michele N. .
IEEE WIRELESS COMMUNICATIONS, 2008, 15 (05) :46-52
[8]   Improving Wireless Security for Bidirectional Communication Scenarios [J].
Ding, Zhiguo ;
Xu, Mai ;
Lu, Jianhua ;
Liu, Fei .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2012, 61 (06) :2842-2848
[9]   Improving Wireless Physical Layer Security via Cooperating Relays [J].
Dong, Lun ;
Han, Zhu ;
Petropulu, Athina P. ;
Poor, H. Vincent .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2010, 58 (03) :1875-1888
[10]   On channel estimation and optimal training design for amplify and forward relay networks [J].
Gao, Feifei ;
Cui, Tao ;
Nallanathan, Arumugam .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2008, 7 (05) :1907-1916