Relaying techniques for enhancing the physical layer secrecy in cooperative networks with multiple eavesdroppers

被引:18
作者
Al-nahari, Azzam Y. [1 ]
Krikidis, Ioannis [2 ]
Ibrahim, Ahmed S. [3 ]
Dessouky, Moawad I. [4 ]
Abd El-Samie, Fathi E. [4 ]
机构
[1] Ibb Univ, Dept Elect Engn, Fac Engn & Architecture, Ibb, Yemen
[2] Univ Cyprus, Dept Elect & Comp Engn, CY-1678 Nicosia, Cyprus
[3] Cairo Univ, Fac Engn, Dept Elect Commun, Cairo, Egypt
[4] Menoufia Univ, Fac Elect Engn, Dept Elect & Elect Commun, Menoufia 32952, Egypt
关键词
SELECTION; DIVERSITY; SECURITY;
D O I
10.1002/ett.2581
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Physical layer security has recently attracted considerable attention in the context of information-theoretic point of view. In this paper, we investigate relay selection schemes for security-constrained half-duplex cooperative wireless networks with multiple eavesdroppers, which have the ability to cooperate to overhear the source transmission. The proposed techniques select a trusted decode-and-forward relay to assist the source transmission and maximize the achievable secure rate for different eavesdropper policies (cooperation or not); for the two cases, we assume that the channel is always available. In addition, a jamming method that selects two relay nodes to create an intentional interference at both phases of the decode-and-forward protocol to confound the eavesdropper nodes is also considered. Both the source-destination and source-eavesdroppers links are taken into account in the proposed analysis. Secrecy rate and secrecy outage probability are the two performance metrics that are used to verify the effectiveness of the proposed schemes while asymptotic approximations of the secrecy outage probability are also derived. Simulation and analytical results demonstrate the performance improvement of the proposed schemes. Copyright (c) 2012 John Wiley & Sons, Ltd.
引用
收藏
页码:445 / 460
页数:16
相关论文
共 26 条
[1]  
[Anonymous], 1987, ASYMPTOTIC THEORY EX
[2]  
[Anonymous], Probability, Random Variables and Stochastic Processes
[3]  
[Anonymous], 2000, Tables of Integrals
[4]   Secrecy capacity of wireless channels [J].
Barros, Joao ;
Rodrigues, Miguel R. D. .
2006 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1-6, PROCEEDINGS, 2006, :356-+
[5]   Selection cooperation in multi-source cooperative networks [J].
Beres, Elzbieta ;
Adve, Raviraj .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2008, 7 (01) :118-127
[6]   Wireless information-theoretic security [J].
Bloch, Matthieu ;
Barros, Joao ;
Rodrigues, Miguel R. D. ;
McLaughlin, Steven W. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) :2515-2534
[7]  
CSISZAR I, 1978, IEEE T INFORM THEORY, V24, P339, DOI 10.1109/TIT.1978.1055892
[8]  
David H. A., 2003, ORDER STAT
[9]   A SURVEY OF SECURITY ISSUES IN MOBILE AD HOC AND SENSOR NETWORKS [J].
Djenouri, Djamel ;
Khelladi, Lyes ;
Badache, Nadjib .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2005, 7 (04) :2-28
[10]   Improving Wireless Physical Layer Security via Cooperating Relays [J].
Dong, Lun ;
Han, Zhu ;
Petropulu, Athina P. ;
Poor, H. Vincent .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2010, 58 (03) :1875-1888