Secrecy Outage of Dual-Hop Regenerative Multi-Relay System With Relay Selection

被引:61
作者
Kundu, Chinmoy [1 ]
Ghose, Sarbani [2 ]
Bose, Ranjan [2 ]
机构
[1] Indian Inst Technol Delhi, Bharti Sch Telecommun Technol & Management, New Delhi 110016, India
[2] Indian Inst Technol Delhi, Dept Elect Engn, New Delhi 110016, India
关键词
Decode-forward-relay; dual-hop multi-relay; relay selection; secrecy capacity; secrecy outage probability; PHYSICAL-LAYER SECURITY; COOPERATIVE DIVERSITY; NETWORKS; CHANNELS; CAPACITY;
D O I
10.1109/TWC.2015.2423290
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Relay selection is considered to enhance the secrecy of a dual-hop regenerative multi-relay system with an eavesdropper. Without assuming perfect decoding at the relays, the secrecy outage probability of a single relay system is obtained first. Secrecy outage of optimal, traditional, and suboptimal relay selection schemes is then evaluated. To reduce the power consumption, partial relay selection schemes based only on either of the source-relay or relay-destination instantaneous channel state information (ICSI) are introduced. The secrecy outage is evaluated and compared with the other schemes. Secrecy outage of all the selection schemes are obtained in closed-form. An optimal relay selection scheme is proposed using secrecy outage, which does not require any ICSI. Asymptotic and diversity gain analysis of the secrecy outage is presented when source-relay and relay-destination average SNRs are the same or different. We observe that the improvement in eavesdropper link quality affects the secrecy outage more when required secrecy rate is low as compared to the case when rate is high. We also observe that relay selection improves performance more when number of relays are more. It is important to note that either of the source-relay or the relay-destination link quality can equally limit the secrecy outage performance even if the other link quality is infinitely good.
引用
收藏
页码:4614 / 4625
页数:12
相关论文
共 43 条
[1]  
Adam H., 2008, P IEEE INT S PERS IN, P1
[2]  
Aggarwal V, 2009, 2009 INFORMATION THEORY AND APPLICATIONS WORKSHOP, P292
[3]  
AL-Qahtani F. S., IEEE T COMM IN PRESS
[4]  
Alotaibi E. R., 2014, P IEEE 80 VEH TECHN, P1
[5]  
[Anonymous], 2002, Probability, Random Variables, andStochastic Processes
[6]  
Bao V. N. Q., 2012, J ELECT COMMUNICATIO, V2, P33
[7]   Secrecy capacity of wireless channels [J].
Barros, Joao ;
Rodrigues, Miguel R. D. .
2006 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1-6, PROCEEDINGS, 2006, :356-+
[8]   Selection cooperation in multi-source cooperative networks [J].
Beres, Elzbieta ;
Adve, Raviraj .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2008, 7 (01) :118-127
[9]   A simple cooperative diversity method based on network path selection [J].
Bletsas, A ;
Khisti, A ;
Reed, DP ;
Lippman, A .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (03) :659-672
[10]  
Bletsas A., 2007, ELECTRON LETT, V43, P51