Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks

被引:457
作者
Zou, Yulong [1 ,2 ]
Wang, Xianbin [1 ]
Shen, Weiming [3 ,4 ]
机构
[1] Univ Western Ontario, Elect & Comp Engn Dept, London, ON N6A 5B9, Canada
[2] Nanjing Univ Posts & Telecommun, Inst Signal Proc & Transmiss, Nanjing 210003, Jiangsu, Peoples R China
[3] Tongji Univ, Coll Elect & Informat Engn, Shanghai 200092, Peoples R China
[4] CNR, Ottawa, ON, Canada
基金
中国国家自然科学基金;
关键词
Relay selection; physical-layer security; intercept probability; diversity order; cooperative wireless networks; MIMO-OFCDM SYSTEMS; PERFORMANCE ANALYSIS; RESOURCE-ALLOCATION; DIVERSITY; PROTOCOLS; CHANNELS; CHUNK; POWER; MAC;
D O I
10.1109/JSAC.2013.131011
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we explore the physical-layer security in cooperative wireless networks with multiple relays where both amplify-and-forward (AF) and decode-and-forward (DF) protocols are considered. We propose the AF and DF based optimal relay selection (i.e., AFbORS and DFbORS) schemes to improve the wireless security against eavesdropping attack. For the purpose of comparison, we examine the traditional AFbORS and DFbORS schemes, denoted by T-AFbORS and T-DFbORS, respectively. We also investigate a so-called multiple relay combining (MRC) framework and present the traditional AF and DF based MRC schemes, called T-AFbMRC and T-DFbMRC, where multiple relays participate in forwarding the source signal to destination which then combines its received signals from the multiple relays. We derive closed-form intercept probability expressions of the proposed AFbORS and DFbORS (i.e., P-AFbORS and P-DFbORS) as well as the T-AFbORS, T-DFbORS, T-AFbMRC and T-DFbMRC schemes in the presence of eavesdropping attack. We further conduct an asymptotic intercept probability analysis to evaluate the diversity order performance of relay selection schemes and show that no matter which relaying protocol is considered (i.e., AF and DF), the traditional and proposed optimal relay selection approaches both achieve the diversity order M where M represents the number of relays. In addition, numerical results show that for both AF and DF protocols, the intercept probability performance of proposed optimal relay selection is strictly better than that of the traditional relay selection and multiple relay combining methods.
引用
收藏
页码:2099 / 2111
页数:13
相关论文
共 26 条
[1]  
Azgin A, 2005, GLOB TELECOMM CONF, P2854
[2]   A simple cooperative diversity method based on network path selection [J].
Bletsas, A ;
Khisti, A ;
Reed, DP ;
Lippman, A .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (03) :659-672
[3]   Wireless information-theoretic security [J].
Bloch, Matthieu ;
Barros, Joao ;
Rodrigues, Miguel R. D. ;
McLaughlin, Steven W. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) :2515-2534
[4]   Joint Relay and Jammer Selection for Secure Two-Way Relay Networks [J].
Chen, Jingchao ;
Zhang, Rongqing ;
Song, Lingyang ;
Han, Zhu ;
Jiao, Bingli .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (01) :310-320
[5]  
Gündüz D, 2007, IEEE T WIREL COMMUN, V6, P1446, DOI [10.1109/TWC.2007.348341, 10.1109/TWC.2007.05587]
[6]   Cooperative Jamming for Secure Communications in MIMO Relay Networks [J].
Huang, Jing ;
Swindlehurst, A. Lee .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2011, 59 (10) :4871-4884
[7]  
Ikki S, 2007, IEEE COMMUN LETT, V11, P334, DOI 10.1109/LCOMM.2007.061947
[8]   Performance Analysis of Adaptive Decode-and-Forward Cooperative Diversity Networks with Best-Relay Selection [J].
Ikki, Salama S. ;
Ahmed, Mohamed H. .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2010, 58 (01) :68-72
[9]  
Korakis T, 2006, IEEE ICC, P4805
[10]   The relay-eavesdropper channel: Cooperation for secrecy [J].
Lai, Lifeng ;
El Gamal, Hesham .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (09) :4005-4019