Cross-Layer Security in Two-Hop Wireless Gaussian Relay Network with Untrusted Relays

被引:0
|
作者
Kaliszan, Michal [1 ]
Mohammadi, Jafar [1 ]
Stanczak, Slawomir [1 ]
机构
[1] Tech Univ Berlin, Heinrich Hertz Lehrstuhl Informationstheorie & Th, D-10587 Berlin, Germany
来源
2013 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC) | 2013年
关键词
Untrusted relays; cross-layer security; transmit beamforming;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
This paper deals with the challenge of providing information-theoretic secrecy in a two-hop wireless channel with multiple untrusted relay nodes. Instead of perfect secrecy (in the information-theoretic sense), of interest here is a cross-layer approach where only parts of relayed information are protected at the physical layer against eavesdropping at relay nodes. For both decode-and-forward and amplify-and-forward relaying strategies, we present a novel framework for designing secrecy schemes for two-hop relay channels that ensure some pre-defined level of partial secrecy. The paper is concluded by some numerical simulations to show the interplay between different system parameters such as the the rate, secrecy factor, the number of relays and antennas.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Cross-layer relay selection in two-hop cellular relaying
    Wang Kun
    Peng Mugen
    Wang Wenbo
    IEEE 2007 INTERNATIONAL SYMPOSIUM ON MICROWAVE, ANTENNA, PROPAGATION AND EMC TECHNOLOGIES FOR WIRELESS COMMUNICATIONS, VOLS I AND II, 2007, : 142 - 147
  • [2] Cross-layer bandwidth and power allocation for a two-hop link in wireless mesh network
    Cheng, Peng
    Zhang, Zhaoyang
    Yu, Guanding
    Chen, Hsiao-Hwa
    Qiu, Peiliang
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2009, 9 (02): : 155 - 167
  • [3] Cooperative Jamming in a Two-Hop Relay Wireless Network with Buffer-Aided Relays
    Sasaki, Kenta
    Liao, Xuening
    Jiang, Xiaohong
    2017 FIFTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING (CANDAR), 2017, : 565 - 569
  • [4] A Cross-layer Relay Selection Algorithm for Infrastructure-based Two-hop Relay Networks
    Zhang, Huan
    Wang, Wenbo
    Liang, Dong
    Peng, Mugen
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS, 2009, : 77 - 81
  • [5] The Symmetric Two-Hop Channel with an Untrusted Relay
    Ghasemi-Goojani, Shahab
    Papadimitratos, Panagiotis
    PROCEEDINGS OF 2018 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA2018), 2018, : 673 - 677
  • [6] Cross-layer Dynamic Route Selection in Wireless Multiuser Two-hop Networks
    Malekshan, Kamal Rahimi
    Lahouti, Farshad
    2011 IEEE 22ND INTERNATIONAL SYMPOSIUM ON PERSONAL INDOOR AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2011, : 1788 - 1792
  • [7] Two-Hop Secure Communication Using an Untrusted Relay
    Xiang He
    Aylin Yener
    EURASIP Journal on Wireless Communications and Networking, 2009
  • [8] Two-Hop Secure Communication Using an Untrusted Relay
    He, Xiang
    Yener, Aylin
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2009,
  • [9] Security Optimization of Two-Hop AF Cooperative Relay Network
    Cheng Gong
    XianYi Rui
    Wireless Personal Communications, 2019, 107 : 513 - 521
  • [10] Security Optimization of Two-Hop AF Cooperative Relay Network
    Gong, Cheng
    Rui, XianYi
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 107 (01) : 513 - 521