Relay Selection Schemes for Decode-and-Forward Cooperative Networks with Secrecy Constraints

被引:0
作者
Cao, Zhanghua [1 ]
Ji, Xiaodong [1 ]
Wang, Wei [1 ]
Zhang, Shibing [1 ]
机构
[1] Nantong Univ, Sch Elect & Informat, Nantong 226019, Peoples R China
来源
PROCEEDINGS OF THE 2015 10TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA CHINACOM 2015 | 2015年
关键词
relay selection; physical layer security; secrecy outage probability; Decode-and-forward; PHYSICAL-LAYER SECURITY; WIRELESS NETWORKS; DIVERSITY;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We propose three relay selection schemes for a cooper-ative network with secrecy constraints, where a decode-and-forw -ard (DF) relaying policy is employed. The first scheme selects the relay having the minimum instantaneous signal-to-noise ratio (SN - R) to the eavesdropper, the second one is max-min approach and the third scheme is the optimal selection criteria that maximizes t - he achievable secrecy rate. We provide a comprehensive analysis and derive closed-form expressions of the secrecy outage probabil -ity. Finally, numerical results demonstrate that optimal selection has lowest outage probability, but its performance is only slightly better than that of max-min selection criteria.
引用
收藏
页码:697 / 701
页数:5
相关论文
共 17 条
[1]   Secrecy capacity of wireless channels [J].
Barros, Joao ;
Rodrigues, Miguel R. D. .
2006 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1-6, PROCEEDINGS, 2006, :356-+
[2]   Secure Multiuser Communications in Multiple Amplify-and-Forward Relay Networks [J].
Fan, Lisheng ;
Lei, Xianfu ;
Duong, Trung Q. ;
Elkashlan, Maged ;
Karagiannidis, George K. .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2014, 62 (09) :3299-3310
[3]   On the secrecy capacity of fading channels [J].
Gopala, Praveen Kumar ;
Lai, Lifeng ;
El Gamal, Hesham .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (10) :4687-4698
[4]   Opportunistic relay selection for cooperative networks with secrecy constraints [J].
Krikidis, I. .
IET COMMUNICATIONS, 2010, 4 (15) :1787-1791
[5]   Cooperative diversity in wireless networks: Efficient protocols and outage behavior [J].
Laneman, JN ;
Tse, DNC ;
Wornell, GW .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2004, 50 (12) :3062-3080
[6]  
LEUNGYANCHEONG SK, 1978, IEEE T INFORM THEORY, V24, P451, DOI 10.1109/TIT.1978.1055917
[7]   Information Theoretic Security [J].
Liang, Yingbin ;
Poor, H. Vincent ;
Shamai, Shlomo .
FOUNDATIONS AND TRENDS IN COMMUNICATIONS AND INFORMATION THEORY, 2008, 5 (4-5) :355-580
[8]   Destination Assisted Cooperative Jamming for Wireless Physical-Layer Security [J].
Liu, Yupeng ;
Li, Jiangyuan ;
Petropulu, Athina P. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (04) :682-694
[9]  
Menezes J., 1996, Handbook of Applied Cryptography
[10]   Exact Outage Probability of a Decode-and-Forward Scheme with Best Relay Selection Under Physical Layer Security [J].
Pham Ngoc Son ;
Kong, Hyung Yun .
WIRELESS PERSONAL COMMUNICATIONS, 2014, 74 (02) :325-342