Secure Cooperative Untrusted-Relay Network With Outdated CSI

被引:0
作者
Mabrouk, Asma [1 ]
Tourki, Kamel [2 ]
Hamdi, Noureddine [1 ]
机构
[1] Manouba Univ, ENSI, HANA Res Lab, Manouba, Tunisia
[2] Huawei Technol Co Ltd, France Res Ctr, Math & Algorithm Sci Lab, Shenzhen, Peoples R China
来源
2016 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC) | 2016年
关键词
Source-based jamming; partial relay selection; untrusted relaying; outdated channel state information; ergodic secrecy capacity (ESC); POWER ALLOCATION; TRANSMISSION;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper studies the secrecy performance of an untrusted amplify-and-forward relaying network where both the relaying and the direct links are used to convey the source's information. Since relays act as eavesdroppers, a source-based jamming technique is proposed to keep the source's message secret from these helper nodes. We analyze the secrecy capacity of partial relay selection based on outdated channel state information. The study is conducted analytically by deriving the lower-bound expression for the ergodic secrecy capacity (ESC). We demonstrate through the simulation results the tightness of the derived bound. The use of the direct link is shown to improve the secrecy performance of the proposed scheme. In this case, we found that ESC performance with maximum ratio combining at the destination is better than that with selection combining. The system performance worsens as the correlation coefficient decreases. Furthermore, the maximum of ESC is achieved when relays are in the middle between the source and the destination with equal power allocation between the information and the jamming signals at the source.
引用
收藏
页码:90 / 95
页数:6
相关论文
共 25 条
  • [1] AL-Qahtani F., 2015, IEEE T COMMUN, VPP, P1
  • [2] [Anonymous], 2007, TABLE INTEGRALS SERI
  • [3] [Anonymous], 2010, P GLOB TEL C GLOBECO
  • [4] Secrecy Transmission With a Helper: To Relay or to Jam
    Deng, Hao
    Wang, Hui-Ming
    Guo, Wei
    Wang, Wenjie
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (02) : 293 - 307
  • [5] Dong Fang, 2013, 2013 IEEE International Conference on Communications (ICC), P2188, DOI 10.1109/ICC.2013.6654852
  • [6] Improving Wireless Physical Layer Security via Cooperating Relays
    Dong, Lun
    Han, Zhu
    Petropulu, Athina P.
    Poor, H. Vincent
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2010, 58 (03) : 1875 - 1888
  • [7] Dong LuYan Dong LuYan, 2011, Proceedings of the International Conference on pipelines and trenchless technology, Beijing, China, 26-29 October 2011, P1
  • [8] Effects of Outdated CSI on the Secrecy Performance of MISO Wiretap Channels with Transmit Antenna Selection
    Ferdinand, Nuwan S.
    da Costa, Daniel Benevides
    Latva-aho, Matti
    [J]. IEEE COMMUNICATIONS LETTERS, 2013, 17 (05) : 864 - 867
  • [9] Huang J, 2012, INT CONF ACOUST SPEE, P2481, DOI 10.1109/ICASSP.2012.6288419
  • [10] Opportunistic Transmission of Nonregenerative Network With Untrusted Relay
    Ju, MinChul
    Kim, Do-Hoon
    Hwang, Kyu-Sung
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2015, 64 (06) : 2703 - 2709