Security-Reliability Trade-Off Analysis for Rateless Codes-Based Relaying Protocols Using NOMA, Cooperative Jamming and Partial Relay Selection

被引:9
作者
Duy-Hung Ha [1 ]
Tran Trung Duy [2 ]
Pham Ngoc Son [3 ]
Thuong Le-Tien [4 ]
Voznak, Miroslav [1 ]
机构
[1] VSB Tech Univ Ostrava, Fac Elect Engn & Comp Sci, Ostrava 70800, Czech Republic
[2] Posts & Telecommun Inst Technol, Ho Chi Minh City 700000, Vietnam
[3] Ho Chi Minh City Univ Technol & Educ, Fac Elect & Elect Engn, Ho Chi Minh City 700000, Vietnam
[4] Ho Chi Minh City Univ Technol, VNU HCM, Ho Chi Minh City 700000, Vietnam
关键词
Relays; Protocols; NOMA; Jamming; Security; Reliability; Receivers; Physical-layer security; rateless codes; cooperative jamming; outage probability; intercept probability; PHYSICAL-LAYER SECURITY; SECRECY PERFORMANCE; OUTAGE ANALYSIS; IOT NETWORKS; UPLINK NOMA; TRANSMISSION; ENERGY; MIMO; SYSTEMS; SCHEME;
D O I
10.1109/ACCESS.2021.3114343
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose secure relaying transmission protocols using rateless codes, where a source sends encoded packets to two intended destinations via help of intermediate relays. Employing non-orthogonal multiple access, two encoded packets can be sent to the destinations at the same time. In addition, two partial relay selection methods are studied to enhance reliability of the data transmission at the first and second hops. For protecting the source-relay and relay-destination transmission against an eavesdropper, cooperative jamming technique is employed. Particularly, in the first phase of each data transmission cycle, the remaining relays (except the selected relay) are used to transmit artificial noise on the eavesdropper, and cooperate with the selected relay to cancel interference components. In the second phase, trusted nodes that are near the destinations are employed to play a role as the cooperative jammers. For a fair performance comparison, we design a simple transmit power allocation for the transmitter and jammer nodes at the first and second phases. We also propose an adaptive power allocation method, where fractions of the transmit power are appropriately allocated to the signals, relying on instantaneous channel gains between the selected relay and the destinations. This paper also derives exact closed-form formulas of outage probability and intercept probability over Rayleigh fading channel. All the performance analysis is then validated by Monte-Carlo simulations. The obtained results clearly show a trade-off between security and reliability that can be enhanced by optimally designing the system parameters.
引用
收藏
页码:131087 / 131108
页数:22
相关论文
共 55 条
[11]  
De Rango F, 2020, IEEE CONF COMPUT, P842, DOI 10.1109/INFOCOMWKSHPS50562.2020.9162902
[12]   Energy-aware dynamic Internet of Things security system based on Elliptic Curve Cryptography and Message Queue Telemetry Transport protocol for mitigating Replay attacks [J].
De Rango, Floriano ;
Potrino, Giuseppe ;
Tropea, Mauro ;
Fazio, Peppino .
PERVASIVE AND MOBILE COMPUTING, 2020, 61
[13]   Security-Reliability Tradeoff Analysis of Artificial Noise Aided Two-Way Opportunistic Relay Selection [J].
Ding, Xiaojin ;
Song, Tiecheng ;
Zou, Yulong ;
Chen, Xiaoshu ;
Hanzo, Lajos .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2017, 66 (05) :3930-3941
[14]   Security-Reliability Tradeoff for Friendly Jammer Assisted User-Pair Selection in the Face of Multiple Eavesdroppers [J].
Ding, Xiaojin ;
Song, Tiecheng ;
Zou, Yulong ;
Chen, Xiaoshu .
IEEE ACCESS, 2016, 4 :8386-8393
[15]  
Duy T. T., 2021, EAI Trans. Ind. Netw. Intell. Syst, V8, P1, DOI DOI 10.4108/EAI.26-1-2021.168229
[16]   Physical-Layer Security and Privacy for Vehicle-to-Everything [J].
ElHalawany, Basem M. ;
El-Banna, Ahmad A. Aziz ;
Wu, Kaishun .
IEEE COMMUNICATIONS MAGAZINE, 2019, 57 (10) :84-90
[17]   Secure Multiple Amplify-and-Forward Relaying With Cochannel Interference [J].
Fan, Lisheng ;
Lei, Xianfu ;
Yang, Nan ;
Duong, Trung Q. ;
Karagiannidis, George K. .
IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING, 2016, 10 (08) :1494-1505
[18]   On packet marking and Markov modeling for IP Traceback: A deep probabilistic and stochastic analysis [J].
Fazio, Peppino ;
Tropea, Mauro ;
Voznak, Miroslav ;
De Rango, Floriano .
COMPUTER NETWORKS, 2020, 182
[19]   Physical Layer Security in Cooperative Energy Harvesting Networks With a Friendly Jammer [J].
Hoang, Tiep M. ;
Duong, Trung Q. ;
Vo, Nguyen-Son ;
Kundu, Chinmoy .
IEEE WIRELESS COMMUNICATIONS LETTERS, 2017, 6 (02) :174-177
[20]   Secure Communication Based on Fountain Code and Channel Feedback [J].
Huang, Dantong ;
Sun, Li .
2019 11TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP), 2019,