Relay Selection for Secure Successive AF Relaying Networks With Untrusted Nodes

被引:51
作者
Wang, Wei [1 ]
Teh, Kah Chan [1 ]
Li, Kwok Hung [1 ]
机构
[1] Nanyang Technol Univ, Sch Elect & Elect Engn, Singapore 639798, Singapore
关键词
Physical layer security; successive relaying; untrusted relay; relay selection; secrecy outage probability; diversity order; PHYSICAL-LAYER SECURITY; WIRE-TAP CHANNEL; INTERFERENCE CANCELLATION; POWER ALLOCATION; FADING CHANNELS; SECRECY; MAXIMIZATION; COOPERATION; PROTOCOLS; SYSTEMS;
D O I
10.1109/TIFS.2016.2584006
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, the security aspect of an amplify-and-forward relaying network with untrusted relay nodes is considered. The untrusted nodes can help to forward the received signal and they may also try to decode such information, which can be regarded as potential eavesdroppers (Eves). To deal with such a challenging issue, a successive relaying scheme is adopted, where the multi-antenna source transmits to two selected nodes alternately, and the conventional detrimental inter-relay interference is used to jam the untrusted nodes without external helpers. Considering different complexity requirements, several relay selection schemes are proposed, and the closed-form expressions of the lower bound of secrecy outage probability are derived accordingly. To obtain some insights for the network design, an asymptotic analysis is also given, which shows that the maximum secrecy diversity order of N - 1 can be achieved, where N is the number of the untrusted relays. Moreover, the spectral efficiency is improved dramatically with the successive relaying scheme. Simulation results show that the proposed max-min scheme has almost the same performance as that of the optimal one, and the theoretical results match well with the simulation results.
引用
收藏
页码:2466 / 2476
页数:11
相关论文
共 34 条
  • [1] [Anonymous], 2007, TABLE INTEGRALS SERI
  • [2] A simple cooperative diversity method based on network path selection
    Bletsas, A
    Khisti, A
    Reed, DP
    Lippman, A
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (03) : 659 - 672
  • [3] Physical Layer Network Security in the Full-Duplex Relay System
    Chen, Gaojie
    Gong, Yu
    Xiao, Pei
    Chambers, Jonathon A.
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (03) : 574 - 583
  • [4] Secrecy Transmission With a Helper: To Relay or to Jam
    Deng, Hao
    Wang, Hui-Ming
    Guo, Wei
    Wang, Wenjie
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (02) : 293 - 307
  • [5] Improving Wireless Physical Layer Security via Cooperating Relays
    Dong, Lun
    Han, Zhu
    Petropulu, Athina P.
    Poor, H. Vincent
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2010, 58 (03) : 1875 - 1888
  • [6] Recovering multiplexing loss through successive relaying using repetition coding
    Fan, Yijia
    Wang, Chao
    Thompson, John
    Poor, H. Vincent
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2007, 6 (12) : 4484 - 4493
  • [7] Cooperation With an Untrusted Relay: A Secrecy Perspective
    He, Xiang
    Yener, Aylin
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2010, 57 (08) : 3807 - 3827
  • [8] An Efficient Successive Relaying Protocol for Multiple-Relay Cooperative Networks
    Hu, Yongxu
    Li, Kwok Hung
    Teh, Kah Chan
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2012, 11 (05) : 1892 - 1899
  • [9] Secure Communication Via an Untrusted Non-Regenerative Relay in Fading Channels
    Huang, Jing
    Mukherjee, Amitav
    Swindlehurst, A. Lee
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2013, 61 (10) : 2536 - 2550
  • [10] Joint Secure Beamforming Design at the Source and the Relay for an Amplify-and-Forward MIMO Untrusted Relay System
    Jeong, Cheol
    Kim, Il-Min
    Kim, Dong In
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2012, 60 (01) : 310 - 325