Relay Selection for Secure Successive AF Relaying Networks With Untrusted Nodes

被引:51
作者
Wang, Wei [1 ]
Teh, Kah Chan [1 ]
Li, Kwok Hung [1 ]
机构
[1] Nanyang Technol Univ, Sch Elect & Elect Engn, Singapore 639798, Singapore
关键词
Physical layer security; successive relaying; untrusted relay; relay selection; secrecy outage probability; diversity order; PHYSICAL-LAYER SECURITY; WIRE-TAP CHANNEL; INTERFERENCE CANCELLATION; POWER ALLOCATION; FADING CHANNELS; SECRECY; MAXIMIZATION; COOPERATION; PROTOCOLS; SYSTEMS;
D O I
10.1109/TIFS.2016.2584006
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, the security aspect of an amplify-and-forward relaying network with untrusted relay nodes is considered. The untrusted nodes can help to forward the received signal and they may also try to decode such information, which can be regarded as potential eavesdroppers (Eves). To deal with such a challenging issue, a successive relaying scheme is adopted, where the multi-antenna source transmits to two selected nodes alternately, and the conventional detrimental inter-relay interference is used to jam the untrusted nodes without external helpers. Considering different complexity requirements, several relay selection schemes are proposed, and the closed-form expressions of the lower bound of secrecy outage probability are derived accordingly. To obtain some insights for the network design, an asymptotic analysis is also given, which shows that the maximum secrecy diversity order of N - 1 can be achieved, where N is the number of the untrusted relays. Moreover, the spectral efficiency is improved dramatically with the successive relaying scheme. Simulation results show that the proposed max-min scheme has almost the same performance as that of the optimal one, and the theoretical results match well with the simulation results.
引用
收藏
页码:2466 / 2476
页数:11
相关论文
共 34 条
[11]   Partial Inter-Relay Interference Cancellation in Two Path Successive Relay Network [J].
Ji, Yuchu ;
Han, Changcai ;
Wang, Anguo ;
Shi, Heping .
IEEE COMMUNICATIONS LETTERS, 2014, 18 (03) :451-454
[12]   Opportunistic Transmission of Nonregenerative Network With Untrusted Relay [J].
Ju, MinChul ;
Kim, Do-Hoon ;
Hwang, Kyu-Sung .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2015, 64 (06) :2703-2709
[13]  
Kaliszan M., 2013, P IEEE INT C COMM IC, P2199
[14]   Capacity Scaling and Diversity Order for Secure Cooperative Relaying With Untrustworthy Relays [J].
Kim, Jung-Bin ;
Lim, Jaesung ;
Cioffi, John M. .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2015, 14 (07) :3866-3876
[15]   Rate Maximization Based Power Allocation and Relay Selection With IRI Consideration for Two-Path AF Relaying [J].
Kim, Seong Hwan ;
Chaitanya, Tumula V. K. ;
Le-Ngoc, Tho ;
Kim, Junsu .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2015, 14 (11) :6012-6027
[16]   Full-Duplex Relay Selection for Amplify-and-Forward Cooperative Networks [J].
Krikidis, Ioannis ;
Suraweera, Himal A. ;
Smith, Peter J. ;
Yuen, Chau .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2012, 11 (12) :4381-4393
[17]   The relay-eavesdropper channel: Cooperation for secrecy [J].
Lai, Lifeng ;
El Gamal, Hesham .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (09) :4005-4019
[18]  
LEUNGYANCHEONG SK, 1978, IEEE T INFORM THEORY, V24, P451, DOI 10.1109/TIT.1978.1055917
[19]   Random linear network coding:: A free cipher? [J].
Lima, Luisa ;
Medard, Muriel ;
Barros, Joao .
2007 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS, VOLS 1-7, 2007, :546-+
[20]   Secure Beamforming for MIMO Two-Way Communications With an Untrusted Relay [J].
Mo, Jianhua ;
Tao, Meixia ;
Liu, Yuan ;
Wang, Rui .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2014, 62 (09) :2185-2199