Security-Aware Relaying Scheme for Cooperative Networks With Untrusted Relay Nodes

被引:92
作者
Sun, Li [1 ,2 ]
Ren, Pinyi [1 ]
Du, Qinghe [1 ]
Wang, Yichen [1 ,3 ]
Gao, Zhenzhen [1 ]
机构
[1] Xi An Jiao Tong Univ, Dept Informat & Commun Engn, Xian 710049, Peoples R China
[2] Southeast Univ, Natl Mobile Commun Res Lab, Nanjing 210096, Jiangsu, Peoples R China
[3] Univ Maryland, College Pk, MD 20742 USA
基金
中国国家自然科学基金;
关键词
Cooperative communications; untrusted relays; relay selection; secrecy rate; PERFORMANCE; SELECTION;
D O I
10.1109/LCOMM.2014.2385095
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
This paper studies the problem of secure transmission in dual-hop cooperative networks with untrusted relays, where each relay acts as both a potential helper and an eavesdropper. A security-aware relaying scheme is proposed, which employs the alternate jamming and secrecy-enhanced relay selection to prevent the confidential message from being eavesdropped by the untrusted relays. To evaluate the performance of the proposed strategies, we derive the lower bound of the achievable ergodic secrecy rate (ESR), and conduct the asymptotic analysis to examine how the ESR scales as the number of relays increases.
引用
收藏
页码:463 / 466
页数:4
相关论文
共 14 条
[1]  
Behnad A., 2011, 18th International Conference on Telecommunications (ICT 2011), P157, DOI 10.1109/CTS.2011.5898909
[2]   A simple cooperative diversity method based on network path selection [J].
Bletsas, A ;
Khisti, A ;
Reed, DP ;
Lippman, A .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (03) :659-672
[3]   Improving Wireless Physical Layer Security via Cooperating Relays [J].
Dong, Lun ;
Han, Zhu ;
Petropulu, Athina P. ;
Poor, H. Vincent .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2010, 58 (03) :1875-1888
[4]   Cooperation With an Untrusted Relay: A Secrecy Perspective [J].
He, Xiang ;
Yener, Aylin .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2010, 57 (08) :3807-3827
[5]   Secure Communication Via an Untrusted Non-Regenerative Relay in Fading Channels [J].
Huang, Jing ;
Mukherjee, Amitav ;
Swindlehurst, A. Lee .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2013, 61 (10) :2536-2550
[6]   Joint Secure Beamforming Design at the Source and the Relay for an Amplify-and-Forward MIMO Untrusted Relay System [J].
Jeong, Cheol ;
Kim, Il-Min ;
Kim, Dong In .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2012, 60 (01) :310-325
[7]   Link Adaptation with Untrusted Relay Assignment: Design and Performance Analysis [J].
Khodakarami, Hamid ;
Lahouti, Farshad .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2013, 61 (12) :4874-4883
[8]   Relay Selection for Secure Cooperative Networks with Jamming [J].
Krikidis, Ioannis ;
Thompson, John S. ;
McLaughlin, Steve .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (10) :5003-5011
[9]   Opportunism in multiuser relay channels: Scheduling, routing and spectrum reuse [J].
Oyman, Oezguer .
2007 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS, VOLS 1-7, 2007, :286-+
[10]   Performance Study of Two-Hop Amplify-and-Forward Systems With Untrustworthy Relay Nodes [J].
Sun, Li ;
Zhang, Taiyi ;
Li, Yubo ;
Niu, Hao .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2012, 61 (08) :3801-3807