Secure Multiuser Communications in Multiple Amplify-and-Forward Relay Networks

被引:114
作者
Fan, Lisheng [1 ,2 ]
Lei, Xianfu [3 ]
Duong, Trung Q. [4 ]
Elkashlan, Maged [5 ]
Karagiannidis, George K. [6 ,7 ]
机构
[1] Shantou Univ, Dept Elect Engn, Shantou 515063, Peoples R China
[2] Southeast Univ, Natl Mobile Commun Res Lab, Nanjing 210096, Jiangsu, Peoples R China
[3] Utah State Univ, Dept Elect & Comp Engn, Logan, UT 84322 USA
[4] Queens Univ Belfast, Belfast BT7 1NN, Antrim, North Ireland
[5] Queen Mary Univ London, London E1 4NS, England
[6] Khalifa Univ, Dept Elect & Comp Engn, Abu Dhabi, U Arab Emirates
[7] Aristotle Univ Thessaloniki, Dept Elect & Comp Engn, Thessaloniki 54124, Greece
关键词
Multiuser communications; multi-relay cooperative networks; multiple eavesdroppers; physical layer security; secrecy outage probability; PHYSICAL-LAYER SECURITY; COOPERATIVE NETWORKS; CHANNEL ESTIMATION; SECRECY CAPACITY; SELECTION; PERFORMANCE; APPROXIMATION; MODEL;
D O I
10.1109/TCOMM.2014.2345763
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper proposes relay selection to increase the physical layer security in multiuser cooperative relay networks with multiple amplify-and-forward relays, in the presence of multiple eavesdroppers. To strengthen the network security against eavesdropping attack, we present three criteria to select the best relay and user pair. Specifically, criteria I and II study the received signal-to-noise ratio (SNR) at the receivers, and perform the selection by maximizing the SNR ratio of the user to the eavesdroppers. To this end, criterion I relies on both the main and eavesdropper links, while criterion II relies on the main links only. Criterion III is the standard max-min selection criterion, which maximizes the minimum of the dual-hop channel gains of main links. For the three selection criteria, we examine the system secrecy performance by deriving the analytical expressions for the secrecy outage probability. We also derive the asymptotic analysis for the secrecy outage probability with high main-to-eavesdropper ratio. From the asymptotic analysis, an interesting observation is reached: for each criterion, the system diversity order is equivalent to the number of relays regardless of the number of users and eavesdroppers.
引用
收藏
页码:3299 / 3310
页数:12
相关论文
共 41 条
[1]   Performance of Transmit Antenna Selection Physical Layer Security Schemes [J].
Alves, Hirley ;
Souza, Richard Demo ;
Debbah, Merouane ;
Bennis, Mehdi .
IEEE SIGNAL PROCESSING LETTERS, 2012, 19 (06) :372-375
[2]  
[Anonymous], 1990, Integrals and Series. More Special Functions
[3]   Accuracy of Harmonic Mean Approximation in Performance Analysis of Multihop Amplify-and-Forward Relaying [J].
Behnad, Aydin ;
Wang, Xianbin .
IEEE WIRELESS COMMUNICATIONS LETTERS, 2014, 3 (02) :125-128
[4]   Wireless information-theoretic security [J].
Bloch, Matthieu ;
Barros, Joao ;
Rodrigues, Miguel R. D. ;
McLaughlin, Steven W. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) :2515-2534
[5]  
de Melo, 2012, P 18 EUR WIR C POZN, P1
[6]   Improving Wireless Physical Layer Security via Cooperating Relays [J].
Dong, Lun ;
Han, Zhu ;
Petropulu, Athina P. ;
Poor, H. Vincent .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2010, 58 (03) :1875-1888
[7]   Multiuser Cognitive Relay Networks: Joint Impact of Direct and Relay Communications [J].
Fan, Lisheng ;
Lei, Xianfu ;
Duong, Trung Q. ;
Hu, Rose Qingyang ;
Elkashlan, Maged .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2014, 13 (09) :5043-5055
[8]   Outdated Relay Selection in Two-Way Relay Network [J].
Fan, Lisheng ;
Lei, Xianfu ;
Hu, Rose Qingyang ;
Seah, Winston .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2013, 62 (08) :4051-4057
[9]   Superimposed Training Based Channel Estimation for OFDM Modulated Amplify-and-Forward Relay Networks [J].
Gao, Feifei ;
Jiang, Bin ;
Gao, Xiqi ;
Zhang, Xian-Da .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2011, 59 (07) :2029-2039
[10]   Channel Estimation for OFDM Modulated Two-Way Relay Networks [J].
Gao, Feifei ;
Zhang, Rui ;
Liang, Ying-Chang .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2009, 57 (11) :4443-4455