Secure Switch-and-Stay Combining (SSSC) for Cognitive Relay Networks

被引:58
作者
Fan, Lisheng [1 ,2 ,3 ]
Zhang, Shengli [4 ]
Duong, Trung Q. [5 ]
Karagiannidis, George K. [6 ]
机构
[1] Shantou Univ, Dept Elect Engn, Shantou, Peoples R China
[2] Southeast Univ, Natl Mobile Commun Res Lab, Nanjing, Jiangsu, Peoples R China
[3] Guangzhou Univ, Sch Comp Sci & Educ Software, Guangzhou, Guangdong, Peoples R China
[4] Shenzhen Univ, Coll Informat Engn, Shenzhen, Peoples R China
[5] Queens Univ Belfast, Sch Elect Elect Engn & Comp Sci, Belfast, Antrim, North Ireland
[6] Aristotle Univ Thessaloniki, Dept Elect & Comp Engn, Thessaloniki 54124, Greece
关键词
Secure switch-and-stay combining (SSSC); cognitive relay networks; secure communication; diversity order; PHYSICAL-LAYER SECURITY; RESOURCE-ALLOCATION; DISTRIBUTED SWITCH; SECRECY RATE; SELECTION; INFORMATION; CAPACITY; DESIGN; SYSTEM; IMPACT;
D O I
10.1109/TCOMM.2015.2497308
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we study a two-phase underlay cognitive relay network, where there exists an eavesdropper who can overhear the message. The secure data transmission from the secondary source to secondary destination is assisted by two decode-and-forward (DF) relays. Although the traditional opportunistic relaying technique can choose one relay to provide the best secure performance, it needs to continuously have the channel state information (CSI) of both relays, and may result in a high relay switching rate. To overcome these limitations, a secure switch-and-stay combining (SSSC) protocol is proposed where only one out of the two relays is activated to assist the secure data transmission, and the secure relay switching occurs when the relay cannot support the secure communication any longer. This security switching is assisted by either instantaneous or statistical eavesdropping CSI. For these two cases, we study the system secure performance of SSSC protocol, by deriving the analytical secrecy outage probability as well as an asymptotic expression for the high main-to-eavesdropper ratio (MER) region. We show that SSSC can substantially reduce the system complexity while achieving or approaching the full diversity order of opportunistic relaying in the presence of the instantaneous or statistical eavesdropping CSI.
引用
收藏
页码:70 / 82
页数:13
相关论文
共 45 条
[1]   Distributed Switch and Stay Combining for Selection Relay Networks [J].
Bao, Vo Nguyen Quoc ;
Kong, Hyung Yun .
IEEE COMMUNICATIONS LETTERS, 2009, 13 (12) :914-916
[2]  
Dai M., 2013, IEEE T WIREL COMMUN, V10, P1895
[3]   Asymptotic Analysis of Cooperative Diversity Systems With Relay Selection in a Spectrum-Sharing Scenario [J].
Ding, Haiyang ;
Ge, Jianhua ;
da Costa, Daniel Benevides ;
Jiang, Zhuoqin .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2011, 60 (02) :457-472
[4]   Asymptotic Studies for the Impact of Antenna Selection on Secure Two-Way Relaying Communications with Artificial Noise [J].
Ding, Zhiguo ;
Ma, Zheng ;
Fan, Pingzhi .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2014, 13 (04) :2189-2203
[5]   Distributed Two-Way Switch and Stay Combining with a Single Amplify-and-Forward Relay [J].
Fan, Lisheng ;
Lei, Xianfu ;
Hu, Rose Qingyang ;
Zhang, Shengli .
IEEE WIRELESS COMMUNICATIONS LETTERS, 2013, 2 (04) :379-382
[6]   Secure Multiuser Communications in Multiple Amplify-and-Forward Relay Networks [J].
Fan, Lisheng ;
Lei, Xianfu ;
Duong, Trung Q. ;
Elkashlan, Maged ;
Karagiannidis, George K. .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2014, 62 (09) :3299-3310
[7]   Multiuser Cognitive Relay Networks: Joint Impact of Direct and Relay Communications [J].
Fan, Lisheng ;
Lei, Xianfu ;
Duong, Trung Q. ;
Hu, Rose Qingyang ;
Elkashlan, Maged .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2014, 13 (09) :5043-5055
[8]   Sensing and Recognition When Primary User Has Multiple Transmit Power Levels [J].
Gao, Feifei ;
Li, Jiachen ;
Jiang, Tao ;
Chen, Wen .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2015, 63 (10) :2704-2717
[9]   On the secrecy capacity of fading channels [J].
Gopala, Praveen Kumar ;
Lai, Lifeng ;
El Gamal, Hesham .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (10) :4687-4698
[10]   Cooperative Jamming for Secure Communications in MIMO Relay Networks [J].
Huang, Jing ;
Swindlehurst, A. Lee .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2011, 59 (10) :4871-4884