Improved Relay Selection for Decode-and-Forward Cooperative Wireless Networks under Secrecy Rate Maximization

被引:0
作者
Bouallegue, Seifeddine [1 ]
Hasna, Mazen O. [1 ]
Hamila, Ridha [1 ]
Sethom, Kaouthar [2 ]
机构
[1] Qatar Univ, Elect Engn Dept, Doha, Qatar
[2] Univ Carthage, SUPCOM, INNOVCOM LAB, Carthage, Tunisia
来源
2014 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC) | 2014年
关键词
Physical-Layer; security; channel capacity; secrecy rate; outage probability; COMMUNICATION;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Privacy and security have an increasingly important role in wireless networks. A secure communication enables a legitimate destination to successfully retrieve information sent by a source, while it disables the eavesdropper (illegitimate destination) to interpret the intercepted information. Physical (PHY) layer security approaches for wireless communications can prevent eavesdropping without encryption. It exploits the physical characteristics of the wireless channel in order to transmit messages securely. They are typically feasible when the source-destination channel is better than the source-eavesdropper channel. Cooperative schemes are a means to improve the performance of secure wireless communications. We propose an improved relay selection scheme, based on source-eavesdropper channel SNR restriction, that will guarantee the best secrecy rate at the destination under QoS condition. Performance has been studied in terms of secrecy rate, outage probability and average error probability. Simulations shows that the proposed scheme outperforms in terms of the secrecy rate at the destination when compared to techniques in the literature.
引用
收藏
页码:530 / 535
页数:6
相关论文
共 12 条
[1]  
Chamkhia H, 2012, 2012 IEEE 23RD INTERNATIONAL SYMPOSIUM ON PERSONAL INDOOR AND MOBILE RADIO COMMUNICATIONS (PIMRC), P1552, DOI 10.1109/PIMRC.2012.6362594
[2]  
Chamkhia H., 2012, 2012 Computing, Communications and Applications Conference (ComComAp 2012), P71, DOI 10.1109/ComComAp.2012.6154005
[3]  
Gouissem A, 2012, 2012 IEEE 23RD INTERNATIONAL SYMPOSIUM ON PERSONAL INDOOR AND MOBILE RADIO COMMUNICATIONS (PIMRC), P1348, DOI 10.1109/PIMRC.2012.6362556
[4]   Opportunistic relay selection for cooperative networks with secrecy constraints [J].
Krikidis, I. .
IET COMMUNICATIONS, 2010, 4 (15) :1787-1791
[5]   Secure communication over fading channels [J].
Liang, Yingbin ;
Poor, H. Vincent ;
Sharnai , Shlorno .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) :2470-2492
[6]   Physical layer security in broadcast networks [J].
Liang, Yingbin ;
Poor, H. Vincent ;
Shamai , Shlomo .
SECURITY AND COMMUNICATION NETWORKS, 2009, 2 (03) :227-238
[7]   Multiple-Input Multiple-Output Gaussian Broadcast Channels With Confidential Messages [J].
Liu, Ruoheng ;
Liu, Tie ;
Poor, H. Vincent ;
Shamai , Shlomo .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2010, 56 (09) :4215-4227
[8]  
Liu YP, 2011, CONF REC ASILOMAR C, P109, DOI 10.1109/ACSSC.2011.6189965
[9]  
Omri A., 2012, 2012 International Conference on ICT Convergence (ICTC), P524, DOI 10.1109/ICTC.2012.6387190
[10]   COMMUNICATION THEORY OF SECRECY SYSTEMS [J].
SHANNON, CE .
BELL SYSTEM TECHNICAL JOURNAL, 1949, 28 (04) :656-715