Optimal Relay Selection with a Full-duplex Active Eavesdropper in Cooperative Wireless Networks

被引:0
作者
Zhou, He [1 ]
He, Dongxuan [1 ]
Wang, Hua [1 ]
Yang, Dewei [1 ]
机构
[1] Beijing Inst Technol, Beijing, Peoples R China
来源
2019 IEEE 89TH VEHICULAR TECHNOLOGY CONFERENCE (VTC2019-SPRING) | 2019年
基金
中国国家自然科学基金;
关键词
SECURITY;
D O I
10.1109/vtcspring.2019.8746466
中图分类号
U [交通运输];
学科分类号
08 ; 0823 ;
摘要
In this paper, we investigate the physical layer security of a dual-hop cooperative network in the presence of a full-duplex active eavesdropper, which can overhear the confidential signals and transmit jamming signals simultaneously. We utilize the optimal relay selection scheme to improve the secrecy performance, where the relay maximizing the secrecy capacity will be selected to forward the information. To evaluate the secrecy performance of our system, we derive a compact closed-form expression of the secrecy outage probability. Besides, we also analyze the asymptotic performance related to the position of the nodes. Finally, we verify our analysis through the numerical results, and demonstrate that there exists a secrecy protection region where the secrecy outage probability is below a target probability.
引用
收藏
页数:5
相关论文
共 16 条
  • [1] [Anonymous], 2007, TABEL INTEGRALS SERI
  • [2] Wireless information-theoretic security
    Bloch, Matthieu
    Barros, Joao
    Rodrigues, Miguel R. D.
    McLaughlin, Steven W.
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) : 2515 - 2534
  • [3] Physical Layer Network Security in the Full-Duplex Relay System
    Chen, Gaojie
    Gong, Yu
    Xiao, Pei
    Chambers, Jonathon A.
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (03) : 574 - 583
  • [4] Jian-Jiun Ding, 2016, 2016 IEEE International Conference on Consumer Electronics - Taiwan (ICCE-TW), P1, DOI 10.1109/ICCE-TW.2016.7521049
  • [5] Cooperative diversity in wireless networks: Efficient protocols and outage behavior
    Laneman, JN
    Tse, DNC
    Wornell, GW
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2004, 50 (12) : 3062 - 3080
  • [6] Lei XF, 2014, IEEE GLOB COMM CONF, P3180, DOI 10.1109/GLOCOM.2014.7037295
  • [7] MIMO Secret Communications Against an Active Eavesdropper
    Li, Lingxiang
    Petropulu, Athina P.
    Chen, Zhi
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (10) : 2387 - 2401
  • [8] Liu CF, 2017, IEEE GLOBE WORK
  • [9] Relay Selection for Security Enhancement in Cognitive Relay Networks
    Liu, Yuanwei
    Wang, Lifeng
    Tran Trung Duy
    Elkashlan, Maged
    Duong, Trung Q.
    [J]. IEEE WIRELESS COMMUNICATIONS LETTERS, 2015, 4 (01) : 46 - 49
  • [10] Destination Assisted Cooperative Jamming for Wireless Physical-Layer Security
    Liu, Yupeng
    Li, Jiangyuan
    Petropulu, Athina P.
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (04) : 682 - 694