Performance study of hybrid decode-amplify-forward (HDAF) relaying scheme for physical layer security in wireless cooperative network

被引:6
作者
Gurrala, Kiran Kumar [1 ]
Das, Susmita [1 ]
机构
[1] NIT Rourkela, Dept Elect Engn, Rourkela, Orissa, India
关键词
physical layer security; cooperative communication; HDAF relays; power allocation; secrecy rate; POWER ALLOCATION; TAP CHANNEL; SELECTION; SECRECY; OPTIMIZATION;
D O I
10.1002/dac.3182
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, the secrecy performance and power allocation of the signal-to-noise ratio-based hybrid decode-amplify-forward (HDAF) relaying protocol in wireless cooperative network are investigated to get security at physical layer. The performance metrics considered are secrecy rate and intercept probability. The Ergodic secrecy rate is approximated theoretically. The effect of relay and eavesdropper locations on the secrecy performance of the system is analyzed. It is found that maximum secrecy rate is obtained for the relay close-to-destination case and minimum for the relay close-to-eavesdropper case. Jamming schemes are superior in secrecy rate performance than without jamming schemes. To enhance the secrecy rate further with the optimized relay and jammer powers, invasive weed optimization (IWO) algorithm-based power allocation is proposed. Here, maximizing the secrecy rate is defined as the cost function for the proposed IWO algorithm-based power allocation. Comparative study is done over the conventional equal and proposed power allocation schemes for validation. The proposed power allocation scheme proved to be superior. Copyright (C) 2016 John Wiley & Sons, Ltd.
引用
收藏
页数:19
相关论文
共 26 条
[1]   Energy-Efficient Uplink Resource Allocation in LTE Networks With M2M/H2H Co-Existence Under Statistical QoS Guarantees [J].
Aijaz, Adnan ;
Tshangini, Mati ;
Nakhai, Mohammad Reza ;
Chu, Xiaoli ;
Aghvami, Abdol-Hamid .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2014, 62 (07) :2353-2365
[2]  
Bagadi KP, 2013, INT J COMMUNICATION, DOI [10.1002/dac.2640, DOI 10.1002/DAC.2640]
[3]   Wireless information-theoretic security [J].
Bloch, Matthieu ;
Barros, Joao ;
Rodrigues, Miguel R. D. ;
McLaughlin, Steven W. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) :2515-2534
[4]   Large-Scale MIMO Relaying Techniques for Physical Layer Security: AF or DF? [J].
Chen, Xiaoming ;
Lei, Lei ;
Zhang, Huazi ;
Yuen, Chau .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2015, 14 (09) :5135-5146
[5]   Improving Wireless Physical Layer Security via Cooperating Relays [J].
Dong, Lun ;
Han, Zhu ;
Petropulu, Athina P. ;
Poor, H. Vincent .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2010, 58 (03) :1875-1888
[6]   Secure Wireless Communications via Cooperation [J].
Dong, Lun ;
Han, Zhu ;
Petropulu, Athina P. ;
Poor, H. Vincent .
2008 46TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, VOLS 1-3, 2008, :1132-+
[7]  
Dongxia L., 2011, 2011 IEEE INT C COMM, P1
[8]   A New Relay and Jammer Selection Schemes for Secure One-Way Cooperative Networks [J].
Ibrahim, Doaa H. ;
Hassan, Emad S. ;
El-Dolil, Sami A. .
WIRELESS PERSONAL COMMUNICATIONS, 2014, 75 (01) :665-685
[9]   Relay Selection for Secure Cooperative Networks with Jamming [J].
Krikidis, Ioannis ;
Thompson, John S. ;
McLaughlin, Steve .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (10) :5003-5011
[10]   The relay-eavesdropper channel: Cooperation for secrecy [J].
Lai, Lifeng ;
El Gamal, Hesham .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (09) :4005-4019