Relay Selection for Secure Successive AF Relaying Networks With Untrusted Nodes

作者: Wei Wang , Kah Chan Teh , Kwok Hung Li

DOI: 10.1109/TIFS.2016.2584006

关键词:

摘要: In this paper, the security aspect of an amplify-and-forward relaying network with untrusted relay nodes is considered. The can help to forward received signal and they may also try decode such information, which be regarded as potential eavesdroppers (Eves). To deal a challenging issue, successive scheme adopted, where multi-antenna source transmits two selected alternately, conventional detrimental inter-relay interference used jam without external helpers. Considering different complexity requirements, several selection schemes are proposed, closed-form expressions lower bound secrecy outage probability derived accordingly. obtain some insights for design, asymptotic analysis given, shows that maximum diversity order $N-1$ achieved, $N$ number relays. Moreover, spectral efficiency improved dramatically scheme. Simulation results show proposed max–min has almost same performance optimal one, theoretical match well simulation results.

参考文章(33)
Saeedeh Parsaeefard, Tho Le-Ngoc, Improving Wireless Secrecy Rate via Full-Duplex Relay-Assisted Protocols IEEE Transactions on Information Forensics and Security. ,vol. 10, pp. 2095- 2107 ,(2015) , 10.1109/TIFS.2015.2446436
Seong Hwan Kim, Tumula V. K. Chaitanya, Tho Le-Ngoc, Junsu Kim, Rate Maximization Based Power Allocation and Relay Selection With IRI Consideration for Two-Path AF Relaying IEEE Transactions on Wireless Communications. ,vol. 14, pp. 6012- 6027 ,(2015) , 10.1109/TWC.2015.2446979
Nikolaos Nomikos, Themistoklis Charalambous, Ioannis Krikidis, Dimitrios N. Skoutas, Demosthenes Vouyioukas, Mikael Johansson, A Buffer-Aided Successive Opportunistic Relay Selection Scheme With Power Adaptation and Inter-Relay Interference Cancellation for Cooperative Diversity Systems IEEE Transactions on Communications. ,vol. 63, pp. 1623- 1634 ,(2015) , 10.1109/TCOMM.2015.2416234
Jianhua Mo, Meixia Tao, Yuan Liu, Rui Wang, Secure Beamforming for MIMO Two-Way Communications With an Untrusted Relay IEEE Transactions on Signal Processing. ,vol. 62, pp. 2185- 2199 ,(2014) , 10.1109/TSP.2014.2307276
Li Sun, Taiyi Zhang, Yubo Li, Hao Niu, Performance Study of Two-Hop Amplify-and-Forward Systems With Untrustworthy Relay Nodes IEEE Transactions on Vehicular Technology. ,vol. 61, pp. 3801- 3807 ,(2012) , 10.1109/TVT.2012.2207438
Gan Zheng, Ioannis Krikidis, Jiangyuan Li, Athina P. Petropulu, Bjorn Ottersten, Improving Physical Layer Secrecy Using Full-Duplex Jamming Receivers IEEE Transactions on Signal Processing. ,vol. 61, pp. 4962- 4974 ,(2013) , 10.1109/TSP.2013.2269049
Luisa Lima, Muriel Medard, Joao Barros, Random Linear Network Coding: A free cipher? international symposium on information theory. pp. 546- 550 ,(2007) , 10.1109/ISIT.2007.4557282
Jung-Bin Kim, Jaesung Lim, John M. Cioffi, Capacity Scaling and Diversity Order for Secure Cooperative Relaying With Untrustworthy Relays IEEE Transactions on Wireless Communications. ,vol. 14, pp. 3866- 3876 ,(2015) , 10.1109/TWC.2015.2413784
Cheol Jeong, Il-Min Kim, Dong In Kim, Joint Secure Beamforming Design at the Source and the Relay for an Amplify-and-Forward MIMO Untrusted Relay System IEEE Transactions on Signal Processing. ,vol. 60, pp. 310- 325 ,(2012) , 10.1109/TSP.2011.2172433
Yuchu Ji, Changcai Han, Anguo Wang, Heping Shi, Partial Inter-Relay Interference Cancellation in Two Path Successive Relay Network IEEE Communications Letters. ,vol. 18, pp. 451- 454 ,(2014) , 10.1109/LCOMM.2014.011714.140016