Opportunistic relay selection for cooperative networks with secrecy constraints

Opportunistic relay selection for cooperative networks with secrecy constraints

For access to this article, please select a purchase option:

Buy article PDF
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend to library

You must fill out fields marked with: *

Librarian details
Your details
Why are you recommending this title?
Select reason:
IET Communications — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

This study deals with opportunistic relay selection in cooperative networks with secrecy constraints, where an eavesdropper node tries to overhead the source message. Previously reported relay selection techniques are optimised for non-eavesdropper environments and cannot ensure security. Two new opportunistic relay selection techniques, which incorporate the quality of the relay-eavesdropper links and take into account secrecy rate issues, are investigated. The first scheme assumes an instantaneous knowledge of the eavesdropper channels and maximises the achievable secrecy rate. The second one assumes an average knowledge of the eavesdropper channels and is a suboptimal selection solution appropriate for practical applications. Both schemes are analysed in terms of secrecy outage probability and their enhancements against conventional opportunistic selection policies are validated via numerical and theoretical results.


    1. 1)
    2. 2)
      • L. Lai , H. El Gamal . The relay-eavesdropper channel: cooperation for secrecy. IEEE Trans. Inf. Theory , 4005 - 4019
    3. 3)
      • Barros, J., Rodrigues, M.R.D.: `Secrecy capacity of wireless channels', Proc. IEEE Int. Symp. Inf. Theory, July 2006, Seattle, USA, p. 356–360.
    4. 4)
      • Dong, L., Han, Z., Petropulu, A.P., Poor, H.V.: `Secure wireless communications via cooperation', Proc. Allerton Conf. Commun. Cont. Comp., September 2008, Urbana-Champaign, IL, USA.
    5. 5)
      • V. Aggarwal , L. Sankar , A.R. Calderbank , H.V. Poor . Secrecy capacity of a class of orthogonal relay eavesdropper channels. EURASIP J. Wirel. Commun. Net. , 1 - 14
    6. 6)
      • P. Popovski , O. Simeone . Wireless secrecy in cellular systems with infrastructure-aided cooperation. IEEE Trans. Inf. Foren. Sec. , 242 - 256
    7. 7)
      • A. Bletsas , A. Khisti , D.P. Reed , A. Lippman . A simple cooperative diversity method based on network path selection. IEEE Trans. Wirel. Commun. , 3450 - 3460
    8. 8)
      • A. Ozgur , O. Leveque , D. Tse . Hierarchical cooperation achieves optimal capacity scaling in ad hoc networks. IEEE Trans. Inf. Theory , 3549 - 3572
    9. 9)
    10. 10)
      • I. Krikidis , J.N. Laneman , J.S. Thompson , S. McLaughlin . Protocol design and throughput analysis for multi-user cognitive cooperative systems. IEEE Trans. Wirel. Commun. , 4740 - 4751
    11. 11)
      • R. Tannious , A. Nosratinia . Spectrally-efficient relay selection with limited feedback. IEEE J. Sel. Areas Commun. , 1419 - 1428
    12. 12)
      • A. Papoulis . (1965) Probability, random variables, and stochastic processes.
    13. 13)
      • F.A. Onat , A. Adinoyi , Y. Fan , H. Yanikomeroglu , J.S. Thompson , I.D. Marsland . Threshold selection for SNR-based selective digital relaying in cooperative wireless networks. IEEE Trans. Wirel. Commun. , 4226 - 4237

Related content

This is a required field
Please enter a valid email address