© The Institution of Engineering and Technology
In this study, the authors evaluate secrecy performance of cooperative protocols with relay selection methods under impact of co-channel interference. In particular, the authors propose an optimal selection scheme to maximise the secrecy capacity obtained at the cooperative phase. In addition, the authors also consider suboptimal and random selection schemes which reduce the complexity of implementation, when compared with the optimal one. For performance evaluation, the authors derive exact and asymptotic closed-form expressions of secrecy outage probability and probability of non-zero secrecy capacity for the considered schemes over Rayleigh fading channels. Monte Carlo simulations are performed to validate the derivations.
References
-
-
1)
-
16. Sun, L., Zhang, T., Li, Y., Niu, H.: ‘Performance study of two-hop amplify-and-forward systems with untrustworthy relay nodes’, IEEE Trans. Veh. Technol., 2012, 61, (8), pp. 3801–3807 (doi: 10.1109/TVT.2012.2207438).
-
2)
-
2. Laneman, J.N., Tse, D.N.C., Wornell, G.W.: ‘Cooperative diversity in wireless networks: Efficient protocols and outage behavior’, IEEE Trans. Inf. Theory, 2004, 50, (12), pp. 3062–3080 (doi: 10.1109/TIT.2004.838089).
-
3)
-
18. Wang, L., Elkashlan, M., Huang, J., Tran, N.H., Duong, T.Q.: ‘Secure transmission with optimal power allocation in untrusted relay networks’, IEEE Wirel. Commun. Lett., 2014, 3, (3), pp. 289–292 (doi: 10.1109/WCL.2014.031114.140018).
-
4)
-
19. Zhou, N.R., Chen, X., Li, C.S., Xue, Z.: ‘Secrecy rate of two-hop AF relaying networks with an untrusted relay’, Wirel. Pers. Commun., 2014, 75, (1), pp. 119–129 (doi: 10.1007/s11277-013-1351-1).
-
5)
-
29. Gradshteyn, I.S., Ryzhik, I.M.: ‘Table of integrals, series, and products’ (Academic Press, 2007, 7th edn.).
-
6)
-
10. Ikki, S.S., Ahmed, M.H.: ‘On the performance of cooperative-diversity networks with the Nth best-relay selection scheme’, IEEE Trans. Commun., 2010, 58, (11), pp. 3062–3069 (doi: 10.1109/TCOMM.2010.092810.090322).
-
7)
-
27. Liu, Y., Wang, L., Duy, T.T., Elkashlan, M., Duong, T.Q.: ‘Relay selection for security enhancement in cognitive relay networks’, IEEE Wirel. Commun. Lett., 2015, 4, (1), pp. 46–49 (doi: 10.1109/LWC.2014.2365808).
-
8)
-
8. Guo, Y., Kang, G., Zhang, N., Zhou, W., Zhang, P.: ‘Outage performance of relay assisted cognitive-radio system under spectrum-sharing constraints’, Electron. Lett., 2010, 46, (2), pp. 182–184 (doi: 10.1049/el.2010.2159).
-
9)
-
15. Duong, T.Q., Duy, T.T., Elkashlan, M., Tran, N.H., Dobre, O.A.: ‘Secured cooperative cognitive radio networks with relay selection’. IEEE Global Communications Conf., Austin, TX USA, December 2014, pp. 3074–3079.
-
10)
-
3. Bletsas, A., Khisti, A., Reed, D.P., Lippman, A.: ‘A simple cooperative diversity method based on network path selection’, IEEE J. Sel. Areas Commun., 2006, 24, (3), pp. 659–672 (doi: 10.1109/JSAC.2005.862417).
-
11)
-
9. Ikki, S.S., Ahmed, M.H.: ‘On the performance of adaptive decode-and-forward cooperative diversity with the nth best-relay selection scheme’. Proc. IEEE Global Telecommunications Conf., Honolulu, HI, 2009, pp. 1–6.
-
12)
-
20. Chen, J., Zhang, R., Song, L., Han, Z., Jiao, B.: ‘Joint relay and jammer selection for secure two-way relay networks’, IEEE Trans. Inf. Forensics Sec., 2012, 7, (1), pp. 310–320 (doi: 10.1109/TIFS.2011.2166386).
-
13)
-
5. Tourki, K., Yang, H.-C., Alouini, M.-S.: ‘Accurate outage analysis of incremental decode-and-forward opportunistic relaying’, IEEE Trans. Wirel. Commun., 2011, 10, (4), pp. 1021–1025 (doi: 10.1109/TWC.2011.021611.100472).
-
14)
-
26. Soleimani-Nasab, E., Matthaiou, M., Ardebilipour, M., Karagiannidis, G.K.: ‘Two-way AF relaying in the presence of co-channel interference’, IEEE Trans. Commun., 2013, 61, (8), pp. 3156–3169 (doi: 10.1109/TCOMM.2013.053013.120840).
-
15)
-
12. Krikidis, I.: ‘Opportunistic relay selection for cooperative networks with secrecy constraints’, IET Commun., 2010, 4, (15), pp. 1787–1791 (doi: 10.1049/iet-com.2009.0634).
-
16)
-
28. Proakis, J.G.: ‘Digital communications’ (Mc Graw Hill, 2000, 4th edn.).
-
17)
-
11. Krikidis, I., Thompson, J.S., McLaughlin, S.: ‘Relay selection for secure cooperative networks with jamming’, IEEE Trans. Wirel. Commun., 2009, 8, (10), pp. 5003–5011 (doi: 10.1109/TWC.2009.090323).
-
18)
-
17. Huang, J., Mukherjee, A., Swindlehurst, A.L.: ‘Secure communication via an untrusted non-regenerative relay in fading channels’, IEEE Trans. Signal Process., 2013, 61, (10), pp. 2536–2550 (doi: 10.1109/TSP.2013.2247600).
-
19)
-
1. Laneman, J.N., Wornell, G.W.: ‘Distributed space-time coded protocols for exploiting cooperative diversity in wireless Networks’, IEEE Trans. Inf. Theory, 2003, 49, (10), pp. 2415–2425 (doi: 10.1109/TIT.2003.817829).
-
20)
-
7. Zhao, B., Valenti, M.C.: ‘Practical relay networks: a generalization of hybrid-ARQ’, IEEE J. Sel. Areas Commun., 2005, 23, (1), pp. 7–18 (doi: 10.1109/JSAC.2004.837352).
-
21)
-
21. Wang, H.-M., Luo, M., Xia, X.-G., Yin, Q.: ‘Joint cooperative beamforming and jamming to secure AF relay systems with individual power constraint and no eavesdropper's CSI’, IEEE Signal Process. Lett., 2013, 20, (1), pp. 39–42 (doi: 10.1109/LSP.2012.2227725).
-
22)
-
23. Wang, H.-M., Luo, M., Yin, Q., Xia, X.-G.: ‘Hybrid cooperative beamforming and jamming for physical-layer security of two-way relay networks’, IEEE Trans. Inf. Forensics Sec., 2013, 8, (12), pp. 2007–2020 (doi: 10.1109/TIFS.2013.2287046).
-
23)
-
4. Duong, T.Q., Bao, V.N.Q.: ‘Performance analysis of selection decode-and-forward relay networks’, Electron. Lett., 2008, 44, (12), pp. 1206–1207 (doi: 10.1049/el:20081952).
-
24)
-
24. Wang, C., Wang, H.-M., Xia, X.-G.: ‘Hybrid opportunistic relaying and jamming with power allocation for secure cooperative networks’, IEEE Trans. Wirel. Commun., 2015, 14, (2), pp. 589–605 (doi: 10.1109/TWC.2014.2354635).
-
25)
-
22. Liu, Y., Li, J., Petropulu, A.P.: ‘Destination assisted cooperative jamming for wireless physical-layer security’, IEEE Trans. Inf. Forensics Sec., 2013, 8, (4), pp. 682–694 (doi: 10.1109/TIFS.2013.2248730).
-
26)
-
14. Bao, V.N.Q., Trung, N.L., Debbah, M.: ‘Relay selection scheme for dual-hop networks under security constraints with multiple eavesdroppers’, IEEE Trans. Wirel. Commun., 2013, 12, (12), pp. 6076–6085 (doi: 10.1109/TWC.2013.110813.121671).
-
27)
-
6. Zhao, Y., Adve, R., Lim, T.J.: ‘Outage probability at arbitrary SNR with cooperative diversity’, IEEE Commun. Lett., 2005, 9, (8), pp. 700–702 (doi: 10.1109/LCOMM.2005.1496587).
-
28)
-
13. Dong, L., Han, Z., Petropulu, A.P., Poor, H.V.: ‘Improving wireless physical layer security via cooperating relays’, IEEE Trans. Signal Process., 2010, 58, (3), pp. 1875–1888 (doi: 10.1109/TSP.2009.2038412).
-
29)
-
25. Suraweera, H.A., Garg, H.K., Nallanathan, A.: ‘Performance analysis of two hop amplify-and-forward systems with interference at the relay’, IEEE Commun. Lett., 2010, 14, (8), pp. 692–694 (doi: 10.1109/LCOMM.2010.08.100109).
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-com.2014.1128
Related content
content/journals/10.1049/iet-com.2014.1128
pub_keyword,iet_inspecKeyword,pub_concept
6
6