Successive relaying secure transmission scheme based on inter-relay interference cancellation
Correspondences|更新时间:2024-06-05
|
Successive relaying secure transmission scheme based on inter-relay interference cancellation
Journal on CommunicationsVol. 38, Issue 9, Pages: 185-192(2017)
作者机构:
国家数字交换系统工程技术研究中心,河南 郑州 450002
作者简介:
基金信息:
The National High Technology R&D Program of China(863 Pro-gram)(2014AA01A701);The National Natural Science Foundation of China(61379006);The Innovation Group Program Project of National Natural Science Foundation of China(61521003);The National Natural Science Foundation of China(61701538)
A secure scheme based on inter-relay interference cancellation was proposed to solve untrusted relay eavesdropping problem in successive relaying systems.First inter-relay interference between trusted relay and untrusted relay was exploited as artificial noise to degrade untrusted relay’s eavesdropping condition
then interference iterative cancellation was adapted to improve signal quality at legitimate user by making use of correlation between signals in time domain.Based on this
a quick power allocation algorithm aiming to minimize untrusted relay’s sum rate was proposed.Analysis and simulation results show that the proposed scheme suppress untrusted relay’s eavesdropping without loss of communication efficiency
a promotion of at least 2 bit·s
-1
·Hz
-1
in secrecy rate can be observed.
关键词
Keywords
references
CHEN G , YU G , PEI X , et al . Physical layer network security in the full-duplex relay system [J ] . IEEE Transactions on Information Forensics & Security , 2015 , 10 ( 3 ): 574 - 583 .
YANG S , BELFIORE J C . Towards the optimal amplify-and-forward cooperative diversity scheme [J ] . IEEE Transactions on Information Theory , 2006 , 53 ( 9 ): 3114 - 3126 .
RANKOV B , WITTNEBEN A . Spectral efficient protocols for half-duplex fading relay channels [J ] . IEEE Journal on Selected Areas in Communications , 2007 , 25 ( 2 ): 379 - 389 .
LUO C , GONG Y , ZHENG F . Full interference cancellation for two-path relay cooperative networks [J ] . IEEE Transactions on Vehicular Technology , 2011 , 60 ( 1 ): 343 - 347 .
WICAKSANA H , TING S H , GUAN Y L , et al . Decode-and-forward two-path half-duplex relaying:diversity-multiplexing tradeoff analysis [J ] . IEEE Transactions on Communications , 2011 , 59 ( 7 ): 1985 - 1994 .
REN C , CHEN J , KUO Y , et al . Differential successive relaying scheme for fast and reliable data delivery in vehicular ad hoc,networks [J ] . IET Communications , 2015 , 9 ( 8 ): 1088 - 1095 .
NOMIKOS N , CHARALAMBOUS T , KRIKIDIS I , et al . A buffer-aided successive opportunistic relay selection scheme with power adaptation and inter-relay interference cancellation for cooperative diversity systems [J ] . IEEE Transactions on Communications , 2014 , 63 ( 5 ): 1623 - 1634 .
HE X , YENER A . Cooperation with an untrusted relay:a secrecy perspective [J ] . IEEE Transactions on Information Theory , 2009 , 56 ( 8 ): 3807 - 3827 .
SUN L , ZHANG T , LI Y , et al . Performance study of two-hop amplify-and-forward systems with untrustworthy relay nodes [J ] . IEEE Transactions on Vehicular Technology , 2012 , 61 ( 8 ): 3801 - 3807 .
JEONG C , KIM I M , DONG I K . Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system [J ] . IEEE Transactions on Signal Processing , 2012 , 60 ( 1 ): 310 - 325 .
MO J , TAO M , LIU Y , et al . Secure beamforming for MIMO two-way communications with an untrusted relay [J ] . IEEE Transactions on Signal Processing , 2013 , 62 ( 9 ): 2185 - 2199 .
JU M C , KIM D H , HWANG K S . Opportunistic transmission of nonregenerative network with untrusted relay [J ] . IEEE Transactions on Vehicular Technology , 2015 , 64 ( 6 ): 2703 - 2709 .
HUANG J , MUKHERJEE A , SWINDLEHURST A L . Secure communication via an untrusted non-regenerative relay in fading channels [J ] . IEEE Transactions on Signal Processing , 2013 , 61 ( 10 ): 2536 - 2550 .
KIM J B , LIM J , CIOFFI J M . Capacity scaling and diversity order for secure cooperative relaying with untrustworthy relays [J ] . IEEE Transactions on Wireless Communications , 2015 , 14 ( 7 ): 3866 - 3876 .
WANG W , TEH K C , LI K H . Relay selection for secure successive af relaying networks with untrusted nodes [J ] . IEEE Transactions on Information Forensics & Security , 2016 , 11 ( 11 ): 2466 - 2476 .