Security versus reliability analysis for multi-eavesdropper cooperation wireless networks with best relay
Papers|更新时间:2024-06-05
|
Security versus reliability analysis for multi-eavesdropper cooperation wireless networks with best relay
Journal on CommunicationsVol. 38, Issue 10, Pages: 71-80(2017)
作者机构:
1. 太原科技大学电子信息工程学院,山西 太原 030024
2. 北京邮电大学信息与通信工程学院,北京 100876
3. 北京市网络与体系架构重点实验室,北京 100876
作者简介:
基金信息:
The National Natural Science Foundation of China(41272374);The National Natural Science Foundation of China(61672373);The Young Science and Technology Research Fund of Shanxi Province(2014021021-2);Jincheng Technology Research Projects of Shanxi Province(201501004-4);Research Project of Taiyuan University of Science and Technology(20152023)
Mei-ling LI, Zeng-shou DONG, Gang-fei WANG, et al. Security versus reliability analysis for multi-eavesdropper cooperation wireless networks with best relay[J]. Journal on Communications, 2017, 38(10): 71-80.
DOI:
Mei-ling LI, Zeng-shou DONG, Gang-fei WANG, et al. Security versus reliability analysis for multi-eavesdropper cooperation wireless networks with best relay[J]. Journal on Communications, 2017, 38(10): 71-80. DOI: 10.11959/j.issn.1000-436x.2017199.
Security versus reliability analysis for multi-eavesdropper cooperation wireless networks with best relay
Physical-layer security could be used to effectively combat eavesdroppers and the transmission reliability of the main link could be improved.A wireless relay network with multiple both decode and forward eavesdroppers and relays were considered
in the presence of the link from source to destination.A best relay selection scheme based on multieavesdropper’s cooperation was proposed
and the outage probability and the intercept probability was deduced under both schemes without relay and with best relay.Then
the security and reliability influenced by different relay selection schemes were analyzed.The simulation results show that the achievable channel capacity at the destination node and the system outage probability are directly affected by different relay selection scheme.Lower system outage probability can be achieved by the proposed scheme
and the system outage probability and intercept probability are both decreased with the increase of the number of relays.The intercept probability increases with the increase of the number of eavesdroppers
which
however
can be reduced by increasing the number of relays to ensure the main link’s reliable transmission.
关键词
Keywords
references
LI J , FENG Z , FENG Z , et al . A survey of security issues in cognitive radio networks [J ] . China Communications , 2015 , 12 ( 3 ): 132 - 149 .
ZOU Y , ZHU J , WANG X . A survey on wireless security:technical challenges,recent advances,and future trends [J ] . Proceedings of the IEEE , 2016 , 104 ( 9 ): 1727 - 1765 .
MUKHERJEE A , FAKOORIAN S A , HUANG J , et al . Principles of physical layer security in multiuser wireless networks:a survey [J ] . IEEE Communications Surveys & Tutorials , 2014 , 16 ( 3 ): 1550 - 1573 .
都晨辉 . 协作网络中物理层安全关键技术研究 [D ] . 北京:北京邮电大学 , 2014 .
DU C H . Physical layer security in collaboration communications networks [D ] . Beijing:Beijing University of Posts and Telecommunications , 2014 .
LAI L , GAMAL H E . The relay-eavesdropper channel:cooperation for secrecy [J ] . IEEE Transactions on Information Theory , 2008 , 54 ( 9 ): 4005 - 4019 .
GOECKEL D , VASUDEVAN S , TOWSLEY D , et al . Artificial noise generation from cooperative relays for everlasting secrecy in two-hop wireless networks [J ] . IEEE Journal on Selected Areas in Communications , 2011 , 29 ( 10 ): 2067 - 2076 .
LIAO W , CHANG T , MA W , et al . QoS-based transmit beamforming in the presence of eavesdroppers:an optimized artificial-noise-aided approach [J ] . IEEE Transactions on Signal Processing , 2011 , 59 ( 3 ): 1202 - 1216 .
ZOU Y , WANG X , SHEN W . Optimal relay selection for physical-layer security in cooperative wireless networks [J ] . IEEE Journal on Selected Areas in Communications , 2013 , 31 ( 10 ): 2099 - 2111 .
ZOU Y , WANG X , SHEN W . Security versus reliability analysis of opportunistic relaying [J ] . IEEE Transactions on Vehicular Technology , 2014 , 63 ( 6 ): 2653 - 2661 .
ZOU Y , ZHU J , WANG X , et al . Improving physical-layer security in wireless communications using diversity techniques [J ] . IEEE Network , 2014 , 29 ( 1 ): 42 - 48 .
DAI B , MA Z . Multiple-access relay wiretap channel [J ] . IEEE Transactions on Information Forensics and Security , 2015 , 10 ( 9 ): 1835 - 184 .
CHEN J C , ZHANG R Q , SONG L , et al . Joint relay and jammer selection for secure two-way relay networks [J ] . IEEE Transactions on Information Forensics and Security , 2012 , 7 ( 1 ): 310 - 320 .
DING X , SONG T , ZOU Y , et al . Improving secrecy for multi-relay multi-eavesdropper wireless systems through relay selection [J ] . Transactions on Emerging Telecommunications Technologies , 2016 , 27 ( 7 ): 982 - 991 .
LI M L . Performance analysis and optimization of cooperative specterum sensing with relay [J ] . Journal on Communications , 2013 , 34 ( 9 ): 33 - 40 .
LIU T X , SONG L Y . A threshold-based hybrid relay selection scheme [C ] // The Wireless Communications and Networking Conference Workshops . 2010 : 1 - 5 .
Security-driven service caching and computation offloading strategy in air-ground collaborative edge computing networks
Establishment and performance analysis of RIS-assisted coded relay cooperation system based on LDPC product codes
Research on non-orthogonal transmission strategy for content delivery in caching networks
Outage performance analysis of IRS-aided cognitive satellite-terrestrial network
Performance analysis for cooperative NOMA networks based SWIPT with adaptive power splitting
Related Author
WU Mengru
KONG Yawei
HAN Huimei
LU Haiquan
SI Peiyuan
LU Weidang
GUO Lei
Shunwai ZHANG
Related Institution
Institute of Intelligent Communication and Network Security, School of Communication and Information Engineering, Chongqing University of Posts and Telecommunications
School of Computing, Nanyang Technological University
National Mobile Communications Research Laboratory, Southeast University
College of Information Engineering, Zhejiang University of Technology
College of Telecommunications and Information Engineering, Nanjing University of Posts and Telecommunications