Trust-based Relay Selection in Relay-based Networks

  • Wu, Di (State Key Laboratory of Rail Traffic Control and Safety Beijing Jiaotong University) ;
  • Zhu, Gang (State Key Laboratory of Rail Traffic Control and Safety Beijing Jiaotong University) ;
  • Zhu, Li (State Key Laboratory of Rail Traffic Control and Safety Beijing Jiaotong University) ;
  • Ai, Bo (State Key Laboratory of Rail Traffic Control and Safety Beijing Jiaotong University)
  • Received : 2012.06.29
  • Accepted : 2012.09.20
  • Published : 2012.10.31

Abstract

It has been demonstrated that choosing an appropriate relay node can improve the transmission rate for the system. However, such system improvement brought by the relay selection may be degraded with the presence of the malicious relay nodes, which are selected but refuse to cooperate for transmissions deliberately. In this paper, we formulate the relay selection issue as a restless bandit problem with the objective to maximize the average rate, while considering the credibility of each relay node, which may be different at each time instant. Then the optimization problem is solved by using the priority-index heuristic method effectively. Furthermore, a low complexity algorithm is offered in order to facilitate the practical implementations. Simulation results are conducted to demonstrate the effectiveness of the proposed trust-based relay selection scheme.

Keywords

References

  1. F. Lin, T. Jiang, M. Guizani, et al, "Multicarrier modulation and cooperative communication in multihop cognitive radio networks," IEEE Wireless Communications, vol. 18, no. 1, pp. 38-45, Feb 2011. https://doi.org/10.1109/MWC.2011.5714024
  2. T. Jiang, S. Cui, J. An, et al, "Cooperative communications based on rateless network coding in distributed MIMO systems," IEEE Wireless Communications, vol.17, no.3, pp. 60-67, Jun 2010. https://doi.org/10.1109/MWC.2010.5490980
  3. B. H. Walke, D. C. Schultz, P. Herhold, et al, "Relay-based deployment concepts for wireless and mobile broadband radio," IEEE Communications Magazine, vol.42, pp.80-89, 2004.
  4. W. Ni, G. Shen, S. Jin, et al, Cooperative relay in IEEE 802.16j MMR. IEEE C802.16j-06\_006r1, Alcatel, Shanghai, China, Technical Report, 2006.
  5. J. N. Laneman, D. N. C. Tse, G. W. Wornell, "Cooperative diversity in wireless networks: Efficient protocols and outage behavior," IEEE Transation on Information Theory, vol. 50, no. 12, pp. 3062-3080, 2004. https://doi.org/10.1109/TIT.2004.838089
  6. A. Bletsas, A. Khisti, D. P. Reed, A. Lippman, "A simple cooperative diversity method based on network path selection," IEEE Journal on Selected Areas in Communications, vol. 24, no. 3, pp. 659-672, 2006. https://doi.org/10.1109/JSAC.2005.862417
  7. R. Madan, N. Mehta, A. Molisch, J. Zhang, "Energy-efficient cooperative relaying over fading channels with simple relay selection," IEEE Transactions on Wireless Communications, vol. 7, no. 8, pp. 3013-3025, 2008. https://doi.org/10.1109/TWC.2008.06090
  8. H. Halabian, F. R. Yu, I. Lambadaris, et al, "Trust establishment in cooperative wireless networks," in Proc. of Military Communications Conference, pp. 1074 - 1079, 2010.
  9. D. Quercia, S. Hailes, and L. Capra, "B-trust: Bayesian trust framework for pervasive computing," in Proc. of 4th International Conference on Trust Management, pp. 298-312, May 2006.
  10. Z. Han and Y. L. Sun, "Distributed cooperative transmission with unreliable and distrustful relay channels," EURASIP Journal on Wireless Communications and Networking, special issue on Wireless Network Security, pp.1-13, 2009.
  11. P. Sadeghi, "Finite-state Markov modeling of fading channels - a survey of principles and applications," IEEE Signal Processing Magazine, pp. 57-80, 2008.
  12. R. Zhang and L. Cai, "Markov modeling for data block transmission of OFDM systems over fading channels," in Proc. of IEEE International Conference on Communications, vol. 25, pp.1-5, 2009.
  13. Q. Zhang, S. A. Kassam, "Finite-state Markov model for Rayleigh fading channels," IEEE Transactions on Communications, vol.47, pp. 1688-1692, 1999. https://doi.org/10.1109/26.803503
  14. D. Bertsimas and J. Nino-Mora, "Restless bandits, linear programming relaxations, and a primal dual index heuristic," Oper. Res., vol. 48, no. 1, pp. 80-90, Jan 2000. https://doi.org/10.1287/opre.48.1.80.12444
  15. M. M. Fareed and M. Uysal, "A novel relay selection method for decode-and-forward relaying," in Proc. of Canadian Conference on Electrical and Computer Engineering, pp.135-140 May, 2008.