DOI QR코드

DOI QR Code

Security Performance Analysis of DF Cooperative Relay Networks over Nakagami-m Fading Channels

  • Zhang, Huan (Chongqing Key Lab of Mobile Communications Technology Chongqing University of Posts and Telecommunications) ;
  • Lei, Hongjiang (Chongqing Key Lab of Mobile Communications Technology Chongqing University of Posts and Telecommunications) ;
  • Ansari, Imran Shafique (Department of Electrical and Computer Engineering, Texas A&M University at Qatar) ;
  • Pan, Gaofeng (Chongqing Key Laboratory of Nonlinear Circuits and Intelligent Information Processing Southwest University) ;
  • Qaraqe, Khalid A. (Department of Electrical and Computer Engineering, Texas A&M University at Qatar)
  • Received : 2016.11.09
  • Accepted : 2017.03.05
  • Published : 2017.05.31

Abstract

In this paper, we investigate the security performance for cooperative networks over Nakagami-m fading channels. Based on whether the channel state information (CSI) of wiretap link is available or not, optimal relay selection (ORS) and suboptimal relay selection (SRS) schemes are considered. Also, multiple relays combining (MRC) scheme is considered for comparison purpose. The exact and asymptotic closed-form expressions for secrecy outage probability (SOP) are derived and simulations are presented to validate the accuracy of our proposed analytical results. The numerical results illustrate that the ORS is the best scheme and SRS scheme is better than MRC scheme in some special scenarios such as when the destination is far away from the relays. Furthermore, through asymptotic analysis, we obtain the closed-form expressions for the secrecy diversity order and secrecy array gain for the three different selection schemes. The secrecy diversity order is closely related to the number of relays and fading parameter between relay and destination.

Keywords

References

  1. A. D. Wyner, "The wire-tap channel," The Bell System Technical Journal, vol. 54, no. 8, pp. 1355-1387, October 1975. https://doi.org/10.1002/j.1538-7305.1975.tb02040.x
  2. M. Bloch, J. Barros, M. R. Rodrigues, and S. W. McLaughlin, "Wireless information-theoretic security," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515-2534, June 2008. https://doi.org/10.1109/TIT.2008.921908
  3. A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas I: The MISOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 7, pp. 3088-3104, July 2010. https://doi.org/10.1109/TIT.2010.2048445
  4. A. Khisti and G. W. Wornell, A. Khisti and G. W. Wornell, "Secure transmission with multiple antenna-part II: The MIMOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5515-5532, November 2010. https://doi.org/10.1109/TIT.2010.2068852
  5. H. Alves, R. D. Souza, M. R. Debbah, and M. Bennis, "Performance of transmit antenna selection physical layer security schemes," IEEE Signal Process. Lett., vol. 19, no. 6, pp. 372-375, June 2012. https://doi.org/10.1109/LSP.2012.2195490
  6. N. Yang, P. L. Yeoh, M. Elkashlan, R. Schober, and I. B. Collings, "Transmit antenna selection for security enhancement in MIMO wiretap channels," IEEE Trans. Commun., vol. 61, no. 1, pp. 144-154, January 2013. https://doi.org/10.1109/TCOMM.2012.12.110670
  7. H. Lei, C. Gao, I. Ansari, Y. Guo, Y. Zou, G. Pan, K. A. Qaraqe, "Secrecy outage performance of transmit antenna selection for MIMO underlay cognitive radio systems over Nakagami-m channels," IEEE Trans. Veh. Technol.
  8. H. M. Wang and X. G. Xia, "Enhancing wireless secrecy via cooperation: signal design and optimization," IEEE Commun,. Mag., vol.53, no. 12, pp. 47-53, December 2015. https://doi.org/10.1109/MCOM.2015.7355565
  9. S. Zhang and S. C. Liew, "Channel coding and decoding in a relay system operated with physical-layer network coding," IEEE J. Sel. Areas Commun., vol. 27, no. 5, pp. 788-796, June 2009. https://doi.org/10.1109/JSAC.2009.090618
  10. L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, March 2010. https://doi.org/10.1109/TSP.2009.2038412
  11. R. Bassily, E. Ekrem, X. He, E. Tekin, J. Xie, M. R. Bloch, S. Ulukus, and A. Yener, "Cooperative security at the physical layer: a summary of recent advances," IEEE Signal Process. Mag., vol. 30, no. 5, pp. 16-28, September 2013. https://doi.org/10.1109/MSP.2013.2260875
  12. J. H. Fan and C. W. Yuan, "Outage performance for DF two-way relaying with co-channel interference over Nakagami-m fading," KSII Trans. Internet Inf. Syst., vol. 9, no. 11, pp. 4469-4482, November 2015. https://doi.org/10.3837/tiis.2015.11.012
  13. P. Chen, O. Jian, and W. P. Zhu, "Secrecy analysis of amplify-and-forward relay networks with beamforming," KSII Trans. Internet Inf. Syst., vol. 10, no. 10, pp. 5049 - 5062, October 2016. https://doi.org/10.3837/tiis.2016.10.022
  14. M. Yuksel and E. Erkip, "Secure communication with a relay helping the wire-tapper," in Proc. of IEEE Information Theory Workshop (ITW ), Tahoe City, September, pp. 595-600, 2007.
  15. J. N. Laneman, D. N. C. Tse, and G. W. Wornell, "Cooperative diversity in wireless networks: efficient protocols and outage behavior," IEEE Trans. Inf. Theory, vol. 50, no. 12, pp. 3062-3080, December 2004. https://doi.org/10.1109/TIT.2004.838089
  16. I. Krikidis, "Opportunistic relay selection for cooperative networks with secrecy constraints," IET Commun., vol. 4, no.15, pp. 1787-1791, October 2010. https://doi.org/10.1049/iet-com.2009.0634
  17. V. N. Q. Bao, N. Linh-Trung, and M. Debbah, "Relay selection schemes for dual-hop networks under security constraints with multiple eavesdroppers," IEEE Trans. Wireless Commun., vol. 12, no. 12, pp. 6076-6085, December 2013. https://doi.org/10.1109/TWC.2013.110813.121671
  18. J. Mo, M. Tao, and Y. Liu, "Relay placement for physical layer security: a secure connection perspective," IEEE Commun.Lett., vol. 16, no. 6, pp. 878-881, June 2012. https://doi.org/10.1109/LCOMM.2012.042312.120582
  19. Y. Zou, X. Wang, and W. Shen, "Optimal relay selection for physical-layer security in cooperative wireless networks," IEEE J. Sel. Areas Commun., vol. 31, no. 10, pp. 2099-2111, October 2013. https://doi.org/10.1109/JSAC.2013.131011
  20. W. Wang, K. C. Teh, and K. H. Li, "Generalized relay selection for improved security in cooperative DF relay networks," IEEE Wireless Communications Letters, vol. 5, no. 1, pp. 28-31, February 2016. https://doi.org/10.1109/LWC.2015.2488660
  21. L. Fan, N. Yang, T. Duong, M. Elkashlan, and G. Karagiannidis, "Exploiting direct links for physical layer security in multi-user multi-relay networks," IEEE Trans. Wireless Commun., vol. 15, no. 6, pp. 3856 - 3867, June 2016. https://doi.org/10.1109/TWC.2016.2530068
  22. Y. Liu, L. Wang, T. T. Duy, M. Elkashlan and T. Q. Duong, "Relay selection for security enhancement in cognitive relay networks," IEEE Wireless Commun. Lett., vol. 4, no. 1, pp. 46-49, February 2015. https://doi.org/10.1109/LWC.2014.2365808
  23. Y. Huang, J. Wang, C. Zhong, T. Q. Duong and G. K. Karagiannidis, "Secure transmission in cooperative relaying networks with multiple antennas," IEEE Trans. Wireless Commun., vol. 15, no. 10, pp. 6843-6856, October 2016. https://doi.org/10.1109/TWC.2016.2591940
  24. H. Zhang, H. Xing, J. Cheng, A. Nallanathan and V. C. M. Leung, "Secure resource allocation for OFDMA two-way relay wireless sensor networks without and with cooperative jamming," IEEE Trans. Ind. Inf., vol. 12, no. 5, pp. 1714-1725, October 2016. https://doi.org/10.1109/TII.2015.2489610
  25. N. Zhao, F. R. Yu, M. Li, Q. Yan and V. C. M. Leung, "Physical layer security issues in interference-alignment-based wireless networks," IEEE Commun. Mag., vol. 54, no. 8, pp. 162-168, August 2016. https://doi.org/10.1109/MCOM.2016.7537191
  26. H. Lei, H. Zhang, I. S. Ansari, C. Gao, Y. Guo, G. Pan, et al., "Secrecy outage performance for SIMO underlay cognitive radio systems with generalized selection combining over Nakagami-m channels," IEEE Trans. Veh. Technol., vol. 65, no. 12, pp. 10126 - 10132, December 2016. https://doi.org/10.1109/TVT.2016.2536801
  27. Y. Lee, M. H. Tsai, and S. I. Sou, "Performance of decode-and-forward cooperative communications with multiple dual-hop relays over Nakagami-m fading channels," IEEE Trans. Wireless Commun., vol. 8, no. 6, pp. 2853-2859, June 2009. https://doi.org/10.1109/TWC.2009.081375
  28. C. Zhong, S. Jin, and K. K. Wong, "Dual-hop systems with noisy relay and interference-limited destination," IEEE Trans. Commun., vol. 58, no. 3, pp. 764-768, March 2010. https://doi.org/10.1109/TCOMM.2010.03.080156
  29. T. Q. Duong, D. Benevides da Costa, T. A. Tsiftsis, C. Zhong, and A. Nallanathan, "Outage and diversity of cognitive relaying systems under spectrum sharing environments in Nakagami-m fading," IEEE Commun. Lett., vol. 16, no. 12, pp. 2075-2078, December 2012. https://doi.org/10.1109/LCOMM.2012.100812.121859
  30. X. Zhang, Y. Zhang, Z. Yan, J. Xing, and W. Wang, "Performance analysis of cognitive relay networks over Nakagami-m fading channels," IEEE J. Sel. Areas Commun., vol. 33, no. 5, pp. 865-877, May 2015. https://doi.org/10.1109/JSAC.2014.2361081
  31. Y. Wang, Y. Xu, N. Li, W. Xie, K. Xu, and X. Xia, "Relay selection of full-duplex decode-and-forward relaying over Nakagami-m fading channels," IET Commun., vol. 10, no. 2, pp. 170-179, February 2016. https://doi.org/10.1049/iet-com.2015.0524
  32. J. Zhu, Y. Zou, B. Champagne, W. P. Zhu, and L. Hanzo, "Security-reliability trade-off analysis of multi-relay aided decode-and-forward cooperation systems," IEEE Trans. Veh. Technol., vol. 65, no. 7, pp. 5825 - 5831, July 2016. https://doi.org/10.1109/TVT.2015.2453364
  33. L. Wang, M. Elkashlan, J. Huang, R. Schober, and R. K. Mallik, "Secure transmission with antenna selection in MIMO Nakagami-m fading channels," IEEE Trans. Wireless Commun., vol. 13, no. 11, pp. 6054-6067, November 2014. https://doi.org/10.1109/TWC.2014.2359877
  34. W. Feller, An Introduction to Probability Theory and Its Applications, 3rd ed. Hoboken, NJ, USA: Wiley, 1968.
  35. Z. Chen, Z. Chi, Y. Li, and B. Vucetic, "Error performance of maximal-ratio combining with transmit antenna selection in flat Nakagami-m fading channels," IEEE Trans. Wireless Commun., vol. 8, no. 1, pp. 424-431, January 2009. https://doi.org/10.1109/T-WC.2009.080207
  36. I. S. Gradshteyn and I. M. Ryzik, Table of Integrals, Series, and Products, 7th ed. San Diego, USA: Academic Press, 2007.
  37. H. Lei, I. S. Ansari, G. Pan, B. Alomair, and M.-S. Alouini, "Secrecy capacity analysis over ${\alpha}-{\mu}$ fading channels," IEEE Commun. Lett., doi: 10.1109/LCOMM.2017.2669976, 2017.