DOI QR코드

DOI QR Code

Secure Connectivity Probability of Multi-hop Clustered Randomize-and-Forward Networks

  • Wang, Xiaowei (Department of Automation, Shanghai University, China. Xiaowei Wang is also with College of Information Engineering, Shanghai Maritime University) ;
  • Su, Zhou (Department of Automation, Shanghai University, China. Xiaowei Wang is also with College of Information Engineering, Shanghai Maritime University) ;
  • Wang, Guangyi (School of Electronics and Information, Hangzhou Dianzi University)
  • Received : 2017.03.23
  • Accepted : 2017.06.07
  • Published : 2017.10.01

Abstract

This work investigates secure cluster-aided multi-hop randomize-and-forward networks. We present a hop-by-hop multi-hop transmission scheme with relay selection, which evaluates for each cluster the relays that can securely receive the message. We propose an analytical model to derive the secure connectivity probability (SCP) of the hop-by-hop transmission scheme. For comparison, we also analyze SCPs of traditional end-to-end transmission schemes with two relay-selection policies. We perform simulations, and our analytical results verify that the proposed hop-by-hop scheme is superior to end-to-end schemes, especially with a large number of hops or high eavesdropper channel quality. Numerical results also show that the proposed hop-by-hop scheme achieves near-optimal performance in terms of the SCP.

Keywords

References

  1. J. Barros and M.R.D. Rodrigues, "Secrecy Capacity of Wireless Channels," IEEE Int. Symp. Inform. Theory, Seattle, USA, Jul. 2006, pp. 356-360.
  2. L. Lai and H.E. Gamal, "The Relay-Eavesdropper Channel: Cooperation for Secrecy," IEEE Trans. Inform. Theory, vol. 54, no. 9, Sept. 2008, pp. 4005-4019. https://doi.org/10.1109/TIT.2008.928272
  3. I. Krikidis, J.S. Thompson, and S. Mclaughlin, "Relay Selection for Secure Cooperative Networks with Jamming," IEEE Trans. Wireless Commun., vol. 8, no. 10, Oct. 2009, pp. 5003-5011. https://doi.org/10.1109/TWC.2009.090323
  4. Y. Zou, X. Wang, and W. Shen, "Optimal Relay Selection for Physical-layer Security in Cooperative Wireless Networks," IEEE J. Sel. Areas Commun., vol. 31, no. 10, Oct. 2013, pp. 2099-2111. https://doi.org/10.1109/JSAC.2013.131011
  5. I. Krikidis et al., "Full-Duplex Relay Selection for Amplifyand-Forward Cooperative Networks," IEEE Trans. Wireless Commun., vol. 11, no. 12, Dec. 2012, pp. 4381-4393. https://doi.org/10.1109/TWC.2012.101912.111944
  6. X. Ding et al., "Security-Reliability Tradeoff Analysis of Artificial Noise Aided Two-Way Opportunistic Relay Selection," IEEE Trans. Veh. Technol., vol. 66, no. 5, May 2017, pp. 3930-3941. https://doi.org/10.1109/TVT.2016.2601112
  7. G. Chen et al., "Max-Ratio Relay Selection in Secure Buffer-Aided Cooperative Wireless Networks," IEEE Trans. Inform. Forensics Security, vol. 9, no. 4,Apr. 2014, pp. 719-729. https://doi.org/10.1109/TIFS.2014.2307672
  8. Y. Liu et al., "Relay Selection for Security Enhancement in Cognitive Relay Networks," IEEE Wireless Commun. Lett., vol. 4, no. 1, Feb. 2015, pp. 46-49. https://doi.org/10.1109/LWC.2014.2365808
  9. X. Chen et al., "Multi-Antenna Relay Aided Wireless Physical Layer Security," IEEE Commun. Mag., vol. 53, no. 12, Dec. 2015, pp. 40-46. https://doi.org/10.1109/MCOM.2015.7355564
  10. X. Chen et al., "Large-Scale MIMO Relaying Techniques for Physical Layer Security: AF or DF?" IEEE Trans. Wireless Commun., vol. 14, no. 9, Sept. 2015, pp. 5135-5146. https://doi.org/10.1109/TWC.2015.2433291
  11. J. Lee, "Full-Duplex Relay for Enhancing Physical Layer Security in Multi-hop Relaying Systems," IEEE Commun. Lett., vol. 19, no. 4, Apr. 2015, pp. 525-528. https://doi.org/10.1109/LCOMM.2015.2401551
  12. J. Lee, "Optimal Power Allocation for Physical Layer Security in Multihop DF Relay Networks," IEEE Trans. Wireless Commun., vol. 15, no. 1, Jan. 2016, pp. 28-38. https://doi.org/10.1109/TWC.2015.2466091
  13. L. Wang et al., "Cluster-Based Cooperative Jamming in Wireless Multi-hop Networks," IEEE PIMRC, London, UK, Sept. 8-11, 2013, pp. 169-174.
  14. T.T. Duy and H.Y. Kong, "Secrecy Performance Analysis of Multihop Transmission Protocols in Cluster Networks," Wireless Personal Commun., vol. 82, no. 4, June 2015, pp. 2505-2518. https://doi.org/10.1007/s11277-015-2361-y
  15. O.O. Koyluoglu, C.E. Koksal and H.E. Gamal, "On Secrecy Capacity Scaling in Wireless Networks," IEEE Trans. Infrom. Theory, vol. 58, no. 5, May 2012, pp. 3000-3015. https://doi.org/10.1109/TIT.2012.2184692
  16. J. Mo, M. Tao and Y. Liu, "Relay Placement for Physical Layer Security: A Secure Connection Perspective," IEEE Commun. Lett., vol. 16, no. 6, June 2012, pp. 878-881. https://doi.org/10.1109/LCOMM.2012.042312.120582
  17. C. Cai et al., "Secure Connectivity Using Randomize-and-Forward Strategy in Cooperative Wireless Networks," IEEE Commun. Lett., vol. 17, no. 7, July 2013, pp. 1340-1343. https://doi.org/10.1109/LCOMM.2013.052013.122902

Cited by

  1. Reinforcement Learning-Based Multihop Relaying: A Decentralized Q-Learning Approach vol.23, pp.10, 2017, https://doi.org/10.3390/e23101310