Browse > Article
http://dx.doi.org/10.3837/tiis.2017.05.006

Security Performance Analysis of DF Cooperative Relay Networks over Nakagami-m Fading Channels  

Zhang, Huan (Chongqing Key Lab of Mobile Communications Technology Chongqing University of Posts and Telecommunications)
Lei, Hongjiang (Chongqing Key Lab of Mobile Communications Technology Chongqing University of Posts and Telecommunications)
Ansari, Imran Shafique (Department of Electrical and Computer Engineering, Texas A&M University at Qatar)
Pan, Gaofeng (Chongqing Key Laboratory of Nonlinear Circuits and Intelligent Information Processing Southwest University)
Qaraqe, Khalid A. (Department of Electrical and Computer Engineering, Texas A&M University at Qatar)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.11, no.5, 2017 , pp. 2416-2432 More about this Journal
Abstract
In this paper, we investigate the security performance for cooperative networks over Nakagami-m fading channels. Based on whether the channel state information (CSI) of wiretap link is available or not, optimal relay selection (ORS) and suboptimal relay selection (SRS) schemes are considered. Also, multiple relays combining (MRC) scheme is considered for comparison purpose. The exact and asymptotic closed-form expressions for secrecy outage probability (SOP) are derived and simulations are presented to validate the accuracy of our proposed analytical results. The numerical results illustrate that the ORS is the best scheme and SRS scheme is better than MRC scheme in some special scenarios such as when the destination is far away from the relays. Furthermore, through asymptotic analysis, we obtain the closed-form expressions for the secrecy diversity order and secrecy array gain for the three different selection schemes. The secrecy diversity order is closely related to the number of relays and fading parameter between relay and destination.
Keywords
Secrecy outage performance; cooperative communications; relay selection; decode-and-forward; Nakagami-m fading;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 W. Feller, An Introduction to Probability Theory and Its Applications, 3rd ed. Hoboken, NJ, USA: Wiley, 1968.
2 Z. Chen, Z. Chi, Y. Li, and B. Vucetic, "Error performance of maximal-ratio combining with transmit antenna selection in flat Nakagami-m fading channels," IEEE Trans. Wireless Commun., vol. 8, no. 1, pp. 424-431, January 2009.   DOI
3 I. S. Gradshteyn and I. M. Ryzik, Table of Integrals, Series, and Products, 7th ed. San Diego, USA: Academic Press, 2007.
4 H. Lei, I. S. Ansari, G. Pan, B. Alomair, and M.-S. Alouini, "Secrecy capacity analysis over ${\alpha}-{\mu}$ fading channels," IEEE Commun. Lett., doi: 10.1109/LCOMM.2017.2669976, 2017.   DOI
5 A. D. Wyner, "The wire-tap channel," The Bell System Technical Journal, vol. 54, no. 8, pp. 1355-1387, October 1975.   DOI
6 M. Bloch, J. Barros, M. R. Rodrigues, and S. W. McLaughlin, "Wireless information-theoretic security," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515-2534, June 2008.   DOI
7 A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas I: The MISOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 7, pp. 3088-3104, July 2010.   DOI
8 A. Khisti and G. W. Wornell, A. Khisti and G. W. Wornell, "Secure transmission with multiple antenna-part II: The MIMOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5515-5532, November 2010.   DOI
9 H. Alves, R. D. Souza, M. R. Debbah, and M. Bennis, "Performance of transmit antenna selection physical layer security schemes," IEEE Signal Process. Lett., vol. 19, no. 6, pp. 372-375, June 2012.   DOI
10 N. Yang, P. L. Yeoh, M. Elkashlan, R. Schober, and I. B. Collings, "Transmit antenna selection for security enhancement in MIMO wiretap channels," IEEE Trans. Commun., vol. 61, no. 1, pp. 144-154, January 2013.   DOI
11 H. Lei, C. Gao, I. Ansari, Y. Guo, Y. Zou, G. Pan, K. A. Qaraqe, "Secrecy outage performance of transmit antenna selection for MIMO underlay cognitive radio systems over Nakagami-m channels," IEEE Trans. Veh. Technol.
12 Y. Wang, Y. Xu, N. Li, W. Xie, K. Xu, and X. Xia, "Relay selection of full-duplex decode-and-forward relaying over Nakagami-m fading channels," IET Commun., vol. 10, no. 2, pp. 170-179, February 2016.   DOI
13 H. Lei, H. Zhang, I. S. Ansari, C. Gao, Y. Guo, G. Pan, et al., "Secrecy outage performance for SIMO underlay cognitive radio systems with generalized selection combining over Nakagami-m channels," IEEE Trans. Veh. Technol., vol. 65, no. 12, pp. 10126 - 10132, December 2016.   DOI
14 Y. Lee, M. H. Tsai, and S. I. Sou, "Performance of decode-and-forward cooperative communications with multiple dual-hop relays over Nakagami-m fading channels," IEEE Trans. Wireless Commun., vol. 8, no. 6, pp. 2853-2859, June 2009.   DOI
15 C. Zhong, S. Jin, and K. K. Wong, "Dual-hop systems with noisy relay and interference-limited destination," IEEE Trans. Commun., vol. 58, no. 3, pp. 764-768, March 2010.   DOI
16 T. Q. Duong, D. Benevides da Costa, T. A. Tsiftsis, C. Zhong, and A. Nallanathan, "Outage and diversity of cognitive relaying systems under spectrum sharing environments in Nakagami-m fading," IEEE Commun. Lett., vol. 16, no. 12, pp. 2075-2078, December 2012.   DOI
17 X. Zhang, Y. Zhang, Z. Yan, J. Xing, and W. Wang, "Performance analysis of cognitive relay networks over Nakagami-m fading channels," IEEE J. Sel. Areas Commun., vol. 33, no. 5, pp. 865-877, May 2015.   DOI
18 J. Zhu, Y. Zou, B. Champagne, W. P. Zhu, and L. Hanzo, "Security-reliability trade-off analysis of multi-relay aided decode-and-forward cooperation systems," IEEE Trans. Veh. Technol., vol. 65, no. 7, pp. 5825 - 5831, July 2016.   DOI
19 L. Wang, M. Elkashlan, J. Huang, R. Schober, and R. K. Mallik, "Secure transmission with antenna selection in MIMO Nakagami-m fading channels," IEEE Trans. Wireless Commun., vol. 13, no. 11, pp. 6054-6067, November 2014.   DOI
20 H. M. Wang and X. G. Xia, "Enhancing wireless secrecy via cooperation: signal design and optimization," IEEE Commun,. Mag., vol.53, no. 12, pp. 47-53, December 2015.   DOI
21 S. Zhang and S. C. Liew, "Channel coding and decoding in a relay system operated with physical-layer network coding," IEEE J. Sel. Areas Commun., vol. 27, no. 5, pp. 788-796, June 2009.   DOI
22 L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, March 2010.   DOI
23 R. Bassily, E. Ekrem, X. He, E. Tekin, J. Xie, M. R. Bloch, S. Ulukus, and A. Yener, "Cooperative security at the physical layer: a summary of recent advances," IEEE Signal Process. Mag., vol. 30, no. 5, pp. 16-28, September 2013.   DOI
24 J. H. Fan and C. W. Yuan, "Outage performance for DF two-way relaying with co-channel interference over Nakagami-m fading," KSII Trans. Internet Inf. Syst., vol. 9, no. 11, pp. 4469-4482, November 2015.   DOI
25 P. Chen, O. Jian, and W. P. Zhu, "Secrecy analysis of amplify-and-forward relay networks with beamforming," KSII Trans. Internet Inf. Syst., vol. 10, no. 10, pp. 5049 - 5062, October 2016.   DOI
26 M. Yuksel and E. Erkip, "Secure communication with a relay helping the wire-tapper," in Proc. of IEEE Information Theory Workshop (ITW ), Tahoe City, September, pp. 595-600, 2007.
27 J. N. Laneman, D. N. C. Tse, and G. W. Wornell, "Cooperative diversity in wireless networks: efficient protocols and outage behavior," IEEE Trans. Inf. Theory, vol. 50, no. 12, pp. 3062-3080, December 2004.   DOI
28 I. Krikidis, "Opportunistic relay selection for cooperative networks with secrecy constraints," IET Commun., vol. 4, no.15, pp. 1787-1791, October 2010.   DOI
29 J. Mo, M. Tao, and Y. Liu, "Relay placement for physical layer security: a secure connection perspective," IEEE Commun.Lett., vol. 16, no. 6, pp. 878-881, June 2012.   DOI
30 V. N. Q. Bao, N. Linh-Trung, and M. Debbah, "Relay selection schemes for dual-hop networks under security constraints with multiple eavesdroppers," IEEE Trans. Wireless Commun., vol. 12, no. 12, pp. 6076-6085, December 2013.   DOI
31 Y. Zou, X. Wang, and W. Shen, "Optimal relay selection for physical-layer security in cooperative wireless networks," IEEE J. Sel. Areas Commun., vol. 31, no. 10, pp. 2099-2111, October 2013.   DOI
32 W. Wang, K. C. Teh, and K. H. Li, "Generalized relay selection for improved security in cooperative DF relay networks," IEEE Wireless Communications Letters, vol. 5, no. 1, pp. 28-31, February 2016.   DOI
33 L. Fan, N. Yang, T. Duong, M. Elkashlan, and G. Karagiannidis, "Exploiting direct links for physical layer security in multi-user multi-relay networks," IEEE Trans. Wireless Commun., vol. 15, no. 6, pp. 3856 - 3867, June 2016.   DOI
34 N. Zhao, F. R. Yu, M. Li, Q. Yan and V. C. M. Leung, "Physical layer security issues in interference-alignment-based wireless networks," IEEE Commun. Mag., vol. 54, no. 8, pp. 162-168, August 2016.   DOI
35 Y. Liu, L. Wang, T. T. Duy, M. Elkashlan and T. Q. Duong, "Relay selection for security enhancement in cognitive relay networks," IEEE Wireless Commun. Lett., vol. 4, no. 1, pp. 46-49, February 2015.   DOI
36 Y. Huang, J. Wang, C. Zhong, T. Q. Duong and G. K. Karagiannidis, "Secure transmission in cooperative relaying networks with multiple antennas," IEEE Trans. Wireless Commun., vol. 15, no. 10, pp. 6843-6856, October 2016.   DOI
37 H. Zhang, H. Xing, J. Cheng, A. Nallanathan and V. C. M. Leung, "Secure resource allocation for OFDMA two-way relay wireless sensor networks without and with cooperative jamming," IEEE Trans. Ind. Inf., vol. 12, no. 5, pp. 1714-1725, October 2016.   DOI