logo

SCIENCE CHINA Information Sciences, Volume 59, Issue 6: 062305(2016) https://doi.org/10.1007/s11432-015-5406-7

Physical layer security via maximal ratio combining and relay selection over Rayleigh fading channels

More info
  • ReceivedJun 20, 2015
  • AcceptedJul 30, 2015
  • PublishedSep 25, 2015

Abstract

In this paper, the impact of both maximal ratio combining (MRC) and relay selection on the physical layer security in wireless communication systems is investigated by analyzing critical issues such as the probability characteristics of the legitimate receiver (Bob) and malicious eavesdropper (Eve)'s end-to-end signal-to-noise ratio (SNR), the secrecy outage probability and the average secrecy channel capacity over Rayleigh fading Channel, etc. Unlike the conventional physical layer security schemes, we assume that Bob receives its data from both the relay and the source via cooperative relay, provided that MRC is employed at the receiver. Particularly, compared to the conventional MRC methods, the proposed method is capable of achieving a higher spatial diversity order by performing relay selection, as validated by performing the theoretical analysis as well as numerical simulation. Furthermore, the closed-form expressions in terms of secrecy outage probability and average secrecy capacity are all consistent with the numerical results. Finally, the proposed scheme may be substantially affected by a number of parameters such as the number of relays, the SNR of links and the ratio of main-to-eavesdropper ratio (MER) $\lambda_{\rm ME}$.


Funded by

National Natural Science Foundation of China(61501182)

National High Technology Research and Development Program of China(863)

(2014AA01A701)

Program for New Century Excellent Talents in University(NECT-12-0774)

Research Foundation of Education Department of Hunan Province(15C0558)

Open Research Fund of National Mobile Communications Research Laboratory Southeast University(2013D12)


Acknowledgment

Acknowledgments

This work was supported by National Natural Science Foundation of China (Grant No. 61501182), National High Technology Research and Development Program of China (863) (Grant No. 2014AA01A701), Program for New Century Excellent Talents in University (Grant No. NECT-12-0774), Research Foundation of Education Department of Hunan Province (Grant No. 15C0558), Open Research Fund of National Mobile Communications Research Laboratory Southeast University (Grant No. 2013D12), Fundamental Research Funds for the Central Universities, and Foundation of Beijing Engineering and Technology Center for Convergence Networks and Ubiquitous Services.


References

[1] Nabar R U, Bolcskei H, Kneubuhler F W. IEEE J Sel Areas Commun, 2004, 22: 1099-1109 Google Scholar

[2] Sendonaris A, Erkip E, Aazhang B. IEEE Trans Commun, 2003, 51: 1927-1938 Google Scholar

[3] Xing C, Xia M, Gao F, et al. IEEE J Sel Areas Commun, 2012, 30: 1370-1382 Google Scholar

[4] Zhou Y, Liu H, Pan Z, et al. IEEE J Sel Areas Commun, 2014, 32: 1-11 Google Scholar

[5] Zhang Z, Long K, Wang J. IEEE Wirel Commun, 2013, 20: 36-42 Google Scholar

[6] Chai X M, Xu X, Zhang Z S. Sci China Inf Sci, 2015, 58: 042303-42 Google Scholar

[7] Li Y, Xu X, Zhang D D, et al. Sci China Inf Sci, 2014, 57: 042301-42 Google Scholar

[8] Zhang Z, Long K, Wang J, et al. IEEE Commun Surv Tut, 2014, 16: 513-537 Google Scholar

[9] Zhang Z, Zhang W, Tellambura C. IEEE Trans Wirel Commun, 2009, 8: 4450-4456 Google Scholar

[10] Zhang Z S, Huangfu W, Long K P, et al. Sci China Inf Sci, 2013, 56: 071301-4456 Google Scholar

[11] Jia J, Zhang J, Zhang Q. Cooperative relay for cognitive radio networks. In: Proceedings of IEEE INFOCOM, Rio de Janeiro, 2009. 2304--2312. Google Scholar

[12] Michalopoulos D S, Karagiannidis G K, Schober R. IEEE Trans Commun, 2012, 60: 1278-1290 Google Scholar

[13] Zhuang W, Ismail M. IEEE Wirel Commun, 2012, 19: 10-20 Google Scholar

[14] Xing C, Ma S, Fei Z, et al. IEEE Trans Signal Process, 2013, 61: 1196-1209 Google Scholar

[15] Xing C, Ma S, Wu Y C. IEEE Trans Signal Process, 2010, 58: 2273-2283 Google Scholar

[16] Xing C, Ma S, Zhou Y. IEEE Trans Signal Process, 2015, 63: 334-348 Google Scholar

[17] Xing C W, Fei Z S, Li N, et al. Sci China Inf Sci, 2013, 56: 022315-348 Google Scholar

[18] Wang H M, Xia X G. Enhancing wireless secrecy via cooperation: signal design and optimization. IEEE Commun Mag, in press. doi: 10.1109/TVT.2014.2370754. Google Scholar

[19] Zheng T X, Wang H M, Liu F, et al. IEEE Trans Commun, 2015, 63: 1741-1755 Google Scholar

[20] Wang C, Wang H M, Ng D W K, et al. IEEE Trans Wirel Commun, 2015, 14: 3280-3293 Google Scholar

[21] Wang C, Wang H M, Xia X G, et al. IEEE Trans Wirel Commun, 2015, 14: 2596-2612 Google Scholar

[22] Wang H M, Liu F, Yang M. Joint cooperative beamforming, jamming and power allocation to secure af relay systems. IEEE Trans Veh Technol, in press. doi: 10.1109/TVT.2014.2370754. Google Scholar

[23] Elkashlan M, Wang L, Duong T Q, et al. IEEE Trans Veh Technol, 2015, 64: 3790-3795 Google Scholar

[24] Liu Y, Wang L, Duy T T, et al. IEEE Commun Lett, 2015, 4: 46-49 Google Scholar

[25] Wang L, Kim K J, Duong T Q, et al. IEEE Trans Inf Foren Secur, 2015, 10: 90-103 Google Scholar

[26] Zou Y, Wang X, Shen W. IEEE Trans Commun, 2013, 61: 5103-5113 Google Scholar

[27] Wang L, Yang N, Elkashlan M, et al. IEEE Trans Inf Foren Secur, 2014, 9: 247-258 Google Scholar

[28] Zou Y, Yao Y D, Zheng B. IEEE Trans Signal Process, 2012, 60: 1766-1781 Google Scholar

[29] Dong L, Han Z, Petropulu A P, et al. IEEE Trans Signal Process, 2010, 58: 1875-1888 Google Scholar

[30] Zhang Z, Chai X, Long K, et al. IEEE Commun Mag, 2015, 53: 128-137 Google Scholar

[31] Gradshteyn I S, Ryzhik I M. Table of Integrals, Series, and Products. 7th ed. New York: Academic, 2007. Google Scholar

Copyright 2019 Science China Press Co., Ltd. 《中国科学》杂志社有限责任公司 版权所有

京ICP备18024590号-1