logo

SCIENTIA SINICA Informationis, Volume 47, Issue 9: 1242-1254(2017) https://doi.org/10.1360/N112017-00002

Security performance analysis of DF relay selection systems

More info
  • ReceivedMar 21, 2017
  • AcceptedJun 9, 2017
  • PublishedAug 23, 2017

Abstract

In this work, we investigate the security performance of adaptive decode-and-forward cooperative networks when the signals transmitted from source and relay would be wiretapped. Based on whether the channel state information (CSI) of the wiretap link is available or not, optimal relay selection (ORS), conventional relay selection (CRS), and multiple relays selection (MRS) schemes are considered, and the exact closed-form expressions for security outage probability (SOP) are derived. Besides, we obtain the closed-form expressions for the secrecy diversity order and secrecy array gain of the three different selection schemes through asymptotic analysis. Simulations are presented to validate the accuracy of our proposed analytical results and illustrate that ORS is the best scheme. Furthermore, asymptotic analysis reveals that the secrecy diversity order of each scheme is the same and closely related to the number of relays. The impact of the wiretap channels is only reflected in the secrecy array gain. Finally, we determine the optimal power allocation between the source and relay.


Funded by

国家自然科学基金(61471076)

国家自然科学基金(61401372)

重庆市教委科学技术研究项目(KJ1600413)

重庆市基础科学与前沿技术研究项目(cstc2017jcyjAX0204)


References

[1] Wyner A D. The Wire-Tap Channel. Bell Syst Technical J, 1975, 54: 1355-1387 CrossRef Google Scholar

[2] Yang N, Wang L F, Giovanni G, et al. Safeguarding 5G wireless communication networks using physical layer security. IEEE Commun Mag, 2015, 53: 20--27. Google Scholar

[3] Lei H, Gao C, Guo Y. On Physical Layer Security Over Generalized Gamma Fading Channels. IEEE Commun Lett, 2015, 19: 1257-1260 CrossRef Google Scholar

[4] Lei H, Zhang H, Ansari I S. Performance Analysis of Physical Layer Security Over Generalized-K Fading Channels Using a Mixture Gamma Distribution. IEEE Commun Lett, 2016, 20: 408-411 CrossRef Google Scholar

[5] Liu X. Probability of strictly positive secrecy capacity of the Rician-Rician fading channel. IEEE Wireless Commun Lett, 2013, 2: 50-53 CrossRef Google Scholar

[6] Wang H M, Luo M, Yin Q. Hybrid cooperative beamforming and jamming for physical-layer security of two-way relay networks. IEEE TransInformForensic Secur, 2013, 8: 2007-2020 CrossRef Google Scholar

[7] Wang H M, Liu F, Yang M. Joint Cooperative Beamforming, Jamming, and Power Allocation to Secure AF Relay Systems. IEEE Trans Veh Technol, 2015, 64: 4893-4898 CrossRef Google Scholar

[8] Khisti A, Wornell G W. Secure transmission with multiple antennas I: the MISOME wiretap channel. IEEE Trans Inform Theor, 2010, 56: 3088-3104 CrossRef Google Scholar

[9] Yang N, Yeoh P L, Elkashlan M. Transmit antenna selection for security enhancement in MIMO wiretap channels. IEEE Trans Commun, 2013, 61: 144-154 CrossRef Google Scholar

[10] Zou Y L, Zhu J, Wang X B, et al. Improving physical-layer security in wireless communications using diversity techniques. IEEE Netw, 2015, 29: 42--48. Google Scholar

[11] Chen X M, Zhong C J, Yuen C, et al. Multi-antenna relay aided wireless physical layer security. IEEE Commun Mag, 2015, 53: 40--46. Google Scholar

[12] Krikidis I. Opportunistic relay selection for cooperative networks with secrecy constraints. IET Commun, 2010, 4: 1787-1791 CrossRef Google Scholar

[13] Wang W, Teh K C, Li K H. Generalized Relay Selection for Improved Security in Cooperative DF Relay Networks. IEEE Wireless Commun Lett, 2016, 5: 28-31 CrossRef Google Scholar

[14] Liu Y, Wang L, Duy T T. Relay Selection for Security Enhancement in Cognitive Relay Networks. IEEE Wireless Commun Lett, 2015, 4: 46-49 CrossRef Google Scholar

[15] Zou Y, Wang X, Shen W. Optimal relay selection for physical-layer security in cooperative wireless networks. IEEE J Select Areas Commun, 2013, 31: 2099-2111 CrossRef Google Scholar

[16] Zhao R, Lin H X, He Y C, et al. Secrecy performance analysis of MIMO decode-and-forward relay systems in Nakagami-$m$ channels. J Electron Inf Technol, 2016, 38: 1913--1919 . Google Scholar

[17] Laneman J N, Tse D N C, Wornell G W. Cooperative Diversity in Wireless Networks: Efficient Protocols and Outage Behavior. IEEE Trans Inform Theor, 2004, 50: 3062-3080 CrossRef Google Scholar

[18] Zhao H, Pan G F. Analysis of secure communications for a DF and RF relaying SIMO system with Gauss errors. Sci Sin Inform, 2016, 43: 350--360 . Google Scholar

[19] Wang D Y, Zhao H, Pan G F. An analysis of secrecy outage performance of DF and RD relaying SIMO system with imperfect CSI. Sci Sin Inform, 2016, 46: 925--936 . Google Scholar

[20] Zhang X, Zhang Y, Yan Z. Performance Analysis of Cognitive Relay Networks Over Nakagami-$m$ Fading Channels. IEEE J Select Areas Commun, 2015, 33: 865-877 CrossRef Google Scholar

[21] Bloch M, Barros J, Rodrigues M R D. Wireless information-theoretic security. IEEE Trans Inform Theor, 2008, 54: 2515-2534 CrossRef Google Scholar

[22] Wang L, Elkashlan M, Huang J. Secure Transmission With Antenna Selection in MIMO Nakagami-$m$ Fading Channels. IEEE Trans Wireless Commun, 2014, 13: 6054-6067 CrossRef Google Scholar

[23] Bletsas A, Khisti A, Reed D P. A simple cooperative diversity method based on network path selection. IEEE J Select Areas Commun, 2006, 24: 659-672 CrossRef Google Scholar

[24] Zhao H, Tan Y, Pan G. Secrecy Outage on Transmit Antenna Selection/Maximal Ratio Combining in MIMO Cognitive Radio Networks. IEEE Trans Veh Technol, 2016, 65: 10236-10242 CrossRef Google Scholar

[25] Gradshteyn I S, Ryzhik I M. Table of Integrals, Series, and Products. 7th ed. New York: Academic Press, 2007. Google Scholar

[26] Lei H, Gao C, Ansari I S. Secrecy Outage Performance of Transmit Antenna Selection for MIMO Underlay Cognitive Radio Systems Over Nakagami- $m$ Channels. IEEE Trans Veh Technol, 2017, 66: 2237-2250 CrossRef Google Scholar

[27] Yang N, Elkashlan M, Yeoh P L. Multiuser MIMO relay networks in Nakagami-$m$ fading channels. IEEE Trans Commun, 2012, 60: 3298-3310 CrossRef Google Scholar

[28] Boyd S, Vandenberghe L. Convex Optimization. Cambridge: Cambridge University Press, 2004. Google Scholar

[29] Lei H, Ansari I S, Pan G. Secrecy Capacity Analysis Over $\alpha - \mu $ Fading Channels. IEEE Commun Lett, 2017, 21: 1445-1448 CrossRef Google Scholar

Copyright 2020 Science China Press Co., Ltd. 《中国科学》杂志社有限责任公司 版权所有

京ICP备18024590号-1