Skip to main content
Erschienen in: EURASIP Journal on Wireless Communications and Networking 1/2009

Open Access 01.12.2009 | Research Article

Distributed Cooperative Transmission with Unreliable and Untrustworthy Relay Channels

verfasst von: Zhu Han, Yan Lindsay Sun

Erschienen in: EURASIP Journal on Wireless Communications and Networking | Ausgabe 1/2009

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cooperative transmission is an emerging wireless communication technique that improves wireless channel capacity through multiuser cooperation in the physical layer. It is expected to have a profound impact on network performance and design. However, cooperative transmission can be vulnerable to selfish behaviors and malicious attacks, especially in its current design. In this paper, we investigate two fundamental questions Does cooperative transmission provide new opportunities to malicious parties to undermine the network performance? Are there new ways to defend wireless networks through physical layer cooperation? Particularly, we study the security vulnerabilities of the traditional cooperative transmission schemes and show the performance degradation resulting from the misbehaviors of relay nodes. Then, we design a trust-assisted cooperative scheme that can detect attacks and has self-healing capability. The proposed scheme performs much better than the traditional schemes when there are malicious/selfish nodes or severe channel estimation errors. Finally, we investigate the advantage of cooperative transmission in terms of defending against jamming attacks. A reduction in link outage probability is achieved.

1. Introduction

Multiple antenna systems, such as Multiple-Input-Multiple-Output (MIMO), can create spatial diversity by taking advantage of multiple antennas and significantly increase the wireless channel capacity. However, installation of multiple antennas on one wireless device faces many practical obstacles, such as the cost and size of wireless devices. Recently, cooperative transmission has gained considerable research attention as a transmit strategy for future wireless networks. Instead of relying on the installation of multiple antennas on one wireless device, cooperative transmission achieves spatial diversity through physical layer cooperation.
In cooperative transmission, when the source node transmits a message to the destination node, the nearby nodes that overhear this transmission will "help" the source and destination by relaying the replicas of the message, and the destination will combine the multiple received waveforms so as to improve the link quality. In other words, cooperative transmission utilizes the nearby nodes as virtual antennas and mimics the effects of MIMO for achieving spatial diversity. It is well documented that cooperative transmission improves channel capacity significantly and has a great potential to improve wireless network capacity [1, 2]. The research community is integrating cooperative transmission into cellular, WiMAX, WiFi, Bluetooth, ultra-wideband (UWB), ad hoc, and sensor networks. Cooperative transmission is also making its way into standards; for example, IEEE WiMAX standards body for future broadband wireless access has established the 802.16j Relay Task Group to incorporate cooperative relaying mechanisms [3].
The majority of work on cooperative transmission focuses on communication efficiency, including capacity analysis, protocol design, power control, relay selection, and cross layer optimization. In those studies, all network nodes are assumed to be trustworthy. Security threats are rarely taken into consideration.
(i)
It is well known that malicious nodes can enter many wireless networks due to imperfectness of access control or through node compromising attack. In cooperative transmission, the malicious nodes have chances to serve as relays (i.e., the nodes help the source node by forwarding messages). Instead of forwarding correct information, malicious relays can send arbitrary information to the destination.
 
(i)
Cooperative transmission can also suffer from selfish behavior. When the wireless nodes do not belong to the same authority, some nodes can refuse to cooperate with others, that is, not working as relay nodes, for the purpose of saving their own resources.
 
(i)
In cooperative transmission, channel information is often required to perform signal combination [13] and relay selection [47] at the destination. The malicious relays can provide false channel state information, hoping that the destination will combine the received messages inadequately.
 
This paper is dedicated to studying the security issues related to cooperative transmission for wireless communications. Particularly, we will first discuss the vulnerabilities of cooperative transmission schemes and evaluate potential network performance degradation due to these vulnerabilities. Then, we propose a distributed trust-assisted cooperative transmission scheme, which strengthens security of cooperative transmission through joint trust management and channel estimation.
Instead of using traditional signal-to-noise ratio (SNR) or bit-error-rate (BER) to represent the quality of relay channels, we construct the trust values that represent possible misbehavior of relays based on beta-function trust models [8, 9]. We then extend the existing trust models to address trust propagation through relay nodes. A distributed trust established scheme is developed. With a low overhead, the model parameters can propagate through a complicated cooperative relaying topology from the source to the destination. In the destination, the information from both the direct transmission and relayed transmissions is combined according to the trust-based link quality representation. From analysis and simulations, we will show that the proposed scheme can automatically recover from various attacks and perform better than the traditional scheme with maximal ratio combining. Finally, we investigate possible advantages of utilizing cooperation transmission to improve security in a case study of defending against jamming attacks.
The rest of the paper is organized as follows. Related work is discussed in Section 2. In Section 3, the system model and attack models are introduced. In Section 4, the proposed algorithms are developed. Finally, simulation results and conclusions are given in Sections 5 and 6, respectively.
Research on cooperative transmission traditionally focuses on efficiency. There is a significant amount of work devoted to analyzing the performance gain of cooperative transmission, to realistic implementation under practical constraints, to relay selection and power control, to integrating physical layer cooperation and routing protocols, and to game-theory-based distributed resource allocation in cooperative transmission. For example, the work in [4] evaluates the cooperative diversity performance when the best relay is chosen according to the average SNR and analyzes the outage probability of relay selection based on instantaneous SNRs. In [5], the authors propose a distributed relay selection scheme that requires limited network knowledge with instantaneous SNRs. In [6], cooperative resource allocation for OFDM is studied. A game theoretic approach for relay selection has been proposed in [7]. In [10], cooperative transmission is used in sensor networks to find extra paths in order to improve network lifetime. In [11], cooperative game theory and cooperative transmission are used for packet forwarding networks with selfish nodes. In [12], centralized power allocation schemes are presented under the assumption that all the relay nodes help others. In [13], cooperative routing protocols are constructed based on noncooperative routes. In [14], a contention-based opportunistic feedback technique is proposed for relay selection in dense wireless networks. In [15], the users form coalitions of cooperation and use MIMO transmission. Traditional cooperative transmission schemes, however, assume that all participating nodes are trustworthy.
Trust establishment has been recognized as a powerful tool to enhance security in applications that need cooperation among multiple distributed entities. Research on trust establishment has been performed for various applications, including authorization and access control, electronic commerce, peer-to-peer networks, routing in MANET, and data aggregation in sensor networks [8, 1620]. As far as the authors' knowledge, no existing work on trust is for cooperative transmission. In fact, not much study on trust has been conducted for physical layer security.

3. System Model, Attack Models, and Requirements on Defense

In this section, we first describe the cooperative transmission system model, then investigate the different attack models, and finally discuss the general requirements on the design of defense mechanisms.

3.1. Cooperative Transmission System

As shown in Figure 1, the system investigated in this paper contains a source node https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq1_HTML.gif , some relay nodes https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq2_HTML.gif , and a destination node https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq3_HTML.gif . The relays can form single hop or multihop cooperation paths. The relay nodes might be malicious or selfish. We first show a simple one-hop case in this subsection, and the multihop case will be discussed in a later section.
Cooperative transmission is conducted in two phases. In Phase 1, source https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq4_HTML.gif broadcasts a message to destination https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq5_HTML.gif and relay nodes https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq6_HTML.gif . The received signal https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq7_HTML.gif at the destination https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq8_HTML.gif and the received signal https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq9_HTML.gif at relay https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq10_HTML.gif can be expressed as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_Equ1_HTML.gif
(1)
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_Equ2_HTML.gif
(2)
In (1) and (2), https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq11_HTML.gif represents the transmit power at the source, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq12_HTML.gif is the path loss between https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq13_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq14_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq15_HTML.gif is the path loss between https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq16_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq17_HTML.gif . https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq18_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq19_HTML.gif are fading factors associated with channel https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq20_HTML.gif and channel https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq21_HTML.gif , respectively. They are modeled as zero mean and unit variance complex Gaussian random variables. https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq22_HTML.gif is the transmitted information symbol with unit energy. In this paper, without loss of generality, we assume that BPSK is used and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq23_HTML.gif . https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq24_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq25_HTML.gif are the additive white Gaussian noises (AWGN) at the destination and the relay nodes, respectively. Without loss of generality, we assume that the noise power, denoted by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq26_HTML.gif , is the same for all the links. We also assume the block-fading environment, in which the channels are stable over each transmission frame.
When there is no relay, the transmission only contains Phase 1 and is referred to as direct transmission. In direct transmission, without the help from relay nodes, the SNR at the destination is
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_Equ3_HTML.gif
(3)
In Phase 2, relay nodes send information to the destination at consecutive time slots. After the destination receives the information from the source node and all relay nodes, which takes at least https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq27_HTML.gif time slots where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq28_HTML.gif is the number of relays, the destination combines the received messages and decodes data.
We examine the decode-and-forward (DF) cooperative transmission protocol [1, 2], in which the relays decode the source information received in Phase https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq29_HTML.gif and send the information to the destination in Phase https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq30_HTML.gif . Recall that relay https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq31_HTML.gif receives signal https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq32_HTML.gif from the source node https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq33_HTML.gif . Let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq34_HTML.gif denote the data decoded from https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq35_HTML.gif . Relay https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq36_HTML.gif then reencodes https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq37_HTML.gif , and sends it to the destination. Let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq38_HTML.gif denote the received signal at the destination from relay https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq39_HTML.gif . Then,
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_Equ4_HTML.gif
(4)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq40_HTML.gif is the transmit power at relay https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq41_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq42_HTML.gif is the path loss between https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq43_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq44_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq45_HTML.gif is the fading factor associated with channel https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq46_HTML.gif , which is modeled as zero mean and unit variance Gaussian random variable, and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq47_HTML.gif is the AWGN thermal noise with variance https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq48_HTML.gif .

3.2. Attack Models and Requirements on Defense

As discussed in Section 1, for cooperative transmission, we identify the following three types of misbehavior.
(i)
Selfish Silence. There are selfish nodes that do not relay messages for others in order to reserve their own energy.
 
(ii)
Malicious Forwarding. There are malicious nodes that send garbage information to the destination when they serve as relays.
 
(iii)
False Feedback. Malicious nodes report false channel information to make the destination perform signal combination inadequately.
 
Can security vulnerability in cooperative transmission be fixed? To answer this question, we take a closer look at the fundamental reasons causing security vulnerability.
First, cooperation among distributed entities is inheritably vulnerable to selfish and malicious behaviors. When a network protocol relies on multiple nodes' collaboration, the performance of this protocol can be degraded if some nodes are selfish and refuse to collaborate, and can be severely damaged if some nodes intentionally behave oppositely to what they are expected to do. For example, the routing protocols in mobile ad hoc networks rely on nodes jointly forwarding packets honestly, and the data aggregation protocols in sensor networks rely on sensors all reporting measured data honestly. It is well known that selfish and malicious behaviors are major threats against the above protocols. Similarly, since cooperative transmission relies on collaboration among source, relay and destination nodes, it can be threatened by selfish and malicious network nodes.
Second, when the decision-making process relies on feedback information from distributed network entities, this decision-making process can be undermined by dishonest feedbacks. This is a universal problem in many systems. For example, in many wireless resource allocation protocols, transmission power, bandwidth and data rate can all be determined based on channel state information obtained through feedbacks [5, 7, 11]. In cooperative transmission, the relay selection and signal combination process depend on channel state information obtained through feedbacks.
Third, from the view point of wireless communications, traditional representation of channel state information cannot address misbehavior of network nodes. In most cooperative transmission schemes, information about relay channel status is required in relay selection and transmission protocols. However, the traditional channel state information, either SNR or average BER, only describes the features of physical wireless channel, but cannot capture the misbehavior of relay nodes.
The above discussion leads to an understanding on the primary design goals of the defense mechanism. A defense mechanism should be able
(i)
to provide the distributed network entities a strong incentive to collaboration, which suppresses selfish behaviors,
 
(ii)
to detect malicious nodes and hold them responsible,
 
(iii)
to provide the cooperative transmission protocols with accurate channel information that (a) reflects both physical channel status as well as prediction on likelihood of misbehavior and (b) cannot be easily misled by dishonest feedbacks.
 

4. Trust-Based Cooperative Transmission

In this section, we first provide basic concepts related to trust evaluation in Section 4.1. Second, we discuss the key components in the proposed scheme, including the beta-function-based link quality representation and link quality propagation, in Section 4.2. Then, the signal combining algorithm at the destination is investigated in Section 4.3. Next, we present the overall system design in Section 4.4, followed by a discussion on implementation overhead in Section 4.5.

4.1. Trust Establishment Basic

Trust establishment has been recognized as a powerful tool to secure collaboration among distributed entities. It has been used in a wide range of applications for its unique advantages.
If network entities can evaluate how much they trust other network entities and behave accordingly, three advantages can be achieved. First, it provides an incentive for collaboration because the network entities that behave selfishly will have low trust values, which could reduce their probabilities of receiving services from other network entities. Second, it can limit the impact of malicious attacks because the misbehaving nodes, even before being formally detected, will have less chance to be selected as collaboration partners by other honest network nodes. Finally, it provides a way to detect malicious nodes according to trust values.
The purpose of trust management matches perfectly with the requirements for defending cooperative transmission.
Designing a trust establishment method for cooperative transmission is not an easy task. Although there are many trust establishment methods in the current literature, most of them sit in the application layer and few were developed for physical/MAC layer communication protocols. This is mainly due to the high implementation overhead. Trust establishment methods often require monitoring and message exchange among distributed nodes. In physical layer, monitoring and message exchange should be minimized to reduce overhead. Therefore, our design should rely on the information that is already available in the physical layer.
While the detailed trust establishment method will be described in a later section, we introduce some trust establishment background here.
When node https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq49_HTML.gif can observe node https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq50_HTML.gif 's behavior, node https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq51_HTML.gif establishes direct trust in node https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq52_HTML.gif based on observations. For example, in the beta-function-based-trust model [9], if node https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq53_HTML.gif observes that node https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq54_HTML.gif has behaved well for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq55_HTML.gif times and behaved badly for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq56_HTML.gif times, node https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq57_HTML.gif calculates the direct trust value [9] as https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq58_HTML.gif . The beta-function based trust model is widely used for networking applications [18, 20], whereas there are other ways to calculate direct trust mainly for electronic commerce, peer-to-peer file sharing, and access control [8, 17].
Trust can also be established through third parties. For example, if https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq59_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq60_HTML.gif have established a trust relationship and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq61_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq62_HTML.gif have established a trust relationship, then https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq63_HTML.gif can trust https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq64_HTML.gif to a certain degree if https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq65_HTML.gif tells https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq66_HTML.gif its trust opinion (i.e., recommendation) about https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq67_HTML.gif . This phenomenon is called trust propagation. Trust propagation becomes more complicated when there is more than one trust propagation path. Through trust propagation, indirect trust can be established. The specific ways to calculate indirect trust values are determined by trust models [8].
Finally, building trust in distributed networks requires authentication. That is, one node cannot easily pretend to be another node in the network.
No matter whether trust mechanism is used or not, the physical layer control messages need to be authenticated, when there is a risk of malicious attack. In this work, we assume that the messages are authenticated in cooperative transmission using existing techniques [21, 22].

4.2. Trust-Based Representation of Link Quality

The beta-function trust model is often used to calculate whether a node is trustworthy or not in networking applications. For example, node https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq68_HTML.gif has transmitted https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq69_HTML.gif packets to node https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq70_HTML.gif . Among them, node https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq71_HTML.gif received https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq72_HTML.gif packets with SNR greater than a certain threshold. These transmissions are considered to be successful. The transmission of other packets is considered to be failed. That is, there are https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq73_HTML.gif successful trials and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq74_HTML.gif failed trials. It is often assumed that the transmission of all https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq75_HTML.gif packets are independent and a Bernoulli distribution with parameter https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq76_HTML.gif governs whether the transmissions succeed or fail. (This is true with ideal interleavers.) Under these assumptions, given https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq77_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq78_HTML.gif , the parameter https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq79_HTML.gif follows a beta distribution as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_Equ5_HTML.gif
(5)
It is well known that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq80_HTML.gif has mean https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq81_HTML.gif and variance https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq82_HTML.gif as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_Equ6_HTML.gif
(6)
In the context of trust establishment, given https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq83_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq84_HTML.gif values, the trust value is often chosen as the mean of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq85_HTML.gif , that is, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq86_HTML.gif . This trust value represents how much a wireless link can be trusted to deliver packets correctly. In addition, some trust models introduce confidence values [23]. The confidence value is often calculated from the variance of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq87_HTML.gif . The confidence value represents how much confidence the subject has in the trust value.
Due to the physical meaning of the trust values and the close tie between trust and the beta function, we use the beta function to represent the link quality in this paper. This is equivalent to using trust and confidence values to describe the link quality.
Since an interleaver is often employed in the transceiver and noise is independent over time, we can justify that successful transmission of different packets is independent if the interleaver is carefully selected to be greater than the coherence time of the channel. As a result, we justify the use of the beta distribution. Compared with traditional frame error rate (FER), BER and SNR, the trust-based link quality representation has both advantages and disadvantages. As an advantage, the trust-based link quality can describe the joint effect of wireless channel condition, channel estimation error, and misbehavior of relay nodes. On the other hand, the trust-based link quality cannot describe the rapid changes in channel conditions because the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq88_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq89_HTML.gif values need to be collected over multiple data packets. Thus, it is suitable for scenarios with slow fading channels or high data rate transmission, in which channel condition remains stable over the transmission time of several packets.

4.3. Signal Combination at Destination

In this Section, we discuss how to utilize trust-based link quality information in the signal combination process. In Section 4.3.1, we discuss how the signal is combined at the waveform level. In Section 4.3.2, we extend our solution to the multihop case. Finally, we investigate how the proposed solution can defend against the bad-mouthing attack in Section 4.3.3.
First, from [24], the BER of BPSK in Rayleigh fading can be given by a function of SNR as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_Equ7_HTML.gif
(7)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq90_HTML.gif is the SNR. Here FER has one-to-one mapping with BER as https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq91_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq92_HTML.gif is the frame length. (Notice that other modulations can be treated in a similar way.) So in the rest of paper, we only mention BER. To simplify analysis, we assume that error control coding is not used in this paper. The design of the proposed scheme, however, will not be affected much by coding schemes. When coding is used, the BER expression in (7) will change. Depending on different coding systems such as Hamming code, RS code or convolutional code, the BER performance would be different. The BER would be reduced at the same SNR, or in other words, to achieve the same SNR, the required SNR will be reduced. So the reliability of the links due to the channel errors can be improved. On the other hand, coding is a way to improve reliability, but cannot address untrustworthy nodes. The proposed scheme will work for both coded and uncoded transmissions.

4.3.1. Waveform Level Combination

In traditional cooperative transmission schemes, maximal ratio combining (MRC) [24] is often used for waveform level combination. Specifically, for the case of a single-hop relay, remember that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq93_HTML.gif is the signal received from the direct path and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq94_HTML.gif is the signal received from the relay. Under the assumption that the relay can decode the source information correctly, the MRC combined signal with weight factor https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq95_HTML.gif is
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_Equ8_HTML.gif
(8)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq96_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq97_HTML.gif . The resulting SNR is given by [24]
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_Equ9_HTML.gif
(9)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq98_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq99_HTML.gif are SNR of direct transmission and relay transmission, respectively. When channel decoding errors and nodes' misbehavior are present, the MRC is not optimal any more. This is because the received signal quality is not only related to the final link to the destination, but also related to decoding errors or misbehavior at the relay nodes.
In the proposed scheme, we use the beta function to capture the channel variation as well as relay misbehavior. This requires a new waveform combination algorithm that is suitable for trust-based link quality representation.
We first consider the case of one single-hop relay path. Depending on whether or not the relay decodes correctly, using derivation similar to MRC [24], the combined SNR at the destination for BPSK modulation can be written as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_Equ10_HTML.gif
(10)
If the relay decodes correctly, the relayed signal improves the final SNR; otherwise, the SNR is reduced. Notice that here https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq100_HTML.gif is the weight for the direction transmission and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq101_HTML.gif is the weight for the relay transmission.
Let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq102_HTML.gif represent the link quality of the source-relay channel. We set the goal of signal combination to be maximizing the SNR at the destination after combination by finding the optimal weight vector for combination. That is,
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_Equ11_HTML.gif
(11)
By differentiating the right-hand side of (11), we obtain the optimal combination weight factor as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_Equ12_HTML.gif
(12)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq103_HTML.gif is the mean of the relay's successful decoding probability or the mean of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq104_HTML.gif . Obviously, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq105_HTML.gif .
When the relay decodes perfectly, that is, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq106_HTML.gif , we have
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_Equ13_HTML.gif
(13)
which is the same as that in MRC. When https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq107_HTML.gif , we have zero-divide-zero case in (12). In this case, we define https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq108_HTML.gif , since the relay decodes incorrectly and forwards independent data. As a result, the weight for the relay should be zero, and the system degrades to direct transmission only.
For the case of multiple single-hop relay paths, we assume that each relay has link quality https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq109_HTML.gif , SNR https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq110_HTML.gif , and weight https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq111_HTML.gif . Recall that the link quality report from the relay https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq112_HTML.gif is https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq113_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq114_HTML.gif equals to the number of successfully transmitted packets between the source and relay https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq115_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq116_HTML.gif equals to the number of unsuccessfully transmitted packets between the source and relay https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq117_HTML.gif . The mean of the beta function for relay https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq118_HTML.gif is denoted by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq119_HTML.gif and calculated as https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq120_HTML.gif . The overall expected SNR can be written as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_Equ14_HTML.gif
(14)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq121_HTML.gif indicates whether relay https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq122_HTML.gif decodes correctly, and
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_Equ15_HTML.gif
(15)
Equation (14) employs the probability https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq123_HTML.gif and conditional SNR in (10). In this case, the optimal https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq124_HTML.gif can be calculated numerically by minimizing (14) over parameter https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq125_HTML.gif . Some numerical methods such as the Newton Method [25, 26] can be utilized. Note that this optimization problem may not be convex. Achieving global optimum needs some methods such as simulated annealing [25, 26].
As a summary, the waveform level combination is performed in the following four steps.
(i)
For each path, the destination calculates https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq126_HTML.gif values based on the relays' report on their link quality.
 
(ii)
The second is maximizing the SNR (equivalent to minimizing BER) in (14) to obtain the optimal weight factors. If there is only one relay path, the optimal weight factor is given in (12).
 
(iii)
The third step is calculating the combined waveform https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq127_HTML.gif using (8).
 
(iv)
The fourth step is decoding the combined waveform https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq128_HTML.gif .
 

4.3.2. Extension to Multiple-Hop Relay Scenario

In the previous discussion, we focus on the one-hop relay case, in which the relay path is source-relay-destination. Next, we extend our proposed scheme to multiple such relay paths.
It is noted that the relay path may contain several concatenated relay nodes. An example of such relay path is https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq129_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq130_HTML.gif is the source node, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq131_HTML.gif is the destination, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq132_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq133_HTML.gif are two concatenated relay nodes. This scenario has been studied in [27, 28].
To make the proposed scheme suitable for general cooperative transmission scenarios, we develop an approach to calculate the link quality through concatenation propagation. In particular, let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq134_HTML.gif represent the link quality between https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq135_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq136_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq137_HTML.gif represent the link quality between https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq138_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq139_HTML.gif . If we can calculate the link quality between https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq140_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq141_HTML.gif , denoted by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq142_HTML.gif , from https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq143_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq144_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq145_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq146_HTML.gif , we will be able to use the approach developed in Section 4.3.1, by replacing https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq147_HTML.gif with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq148_HTML.gif . Then, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq149_HTML.gif represents the link quality of the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq150_HTML.gif relay path, which is https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq151_HTML.gif in this example.
Next, we present the link quality concatenation propagation model for calculating https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq152_HTML.gif . Let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq153_HTML.gif denote the probability that transmission will succeed through path https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq154_HTML.gif . The cumulative distribution function of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq155_HTML.gif can be written as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_Equ16_HTML.gif
(16)
Since it is very difficult to obtain the analytical solution to (16), we find a heuristic solution to approximate the distribution of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq156_HTML.gif . Three assumptions are made.
First, even though the distribution of the concatenated signal is not a beta function, we approximate the distribution of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq157_HTML.gif as a beta distribution https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq158_HTML.gif . Let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq159_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq160_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq161_HTML.gif represent the (mean, variance) of distribution https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq162_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq163_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq164_HTML.gif , respectively. The mean and variance of the beta distribution are given in (6).
Second, we assume https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq165_HTML.gif . Recall that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq166_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq167_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq168_HTML.gif represent the probability of successful transmission along path https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq169_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq170_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq171_HTML.gif , respectively. When the path is https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq172_HTML.gif , the packets are successfully transmitted from https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq173_HTML.gif to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq174_HTML.gif only if the packets are successfully transmitted from https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq175_HTML.gif to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq176_HTML.gif and from https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq177_HTML.gif to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq178_HTML.gif .
Third, we assume https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq179_HTML.gif . The third assumption means that the noises added by two concatenated links are independent and their variances can be added together.
With the above assumptions, we can derive that
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_Equ17_HTML.gif
(17)
In order to validate the accuracy of the proposed approximation, we have examined a large number of numerical examples by varying https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq180_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq181_HTML.gif . We have seen that the proposed heuristic approximation is a good fit. One such example is illustrated in Figure 2, which shows the probability density functions of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq182_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq183_HTML.gif . Here https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq184_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq185_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq186_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq187_HTML.gif . The means that the two beta functions are https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq188_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq189_HTML.gif , respectively. Figure 2 also shows the distribution of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq190_HTML.gif in (16) obtained numerically, and its approximation (i.e., https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq191_HTML.gif ) calculated from (17). By using concatenation of the beta functions, the proposed signal combining approach can handle the multihop relay scenario.

4.3.3. Defense against Bad-Mouthing Attack

In the bad-mouthing attack, the relay node does not report accurate link quality between itself and the source node. Instead, the relay node can report a very high link quality, that is, large https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq192_HTML.gif value and very small https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq193_HTML.gif value. As a consequence, the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq194_HTML.gif value calculated by the destination will be much higher than it should be. Then, the weight factor calculated in (12) will be larger than it should be. That is, the information from the lying relay is given a large weight. As a result, the bad-mouthing attack can reduce the BER performance. To overcome this problem, Algorithm 1 is developed.
Algorithm 1: Defense against bad-mouthing attack.
( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq195_HTML.gif )  The destination compares https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq196_HTML.gif , which is the BER estimated using (7) and (12), and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq197_HTML.gif ,
    which denotes the BER observed from real communications.
( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq198_HTML.gif )   if https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq199_HTML.gif   then
( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq200_HTML.gif )    if there is only one relay node then
( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq201_HTML.gif )      this relay node is marked as suspicious
( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq202_HTML.gif )    else
( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq203_HTML.gif )      for each relay node do
( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq204_HTML.gif )        excluding this relay node, and then performing BER estimation and signal combination
( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq205_HTML.gif )        if the difference between the newly estimated BER and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq206_HTML.gif is smaller than https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq207_HTML.gif   then
( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq208_HTML.gif )          mark this relay as suspicious, and send a warning report about this node to others.
( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq209_HTML.gif )            end  if
( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq210_HTML.gif )      end for
( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq211_HTML.gif )    end if
( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq212_HTML.gif )    For each suspected relay, adjust the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq213_HTML.gif value used in optimal weight factor calculation as https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq214_HTML.gif ,
      where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq215_HTML.gif is a small positive number (e.g., choosing https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq216_HTML.gif ), https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq217_HTML.gif is the current mean value of the link quality,
      and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq218_HTML.gif is the value after adjustment.
( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq219_HTML.gif )  end if
In this algorithm, the destination monitors the BER performance of the cooperative communication. That is, after performing signal combination and decoding, the destination can learn that the decoded messages have errors based on an error detection mechanism. On the other hand, the destination can estimate BER performance from (7) and (12). The detection of bad-mouthing attack is based on the comparison between observed BER (denoted by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq220_HTML.gif ) and the estimated BER (denoted by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq221_HTML.gif ), as demonstrated in Algorithm 1. In addition, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq222_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq223_HTML.gif can be determined through a learning process.
It is important to point out that Algorithm 1 detects more than the bad-mouthing attack. Whenever the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq224_HTML.gif value does not agree with the node's real behavior, which may result from maliciousness or severe channel estimation errors, Algorithm 1 can detect the suspicious node.
Additionally, the bad-mouthing attack is not specific for the proposed scheme. The traditional MRC method is also vulnerable to the bad-mouthing attack in which false channel state information is reported.

4.4. Trust-Assisted Cooperative Transmission

Cooperative transmission can benefit greatly from link quality information, which describes the joint effect of channel condition and untrustworthy relays' misbehavior. Figure 3 illustrates the overall design of a trust-assisted cooperative transmission scheme.
In the proposed scheme, each node maintains a cooperative transmission (CT) module and a trust/link quality manager (TLM) module. The basic operations are described as follows.
(i)
In the CT module, the node estimates the link quality between itself and its neighbor nodes. For example, if node https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq225_HTML.gif sends node https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq226_HTML.gif a total of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq227_HTML.gif packets and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq228_HTML.gif received https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq229_HTML.gif packets correctly, node https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq230_HTML.gif estimates the link quality between https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq231_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq232_HTML.gif as https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq233_HTML.gif . The estimated link quality information (LQI) is sent to the TLM module. Since the link quality information is estimated directly from observation, it is called direct LQI.
 
(ii)
The trust record in the TLM module stores two types of the link quality information. The first type is direct LQI, estimated by the CT module. The second type is indirect LQI, which is estimated by other nodes.
 
(iii)
Each node broadcasts its direct LQI to their neighbors. The broadcast messages, which are referred to as link quality reports, can be sent periodically or whenever there is a large change in the LQI.
 
(iv)
Upon receiving the link quality reports from neighbor nodes, one node will update the indirect LQI in its trust record. The indirect LQI is just the direct LQI estimated by other nodes.
 
(v)
In the TLM module, the links with low quality are detected. Let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq234_HTML.gif denote the link quality. The detection criteria are
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_Equ18_HTML.gif
(18)
 
The first condition means that the trust value is lower than a certain threshold. The second condition means that there is a sufficient number of trials to build this trust. Or, in other words, the confidence in the trust value is higher than a threshold. This detection will affect relay selection. Particularly, if node https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq235_HTML.gif detects that the link quality between https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq236_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq237_HTML.gif has low quality, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq238_HTML.gif should not be chosen as a relay between https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq239_HTML.gif and other nodes. This detection will also affect signal combination. Particularly, if node https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq240_HTML.gif detects that the link quality between https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq241_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq242_HTML.gif has low quality, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq243_HTML.gif should not use the signal received from https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq244_HTML.gif in signal combination, even if https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq245_HTML.gif has been working as a relay for node https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq246_HTML.gif .
The selection of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq247_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq248_HTML.gif affects ( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq249_HTML.gif ) how fast the cooperative transmission scheme can recover from malicious attacks and ( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq250_HTML.gif ) how much we tolerate the occasional and unintentional misbehavior. Through our simulations and experience from previous work on trust management [20, 29], we suggest to set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq251_HTML.gif between https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq252_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq253_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq254_HTML.gif between https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq255_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq256_HTML.gif . In future work, these thresholds can change dynamically with channel variation.
(i)
When some malicious nodes launch the bad-mouthing attack, the link quality reports may not be truthful. The CT model adopts the method discussed in Section 4.3.3 to detect suspicious nodes. The information about the suspicious nodes is sent to the TLM module. If a node has been detected as suspicious for more than a certain number of times, the TLM module declares it as a lying node and the CT module will exclude it from future cooperation.
 
(ii)
Finally, when the node is the destination node, the node will take link quality information from the trust record and perform signal combination using the approach described in Section 4.3.1.
 

4.5. Implementation Overhead

The major implementation overhead of the proposed scheme comes from the transmission of link quality reports. This overhead, however, is no more than the overhead in the traditional cooperative transmission schemes. In the traditional schemes to optimize the end-to-end performance, the destination needs to know the channel information between the source node and the relay nodes. Channel state information needs to be updated as frequently as the link quality reports, if not more frequently. Thus, the proposed scheme has equal or lower communication overhead than the traditional schemes.
Besides the communication overhead, the proposed scheme introduces some additional storage overhead. The storage overhead comes from the trust record. Assume that each node has https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq257_HTML.gif neighbors. The trust record needs to store https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq258_HTML.gif direct LQI and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq259_HTML.gif indirect LQI. Each LQI entry contains at most two IDs and ( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq260_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq261_HTML.gif ) values. This storage overhead is small. For example, when https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq262_HTML.gif and each LQI entry is represented by 4 bytes, the storage overhead is about 440 bytes. This storage overhead is acceptable for most wireless devices.
All calculations in the TLM model and CT module are simple except the optimization problem in (14). This optimization problem is easy to solve when the number of relays is small, since the complexity for the programming method (such as Newton) to solve (14) is about https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq263_HTML.gif to the power of the number of relays [25, 26]. When there is only one relay, the closed form solution has been derived.

4.6. Comparison to MRC

In this subsection, we summarize the qualitative difference between the traditional cooperative transmission scheme and the proposed scheme.
In traditional schemes, such as MRC, the destination estimates the link quality (in terms of SNR or BER) between the relay nodes and the destination. This link quality is used when the destination performs signal combination.
The traditional schemes, however, have one problem. That is, the destination does not know the link quality between the source node and the relay node, which can be affected by ( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq264_HTML.gif ) channel estimation errors and decoding errors at the relay node and/or ( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq265_HTML.gif ) malicious behaviors of the relay.
To solve this problem, the relay node can be asked to ( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq266_HTML.gif ) estimate the link quality between the relay and the source node and ( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq267_HTML.gif ) send the estimated link quality to the destination.
However, the problem still exists when the relay node is malicious. The malicious relay nodes can send false channel information to the destination (i.e., conduct the bad-mouthing attack). Furthermore, malicious relay nodes can manipulate the channel estimation. For example, between the relay and the destination, if the destination only estimates SNR, the malicious relay can maintain high SNR by sending wrong information with high power. Here, wrong information does not mean garbage information, but meaningful incorrect information.
On the other hand, the proposed scheme uses trust-based link quality representation, allows link quality propagation along relay paths, and has a way to handle the bad-mouthing attack. It can handle decoding errors at relay, as well as misbehaving and lying relay nodes. As we will show in Section 5, the proposed scheme has significant performance advantage over the MRC.

5. Simulation Results

In order to demonstrate the effectiveness of the proposed scheme, we set up the following simulations. The transmission power is https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq268_HTML.gif  dBm, thermal noise is https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq269_HTML.gif  dBm, and the propagation path loss factor is https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq270_HTML.gif . Rayleigh channel and BPSK modulation with packet size https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq271_HTML.gif are assumed. The source is located at location https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq272_HTML.gif (in meters) and the destination is located at location https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq273_HTML.gif . All relays are randomly located with left bottom corner at https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq274_HTML.gif and top right corner at https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq275_HTML.gif . The unit of distance and location information in this paper is 1 meter.
Each node estimates the link quality between itself and its neighbors periodically. This time period is denoted by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq276_HTML.gif . The value of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq277_HTML.gif is chosen according to the data rate. https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq278_HTML.gif should be long enough such that a few packets are transmitted during this time. For the time axis in the figures, one time unit is https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq279_HTML.gif .
Recall that the link quality reports are sent when relay nodes observe significant change in their link quality. For example, the significant change can be https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq280_HTML.gif of the previous link quality. In the experiments, each relay node sends out one link quality report at the beginning of the transmission. For the malicious relay, when it starts to send garbage messages, it will not honestly report its link quality changes. Instead, it either does not broadcast any link quality report, or sends a false link quality report. In the 2nd case, we say that it launches the bad-mouthing attack.

5.1. Pure Channel Estimation Error

In Figure 4, we show the average BER at the destination for three schemes: direct transmission without using relay nodes, traditional decode-and-forward cooperative transmission using MRC combining, and the proposed scheme. Recall that the traditional MRC does not consider the possible decoding errors at the relay. The relay moves from location https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq281_HTML.gif to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq282_HTML.gif . Compared with the direct transmission (i.e., no relay), the two cooperative transmission schemes can achieve better performance with a wide range of locations. We also see that the performance of MRC cooperative transmission degrades when the relay is very close to the destination because the source to relay channel is not good and channel estimation errors can occur at the relay. The MRC scheme has a minimum at around 180–190. The proposed scheme considers the relay's error in the receiver and therefore yields better performance than the traditional MRC.

5.2. Selfish Node and Malicious Node

In this set of simulations, there are https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq283_HTML.gif relays. The link quality (mean value https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq284_HTML.gif ) is shown in Figure 5 and the average SNR at the destination is shown in Figure 6. At time https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq285_HTML.gif , one relay starts to send the opposite bits (i.e., sending 1 (or 0) if receiving 0 (or 1)). This could be due to severe channel estimation error or maliciousness. Obviously the destination's performance drops significantly. According to Algorithm 1, the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq286_HTML.gif value of this malfunctioning or malicious relay is reduced. Within https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq287_HTML.gif time slots, the destination recognizes the misbehaving relay because its https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq288_HTML.gif value has been reduced for a certain number of times continually. Then, the destination reduces its weight to zero. As a result, the messages from the misbehaving relay will not be used in the signal combination process. The other relays' https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq289_HTML.gif values, which might be affected by the misbehaving relay, will recover gradually after more packets are transmitted correctly. At time https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq290_HTML.gif , another node leaves the network due to mobility or simply stops forwarding anything (i.e., selfish behavior). It takes about https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq291_HTML.gif time slots for the destination to remove this relay.
Several important observations are made.
(1)
When there are malicious relays, the SNR at the destination drops significantly. In this case, the performance of traditional cooperative transmission is even worse than that of direct transmission. This can be seen by comparing the dashed line and solid line around time 10 in Figure 6.
 
(2)
When the proposed scheme is used, the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq293_HTML.gif value maintained by the destination can capture the dynamics in the relay nodes. As shown in Figure 5, the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq294_HTML.gif value of the malicious node rapidly drops to zero, and the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq295_HTML.gif value of the selfish node drops quickly too. The https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq296_HTML.gif values of honest nodes will be affected at the beginning of the attack, but can recover even if the attack is still going on.
 
(3)
The trust-assisted cooperative transmission scheme results in higher SNR at the destination, compared with the noncooperative (direct) transmission scheme, except during a very short time at the beginning of the attacks.
 
We can see that the cooperative transmission in its original design is highly vulnerable to attacks from malicious relays. The proposed scheme can greatly reduce the damage of malicious attacks, and partially maintain the performance advantage of cooperative transmission.

5.3. Jamming Attack

The usage of relay nodes provides opportunities to the attackers. This is a disadvantage of cooperative transmission from the security point of view. On the other hand, we discover that cooperative transmission (if used properly) can benefit security in wireless networks.
Intuitively, wireless networks are subject to physical layer Denial of Service (DoS) attacks, such as jamming. Relay nodes provide spatial diversity in wireless transmission. A message (or waveform) arrives at the destination through multiple physical channels and paths. As a result, the destination may have a better chance to receive the source node's message in cooperative transmission than in traditional transmission, when some channels are jammed. Therefore, we study the performance of the proposed cooperative transmission scheme against wireless jamming attacks.
One jammer is randomly located within the square. An outage is reported if the SNR at the destination is lower than a threshold of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq297_HTML.gif  dB, under which the link is not reliable. Figure 7 shows the outage probability versus jamming power. When using the proposed cooperative transmission scheme, the outage probability is reduced compared with the direct transmission case. In the example of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq298_HTML.gif relays, when the jamming power is https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq299_HTML.gif  mW, which is twice the source transmission power, more than 10% of packets are still correctly received at the destination. Even with 2 relays, there is an obvious reduction in the outage probability.
Figure 8 shows that the outage probability decreases as the number of relays increases. For example, to achieve 50% outage with jamming power https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq300_HTML.gif  mW, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq301_HTML.gif relay nodes are needed. We can see that cooperative transmission can effectively reduce the outage probability, when the jamming power is comparable to the regular transmission power.
In Figure 9, the jammer moves from https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq302_HTML.gif to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq303_HTML.gif with power https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq304_HTML.gif  mW. We see that the location of the jammer plays a vital role in the attack. If the jammer is far away from the destination, the proposed scheme can significantly reduce the effect of jamming. For example, with 10 relays and jammer location at https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq305_HTML.gif , the performance is almost the same as that of no jammer case. However, if the jammer is very close to the destination, the proposed scheme can only improve the performance slightly.
In both Figures, we see that the proposed cooperative transmission scheme can reduce link outage probability. This is the advantage of cooperative transmission from the security point of view.

5.4. Bad-Mouthing Attack

In this simulation, one relay is located at (1000,100). Since the relay is far from the source, the source-relay link quality is bad. The relay sends honest link quality reports at the beginning. Then at time https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq306_HTML.gif , the relay launches the bad-mouthing attack by telling the destination that its link to the source is perfect. As a result, the destination gives higher weight to the signal forwarded by the relay. Since the relay's signal is not perfect, the BER performance at the destination degrades a lot, even lower than that in the direct transmission. Using the detection method in Section 4.4, the destination realizes that it is under attack and suspects the relay's link quality report at time https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq307_HTML.gif . Then the destination reduces the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq308_HTML.gif value of the relay until the analytical BER agrees with the observed BER.
Figure 10 shows the average BER of four schemes: direct transmission, the proposed scheme without attack, the proposed scheme under the bad-mouthing attack, and the traditional MRC scheme. Three observations are made. First, without the bad-mouthing attack, the proposed scheme yields a much lower BER than the direct transmission. Second, at the beginning of the bad-mouthing attack, the proposed scheme can have worse performance than the direct transmission. Third, the proposed scheme can recover from the bad-mouthing attack after a period of time.

6. Conclusions

In this paper, we investigate the security issues related to cooperative transmission from three angles: ( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq309_HTML.gif ) vulnerabilities analysis of traditional cooperative transmission schemes; ( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq310_HTML.gif ) design of the trust-assisted cooperative transmission scheme that is robust against attacks; and ( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F740912/MediaObjects/13638_2009_Article_1737_IEq311_HTML.gif ) illustration of the potential advantage of physical layer cooperation against wireless jamming attacks.
In particular, it is demonstrated that the security vulnerabilities of traditional cooperative transmission significantly damage the performance. The proposed trust-assisted cooperative transmission scheme can handle relays' misbehavior as well as channel estimation errors. The core idea of this scheme has four parts. First, the wireless link quality is described by trust values in the format of the beta function. This solves the problem that traditional SNR-based and BER-based channel information cannot accurately describe channel quality under attacks. Second, based on the properties of the beta function, we develop a method to calculate the link quality over multiple hops. Third, the trust-based link quality information is used to perform signal combination at the destination. Fourth, the bad-mouthing attack is detected by comparison between theoretical BER and observed BER. The proposed scheme can be implemented in a fully distributed manner and has low implementation overhead. Compared with the traditional cooperative transmission schemes, which are vulnerable to attacks, the proposed scheme can maintain the performance advantage over the direct transmission under various attacks. Additionally, compared with the direct transmission, the proposed scheme can reduce the damage caused by wireless jamming attacks, when the jamming power is comparable to the regular transmission power. This is the advantage of physical layer cooperation from the security point of view.

Acknowledgments

Some ideas and results in this manuscript appear in an earlier conference paper published in IEEE Globecom 2007. This work is supported by NSF CNS-0910461, NSF CNS-0905556, and NSF CNS-0831315.
Open AccessThis article is distributed under the terms of the Creative Commons Attribution 2.0 International License (https://​creativecommons.​org/​licenses/​by/​2.​0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Literatur
1.
Zurück zum Zitat Sendonaris A, Erkip E, Aazhang B: User cooperation diversity-part I: system description. IEEE Transactions on Communications 2003, 51(11):1927-1938. 10.1109/TCOMM.2003.818096CrossRef Sendonaris A, Erkip E, Aazhang B: User cooperation diversity-part I: system description. IEEE Transactions on Communications 2003, 51(11):1927-1938. 10.1109/TCOMM.2003.818096CrossRef
2.
Zurück zum Zitat Laneman JN, Tse DNC, Wornell GW: Cooperative diversity in wireless networks: efficient protocols and outage behavior. IEEE Transactions on Information Theory 2004, 50(12):3062-3080. 10.1109/TIT.2004.838089MATHMathSciNetCrossRef Laneman JN, Tse DNC, Wornell GW: Cooperative diversity in wireless networks: efficient protocols and outage behavior. IEEE Transactions on Information Theory 2004, 50(12):3062-3080. 10.1109/TIT.2004.838089MATHMathSciNetCrossRef
4.
Zurück zum Zitat Luo J, Blum RS, Greenstein LJ, Cimini LJ, Haimovich AM: New approaches for cooperative use of multiple antennas in ad hoc wireless networks. Proceedings of the 60th IEEE Vehicular Technology Conference (VTC '04), September 2004, Los Angeles, Calif, USA 4: 2769-2773. Luo J, Blum RS, Greenstein LJ, Cimini LJ, Haimovich AM: New approaches for cooperative use of multiple antennas in ad hoc wireless networks. Proceedings of the 60th IEEE Vehicular Technology Conference (VTC '04), September 2004, Los Angeles, Calif, USA 4: 2769-2773.
5.
Zurück zum Zitat Bletsas A, Lippman A, Reed DP: A simple distributed method for relay selection in cooperative diversity wireless networks, based on reciprocity and channel measurements. of the 61st IEEE Vehicular Technology Conference (VTC '05), May 2005, Stockholm, Sweden 3: 1484-1488. Bletsas A, Lippman A, Reed DP: A simple distributed method for relay selection in cooperative diversity wireless networks, based on reciprocity and channel measurements. of the 61st IEEE Vehicular Technology Conference (VTC '05), May 2005, Stockholm, Sweden 3: 1484-1488.
6.
Zurück zum Zitat Han Z, Himsoon T, Siriwongpairat W, Liu KJR: Resource allocation for multiuser cooperative OFDM networks: who helps whom and how to cooperate. IEEE Transactions on Vehicular Transactions 2009, 58(6):2378-2391.CrossRef Han Z, Himsoon T, Siriwongpairat W, Liu KJR: Resource allocation for multiuser cooperative OFDM networks: who helps whom and how to cooperate. IEEE Transactions on Vehicular Transactions 2009, 58(6):2378-2391.CrossRef
7.
Zurück zum Zitat Wang B, Han Z, Liu KJR: Stackelberg game for distributed resource allocation over multiuser cooperative communication networks. Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM '06), November-December 2006, San Francisco, Calif, USA 1-5. Wang B, Han Z, Liu KJR: Stackelberg game for distributed resource allocation over multiuser cooperative communication networks. Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM '06), November-December 2006, San Francisco, Calif, USA 1-5.
8.
Zurück zum Zitat Jøsang A, Ismail R, Boyd C: A survey of trust and reputation systems for online service provision. Decision Support Systems 2007, 43(2):618-644. 10.1016/j.dss.2005.05.019CrossRef Jøsang A, Ismail R, Boyd C: A survey of trust and reputation systems for online service provision. Decision Support Systems 2007, 43(2):618-644. 10.1016/j.dss.2005.05.019CrossRef
9.
Zurück zum Zitat Jøsang A, Ismail R: The beta reputation system. Proceedings of the 15th Bled Electronic Commerce Conference, June 2002, Bled, Slovenia Jøsang A, Ismail R: The beta reputation system. Proceedings of the 15th Bled Electronic Commerce Conference, June 2002, Bled, Slovenia
10.
Zurück zum Zitat Han Z, Poor HV: Lifetime improvement in wireless sensor networks via collaborative beamforming and cooperative transmission. IET Microwaves, Antennas & Propagation 2007, 1(6):1103-1110. 10.1049/iet-map:20060294CrossRef Han Z, Poor HV: Lifetime improvement in wireless sensor networks via collaborative beamforming and cooperative transmission. IET Microwaves, Antennas & Propagation 2007, 1(6):1103-1110. 10.1049/iet-map:20060294CrossRef
11.
Zurück zum Zitat Han Z, Poor HV: Coalition games with cooperative transmission: a cure for the curse of boundary nodes in selfish packet-forwarding wireless networks. IEEE Transactions on Communications 2009, 57(1):203-213.CrossRef Han Z, Poor HV: Coalition games with cooperative transmission: a cure for the curse of boundary nodes in selfish packet-forwarding wireless networks. IEEE Transactions on Communications 2009, 57(1):203-213.CrossRef
12.
Zurück zum Zitat Zhao Y, Adve RS, Lim TJ: Improving amplify-and-forward relay networks: optimal power allocation versus selection. Proceedings of the IEEE International Symposium on Information Theory (ISIT '06), July 2006, Seattle, Wash, USA 1234-1238. Zhao Y, Adve RS, Lim TJ: Improving amplify-and-forward relay networks: optimal power allocation versus selection. Proceedings of the IEEE International Symposium on Information Theory (ISIT '06), July 2006, Seattle, Wash, USA 1234-1238.
13.
Zurück zum Zitat Zigui Y, Liu J, Host-Madsen A: Cooperative routing and power allocation in ad-hoc networks. Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM '05), December 2005, Dallas, Tex, USA 5: 2730-2734. Zigui Y, Liu J, Host-Madsen A: Cooperative routing and power allocation in ad-hoc networks. Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM '05), December 2005, Dallas, Tex, USA 5: 2730-2734.
14.
Zurück zum Zitat Lo CK, Heath RW Jr., Vishwanath S: Hybrid-ARQ in multihop networks with opportunistic relay selection. Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP '07), April 2007, Honolulu, Hawaii, USA 3: 617-620. Lo CK, Heath RW Jr., Vishwanath S: Hybrid-ARQ in multihop networks with opportunistic relay selection. Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP '07), April 2007, Honolulu, Hawaii, USA 3: 617-620.
15.
Zurück zum Zitat Saad W, Han Z, Debbah M, Hjørungnes A: Coalition formation for distributed-user cooperation in wireless networks. Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC '08), April 2008, Las Vegas, Nev, USA Saad W, Han Z, Debbah M, Hjørungnes A: Coalition formation for distributed-user cooperation in wireless networks. Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC '08), April 2008, Las Vegas, Nev, USA
16.
Zurück zum Zitat Stallings W: Protect Your Privacy: A Guide for PGP Users. Prentice-Hall, Englewood Cliffs, NJ, USA; 1995. Stallings W: Protect Your Privacy: A Guide for PGP Users. Prentice-Hall, Englewood Cliffs, NJ, USA; 1995.
17.
Zurück zum Zitat Kamvar SD, Schlosser MT, Garcia-Molina H: The eigentrust algorithm for reputation management in P2P networks. Proceedings of the 12th International Conference on World Wide Web, May 2003, Budapest, Hungary 640-651. Kamvar SD, Schlosser MT, Garcia-Molina H: The eigentrust algorithm for reputation management in P2P networks. Proceedings of the 12th International Conference on World Wide Web, May 2003, Budapest, Hungary 640-651.
18.
Zurück zum Zitat Ganeriwal S, Srivastava MB: Reputation-based framework for high integrity sensor networks. Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '04), October 2004, Washington, DC, USA 66-77.CrossRef Ganeriwal S, Srivastava MB: Reputation-based framework for high integrity sensor networks. Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '04), October 2004, Washington, DC, USA 66-77.CrossRef
19.
Zurück zum Zitat Langheinrich M: When trust does not compute—the role of trust in ubiquitous computing. Proceedings of the 5th International Conference on Ubiquitous Computing (UBICOMP '03), October 2003, Seattle, Wash, USA Langheinrich M: When trust does not compute—the role of trust in ubiquitous computing. Proceedings of the 5th International Conference on Ubiquitous Computing (UBICOMP '03), October 2003, Seattle, Wash, USA
20.
Zurück zum Zitat Sun YL, Yu W, Han Z, Liu KJR: Information theoretic framework of trust modeling and evaluation for ad hoc networks. IEEE Journal on Selected Areas in Communications 2006, 24(2):305-317.MATHCrossRef Sun YL, Yu W, Han Z, Liu KJR: Information theoretic framework of trust modeling and evaluation for ad hoc networks. IEEE Journal on Selected Areas in Communications 2006, 24(2):305-317.MATHCrossRef
21.
Zurück zum Zitat Yu PL, Baras JS, Sadler BM: Physical-layer authentication. IEEE Transactions on Information Forensics and Security 2008, 3(1):38-51.CrossRef Yu PL, Baras JS, Sadler BM: Physical-layer authentication. IEEE Transactions on Information Forensics and Security 2008, 3(1):38-51.CrossRef
22.
Zurück zum Zitat Xiao L, Greenstein LJ, Mandayam NB, Trappe W: Using the physical layer for wireless authentication in time-variant channels. IEEE Transactions on Wireless Communications 2008, 7(7):2571-2579.CrossRef Xiao L, Greenstein LJ, Mandayam NB, Trappe W: Using the physical layer for wireless authentication in time-variant channels. IEEE Transactions on Wireless Communications 2008, 7(7):2571-2579.CrossRef
23.
Zurück zum Zitat Theodorakopoulos G, Baras JS: Trust evaluation in ad-hoc networks. Proceedings of the 3rd ACM Workshop on Wireless Security (WiSE '04), October 2004, Philadelphia, Pa, USA 1-10. Theodorakopoulos G, Baras JS: Trust evaluation in ad-hoc networks. Proceedings of the 3rd ACM Workshop on Wireless Security (WiSE '04), October 2004, Philadelphia, Pa, USA 1-10.
24.
Zurück zum Zitat Proakis JG: Digital Communications. 3rd edition. McGraw-Hill, New York, NY, USA; 1995. Proakis JG: Digital Communications. 3rd edition. McGraw-Hill, New York, NY, USA; 1995.
25.
Zurück zum Zitat Boyd S, Vandenberghe L: Convex Optimization. Cambridge University Press, Cambridge, UK; 2006. Boyd S, Vandenberghe L: Convex Optimization. Cambridge University Press, Cambridge, UK; 2006.
26.
Zurück zum Zitat Han Z, Liu KJR: Resource Allocation for Wireless Networks: Basics, Techniques, and Applications. Cambridge University Press, Cambridge, UK; 2008.CrossRef Han Z, Liu KJR: Resource Allocation for Wireless Networks: Basics, Techniques, and Applications. Cambridge University Press, Cambridge, UK; 2008.CrossRef
27.
Zurück zum Zitat Sadek AK, Su W, Liu KJR: A class of cooperative communication protocols for multi-node wireless networks. Proceedings of the 6th IEEE Workshop on Signal Processing Advances in Wireless Communications (SPAWC '05), June 2005, New York, NY,USA 560-564. Sadek AK, Su W, Liu KJR: A class of cooperative communication protocols for multi-node wireless networks. Proceedings of the 6th IEEE Workshop on Signal Processing Advances in Wireless Communications (SPAWC '05), June 2005, New York, NY,USA 560-564.
28.
Zurück zum Zitat Boyer J, Falconer DD, Yanikomeroglu H: Multihop diversity in wireless relaying channels. IEEE Transactions on Communications 2004, 52(10):1820-1830. 10.1109/TCOMM.2004.836447CrossRef Boyer J, Falconer DD, Yanikomeroglu H: Multihop diversity in wireless relaying channels. IEEE Transactions on Communications 2004, 52(10):1820-1830. 10.1109/TCOMM.2004.836447CrossRef
29.
Zurück zum Zitat Sun YL, Han Z, Yu W, Liu KJR: A trust evaluation framework in distributed networks: vulnerability analysis and defense against attacks. Proceedings of the 25th IEEE International Conference on Computer Communications (INFOCOM '06), April 2006, Barcelona, Spain 1-13. Sun YL, Han Z, Yu W, Liu KJR: A trust evaluation framework in distributed networks: vulnerability analysis and defense against attacks. Proceedings of the 25th IEEE International Conference on Computer Communications (INFOCOM '06), April 2006, Barcelona, Spain 1-13.
Metadaten
Titel
Distributed Cooperative Transmission with Unreliable and Untrustworthy Relay Channels
verfasst von
Zhu Han
Yan Lindsay Sun
Publikationsdatum
01.12.2009
Verlag
Springer International Publishing
DOI
https://doi.org/10.1155/2009/740912

Weitere Artikel der Ausgabe 1/2009

EURASIP Journal on Wireless Communications and Networking 1/2009 Zur Ausgabe