Weitere Artikel dieser Ausgabe durch Wischen aufrufen
Cooperative transmission is an emerging wireless communication technique that improves wireless channel capacity through multiuser cooperation in the physical layer. It is expected to have a profound impact on network performance and design. However, cooperative transmission can be vulnerable to selfish behaviors and malicious attacks, especially in its current design. In this paper, we investigate two fundamental questions Does cooperative transmission provide new opportunities to malicious parties to undermine the network performance? Are there new ways to defend wireless networks through physical layer cooperation? Particularly, we study the security vulnerabilities of the traditional cooperative transmission schemes and show the performance degradation resulting from the misbehaviors of relay nodes. Then, we design a trust-assisted cooperative scheme that can detect attacks and has self-healing capability. The proposed scheme performs much better than the traditional schemes when there are malicious/selfish nodes or severe channel estimation errors. Finally, we investigate the advantage of cooperative transmission in terms of defending against jamming attacks. A reduction in link outage probability is achieved.
Sendonaris A, Erkip E, Aazhang B: User cooperation diversity-part I: system description. IEEE Transactions on Communications 2003, 51(11):1927-1938. 10.1109/TCOMM.2003.818096 CrossRef
Luo J, Blum RS, Greenstein LJ, Cimini LJ, Haimovich AM: New approaches for cooperative use of multiple antennas in ad hoc wireless networks. Proceedings of the 60th IEEE Vehicular Technology Conference (VTC '04), September 2004, Los Angeles, Calif, USA 4: 2769-2773.
Bletsas A, Lippman A, Reed DP: A simple distributed method for relay selection in cooperative diversity wireless networks, based on reciprocity and channel measurements. of the 61st IEEE Vehicular Technology Conference (VTC '05), May 2005, Stockholm, Sweden 3: 1484-1488.
Han Z, Himsoon T, Siriwongpairat W, Liu KJR: Resource allocation for multiuser cooperative OFDM networks: who helps whom and how to cooperate. IEEE Transactions on Vehicular Transactions 2009, 58(6):2378-2391. CrossRef
Wang B, Han Z, Liu KJR: Stackelberg game for distributed resource allocation over multiuser cooperative communication networks. Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM '06), November-December 2006, San Francisco, Calif, USA 1-5.
Jøsang A, Ismail R, Boyd C: A survey of trust and reputation systems for online service provision. Decision Support Systems 2007, 43(2):618-644. 10.1016/j.dss.2005.05.019 CrossRef
Jøsang A, Ismail R: The beta reputation system. Proceedings of the 15th Bled Electronic Commerce Conference, June 2002, Bled, Slovenia
Han Z, Poor HV: Lifetime improvement in wireless sensor networks via collaborative beamforming and cooperative transmission. IET Microwaves, Antennas & Propagation 2007, 1(6):1103-1110. 10.1049/iet-map:20060294 CrossRef
Han Z, Poor HV: Coalition games with cooperative transmission: a cure for the curse of boundary nodes in selfish packet-forwarding wireless networks. IEEE Transactions on Communications 2009, 57(1):203-213. CrossRef
Zhao Y, Adve RS, Lim TJ: Improving amplify-and-forward relay networks: optimal power allocation versus selection. Proceedings of the IEEE International Symposium on Information Theory (ISIT '06), July 2006, Seattle, Wash, USA 1234-1238.
Zigui Y, Liu J, Host-Madsen A: Cooperative routing and power allocation in ad-hoc networks. Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM '05), December 2005, Dallas, Tex, USA 5: 2730-2734.
Lo CK, Heath RW Jr., Vishwanath S: Hybrid-ARQ in multihop networks with opportunistic relay selection. Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP '07), April 2007, Honolulu, Hawaii, USA 3: 617-620.
Saad W, Han Z, Debbah M, Hjørungnes A: Coalition formation for distributed-user cooperation in wireless networks. Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC '08), April 2008, Las Vegas, Nev, USA
Stallings W: Protect Your Privacy: A Guide for PGP Users. Prentice-Hall, Englewood Cliffs, NJ, USA; 1995.
Kamvar SD, Schlosser MT, Garcia-Molina H: The eigentrust algorithm for reputation management in P2P networks. Proceedings of the 12th International Conference on World Wide Web, May 2003, Budapest, Hungary 640-651.
Ganeriwal S, Srivastava MB: Reputation-based framework for high integrity sensor networks. Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '04), October 2004, Washington, DC, USA 66-77. CrossRef
Langheinrich M: When trust does not compute—the role of trust in ubiquitous computing. Proceedings of the 5th International Conference on Ubiquitous Computing (UBICOMP '03), October 2003, Seattle, Wash, USA
Yu PL, Baras JS, Sadler BM: Physical-layer authentication. IEEE Transactions on Information Forensics and Security 2008, 3(1):38-51. CrossRef
Xiao L, Greenstein LJ, Mandayam NB, Trappe W: Using the physical layer for wireless authentication in time-variant channels. IEEE Transactions on Wireless Communications 2008, 7(7):2571-2579. CrossRef
Theodorakopoulos G, Baras JS: Trust evaluation in ad-hoc networks. Proceedings of the 3rd ACM Workshop on Wireless Security (WiSE '04), October 2004, Philadelphia, Pa, USA 1-10.
Proakis JG: Digital Communications. 3rd edition. McGraw-Hill, New York, NY, USA; 1995.
Boyd S, Vandenberghe L: Convex Optimization. Cambridge University Press, Cambridge, UK; 2006.
Han Z, Liu KJR: Resource Allocation for Wireless Networks: Basics, Techniques, and Applications. Cambridge University Press, Cambridge, UK; 2008. CrossRef
Sadek AK, Su W, Liu KJR: A class of cooperative communication protocols for multi-node wireless networks. Proceedings of the 6th IEEE Workshop on Signal Processing Advances in Wireless Communications (SPAWC '05), June 2005, New York, NY,USA 560-564.
Boyer J, Falconer DD, Yanikomeroglu H: Multihop diversity in wireless relaying channels. IEEE Transactions on Communications 2004, 52(10):1820-1830. 10.1109/TCOMM.2004.836447 CrossRef
Sun YL, Han Z, Yu W, Liu KJR: A trust evaluation framework in distributed networks: vulnerability analysis and defense against attacks. Proceedings of the 25th IEEE International Conference on Computer Communications (INFOCOM '06), April 2006, Barcelona, Spain 1-13.
- Distributed Cooperative Transmission with Unreliable and Untrustworthy Relay Channels
Yan Lindsay Sun
- Springer International Publishing
- EURASIP Journal on Wireless Communications and Networking
Elektronische ISSN: 1687-1499
Neuer Inhalt/© ITandMEDIA, Best Practices für die Mitarbeiter-Partizipation in der Produktentwicklung/© astrosystem | stock.adobe.com