Skip to main content
Top
Published in: Wireless Personal Communications 1/2014

01-03-2014

Secrecy Rate of Two-Hop AF Relaying Networks with an Untrusted Relay

Authors: Nanrun Zhou, Xun Chen, Chisheng Li, Zhi Xue

Published in: Wireless Personal Communications | Issue 1/2014

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Two cooperative communication protocols, two-way and one-way half-duplex relayings, are investigated and then compared in the amplify-and-forward (AF) mode. The relay is assumed to play the roles of eavesdropper and relay (i.e., an untrusted relay). With a fair power constraint at each node, the secrecy rate of the one-way relaying protocol is proved to be zero strictly. For the two-way relaying protocol, the signal-to-noise ratio (SNR) threshold is derived, above which the secrecy rate is non-zero. Defining a parameter, namely mistrust level, and non-zero secrecy rate can be achieved for the one-way relaying protocol in certain range of the mistrust level at high SNR. With a fair total power constraint, no matter how unreliable the relay is, the two-way AF half-duplex relaying protocol is proved to be a better choice under high SNR.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Csiszár, I., & Körner, J. (1978). Broadcast channels with confidential messages. IEEE Transactions on Information Theory, 24, 339–348.CrossRefMATH Csiszár, I., & Körner, J. (1978). Broadcast channels with confidential messages. IEEE Transactions on Information Theory, 24, 339–348.CrossRefMATH
3.
go back to reference Leung-Yan-Cheong, S. K., & Hellman, M. E. (1978). The Gaussian wiretap channel. IEEE Transactions on Information Theory, 24, 451–456.CrossRefMATHMathSciNet Leung-Yan-Cheong, S. K., & Hellman, M. E. (1978). The Gaussian wiretap channel. IEEE Transactions on Information Theory, 24, 451–456.CrossRefMATHMathSciNet
4.
go back to reference Dong, L., et al. (2010). Improving wireless physical layer security via cooperating relays. IEEE Transactions on Signal Processing, 58(3), 1875–1888.CrossRefMathSciNet Dong, L., et al. (2010). Improving wireless physical layer security via cooperating relays. IEEE Transactions on Signal Processing, 58(3), 1875–1888.CrossRefMathSciNet
5.
go back to reference Zhu, J., Mo, J., & Tao, M. (2010). Cooperative secret communication with artificial noise in symmetric interference channel. IEEE Communications Letters, 14(10), 885–887.CrossRef Zhu, J., Mo, J., & Tao, M. (2010). Cooperative secret communication with artificial noise in symmetric interference channel. IEEE Communications Letters, 14(10), 885–887.CrossRef
6.
go back to reference Zhang, R., et al. (2010). Physical layer security for two way relay communications with friendly jammers. In IEEE GLOBECOM 10, Miami, FL, 2010. Zhang, R., et al. (2010). Physical layer security for two way relay communications with friendly jammers. In IEEE GLOBECOM 10, Miami, FL, 2010.
7.
go back to reference Jeong, C., Kim, I. M., & Kim, D. I. (2012). Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system. IEEE Transactions on Signal Processing, 60(1), 310–325.CrossRefMathSciNet Jeong, C., Kim, I. M., & Kim, D. I. (2012). Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system. IEEE Transactions on Signal Processing, 60(1), 310–325.CrossRefMathSciNet
8.
go back to reference Wang, H. M., Yin, Q., & Xia, X. G. (2012). Distributed beamforming for physical-layer security of two-way relay networks. IEEE Transactions on Signal Processing, 60(7), 3532–3545.CrossRefMathSciNet Wang, H. M., Yin, Q., & Xia, X. G. (2012). Distributed beamforming for physical-layer security of two-way relay networks. IEEE Transactions on Signal Processing, 60(7), 3532–3545.CrossRefMathSciNet
9.
go back to reference Krikidis, I. (2010). Opportunistic relay selection for cooperative networks with secrecy constraints. IET Communications, 4(15), 1787–1791.CrossRef Krikidis, I. (2010). Opportunistic relay selection for cooperative networks with secrecy constraints. IET Communications, 4(15), 1787–1791.CrossRef
10.
go back to reference Han, Y., et al. (2009). Performance bounds for two-way amplify-and-forward relaying. IEEE Transactions on Wireless Communications, 8(1), 432–439.CrossRef Han, Y., et al. (2009). Performance bounds for two-way amplify-and-forward relaying. IEEE Transactions on Wireless Communications, 8(1), 432–439.CrossRef
11.
go back to reference Ping, J., & Ting, S. H. (2009). Rate performance of AF two-way relaying in low SNR region. IEEE Communications Letters, 13(4), 233–235.CrossRef Ping, J., & Ting, S. H. (2009). Rate performance of AF two-way relaying in low SNR region. IEEE Communications Letters, 13(4), 233–235.CrossRef
12.
go back to reference He, X., & Yener, A. (2008). Two-hop secure communication using an untrusted relay: A case for cooperative jamming. In IEEE GLOBECOM 08, New Orleans, LA, 2008. He, X., & Yener, A. (2008). Two-hop secure communication using an untrusted relay: A case for cooperative jamming. In IEEE GLOBECOM 08, New Orleans, LA, 2008.
13.
go back to reference Gómez Mármol, F., Martínez Pérez, G., & Gómez Skarmeta, A. F. (2009). TACS, a trust model for P2P networks. Wireless Personal Communications, 51(1), 153–164.CrossRef Gómez Mármol, F., Martínez Pérez, G., & Gómez Skarmeta, A. F. (2009). TACS, a trust model for P2P networks. Wireless Personal Communications, 51(1), 153–164.CrossRef
Metadata
Title
Secrecy Rate of Two-Hop AF Relaying Networks with an Untrusted Relay
Authors
Nanrun Zhou
Xun Chen
Chisheng Li
Zhi Xue
Publication date
01-03-2014
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 1/2014
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-013-1351-1

Other articles of this Issue 1/2014

Wireless Personal Communications 1/2014 Go to the issue