Skip to main content
Top
Published in: Wireless Personal Communications 4/2018

26-10-2018

Secure Relay Selection of Cognitive Two-Way Denoise-and-Forward Relaying Networks

Authors: Ruifeng Gao, Xiaodong Ji, Zhihua Bao

Published in: Wireless Personal Communications | Issue 4/2018

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In this paper, secrecy performance of a cognitive two-way denoise-and-forward relaying network consisting of two primary user (PT and PD) nodes, two secondary source (SA and SB) nodes, multiple secondary relay (\({\textit{SR}}_i\)) nodes and an eavesdropper (E) node is considered, where SA and SB exchange their messages with the help of one of the relays using a two-way relaying scheme. The eavesdropper tries to wiretap the information transmitted between SA and SB. To improve secrecy performance of the network, two relay selection schemes called maximum sum rate and maximum secrecy capacity based relay selection (MSRRS and MSCRS) are proposed and analyzed in terms of intercept probability. It is proved that the MSRRS and MSCRS schemes have the same secrecy performance. Two parameters called average number gain and average cost gain are proposed to show the performance of the proposed relay selection schemes. Numerical results demonstrated that with 10 relay nodes, the proposed relay selection schemes can achieve, respectively, 3.7 dB and 1.9 dB’s improvements in terms of the reduced intercept probability and the enhanced secrecy capacity compared to the traditional round-robin scheme.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Appendix
Available only for authorised users
Literature
1.
go back to reference Haykin, S. (2005). Cognitive radio: Brain-empowered wireless communications. IEEE Journal on Selected Areas in Communications, 23(2), 201–220.CrossRef Haykin, S. (2005). Cognitive radio: Brain-empowered wireless communications. IEEE Journal on Selected Areas in Communications, 23(2), 201–220.CrossRef
2.
go back to reference Mitola, J., & Maguire, G. (1999). Cognitive radio: Making software radios more personal. IEEE Personal Communications, 6(4), 13–18.CrossRef Mitola, J., & Maguire, G. (1999). Cognitive radio: Making software radios more personal. IEEE Personal Communications, 6(4), 13–18.CrossRef
3.
go back to reference Singh, J. S. P., Singh, R., & Rai, M. K. (2015). Cooperative sensing for cognitive radio: A powerful access method for shadowing environment. Wireless Personal Communications, 80(4), 1363–1379.CrossRef Singh, J. S. P., Singh, R., & Rai, M. K. (2015). Cooperative sensing for cognitive radio: A powerful access method for shadowing environment. Wireless Personal Communications, 80(4), 1363–1379.CrossRef
4.
go back to reference Zou, Y., Zhu, J., Wang, X., & Hanzo, L. (2016). A survey on wireless security: Technical challenges, recent advances, and future trends. Proceedings of the IEEE, 104(9), 1727–1765.CrossRef Zou, Y., Zhu, J., Wang, X., & Hanzo, L. (2016). A survey on wireless security: Technical challenges, recent advances, and future trends. Proceedings of the IEEE, 104(9), 1727–1765.CrossRef
6.
go back to reference Leung-Yan-Cheong, S., & Hellman, M. (1978). The gaussian wire-tap channel. IEEE Transactions on Information Theory, 24(4), 451–456.MathSciNetCrossRef Leung-Yan-Cheong, S., & Hellman, M. (1978). The gaussian wire-tap channel. IEEE Transactions on Information Theory, 24(4), 451–456.MathSciNetCrossRef
7.
go back to reference Dong, L., Han, Z., Petropulu, A. P., & Poor, H. V. (2010). Improving wireless physical-layer security via cooperating relays. IEEE Transactions on Signal Processing, 58(3), 1875–1888.MathSciNetCrossRef Dong, L., Han, Z., Petropulu, A. P., & Poor, H. V. (2010). Improving wireless physical-layer security via cooperating relays. IEEE Transactions on Signal Processing, 58(3), 1875–1888.MathSciNetCrossRef
8.
go back to reference Zou, Y., Wang, X., & Shen, W. (2013). Optimal relay selection for physical-layer security in cooperative wireless networks. IEEE Journal on Selected Areas in Communications, 31(10), 2099–2111.CrossRef Zou, Y., Wang, X., & Shen, W. (2013). Optimal relay selection for physical-layer security in cooperative wireless networks. IEEE Journal on Selected Areas in Communications, 31(10), 2099–2111.CrossRef
9.
go back to reference Chen, J., Zhang, R., Song, L., Han, Z., & Jiao, B. (2012). Joint relay and jammer selection for secure two-way relay networks. IEEE Transactions on Information Forensics and Security, 7(1), 310–320.CrossRef Chen, J., Zhang, R., Song, L., Han, Z., & Jiao, B. (2012). Joint relay and jammer selection for secure two-way relay networks. IEEE Transactions on Information Forensics and Security, 7(1), 310–320.CrossRef
10.
go back to reference Zhao, S., Li, Q., & Zhang, Q. (2015). Optimal secure relay beamforming for non-regenerative multi-relay networks with energy harvesting constraint. Wireless Personal Communications, 85(4), 2355–2365.CrossRef Zhao, S., Li, Q., & Zhang, Q. (2015). Optimal secure relay beamforming for non-regenerative multi-relay networks with energy harvesting constraint. Wireless Personal Communications, 85(4), 2355–2365.CrossRef
11.
go back to reference Wang, J., Chen, J., Duan, H., et al. (2014). Jammer selection for secure two-way DF relay communications with imperfect CSI. In 2014 16th international conference on advanced communication technology (ICACT) (pp. 300–303). IEEE. Wang, J., Chen, J., Duan, H., et al. (2014). Jammer selection for secure two-way DF relay communications with imperfect CSI. In 2014 16th international conference on advanced communication technology (ICACT) (pp. 300–303). IEEE.
12.
go back to reference Ding, X., Song, T., & Zou, Y. (2017). Security-reliability tradeoff analysis of artificial noise aided two-way opportunistic relay selection. IEEE Transactions on Vehicular Technology, 66(5), 3930–3941. Ding, X., Song, T., & Zou, Y. (2017). Security-reliability tradeoff analysis of artificial noise aided two-way opportunistic relay selection. IEEE Transactions on Vehicular Technology, 66(5), 3930–3941.
13.
go back to reference Zhang, J., & Gursoy, M. C. (2011). Secure relay beamforming over cognitive radio channels. In 2011 45th annual conference on information sciences and systems (pp. 1–5). Zhang, J., & Gursoy, M. C. (2011). Secure relay beamforming over cognitive radio channels. In 2011 45th annual conference on information sciences and systems (pp. 1–5).
14.
go back to reference Wang, D., Ren, P., Du, Q., Sun, L., & Wang, Y. (2016). Cooperative relaying and jamming for primary secure communication in cognitive two-way networks. In 2016 IEEE 83rd vehicular technology conference (VTC Spring) (pp. 1–5). Wang, D., Ren, P., Du, Q., Sun, L., & Wang, Y. (2016). Cooperative relaying and jamming for primary secure communication in cognitive two-way networks. In 2016 IEEE 83rd vehicular technology conference (VTC Spring) (pp. 1–5).
15.
go back to reference Alavi, F., Mokari, N., & Saeedi, H. (2015). Secure resource allocation in OFDMA-based cognitive radio networks with two-way relays. In Electrical engineering (pp. 171–176). IEEE. Alavi, F., Mokari, N., & Saeedi, H. (2015). Secure resource allocation in OFDMA-based cognitive radio networks with two-way relays. In Electrical engineering (pp. 171–176). IEEE.
16.
go back to reference Zhao, R., Yuan, Y., & Fan, L. (2017). Secrecy performance analysis of cognitive decode-and-forward relay networks in Nakagami-\(m\) fading channels. IEEE Transactions on Communications, 65(2), 549–563.CrossRef Zhao, R., Yuan, Y., & Fan, L. (2017). Secrecy performance analysis of cognitive decode-and-forward relay networks in Nakagami-\(m\) fading channels. IEEE Transactions on Communications, 65(2), 549–563.CrossRef
17.
go back to reference Fan, J., Li, L., Bao, T., & Zhang, H. (2015). Two-way relaying with differential MPSK modulation in virtual full duplexing system. In IEEE/CIC international conference on communications in China (ICCC), 2015 (pp. 1–5). Fan, J., Li, L., Bao, T., & Zhang, H. (2015). Two-way relaying with differential MPSK modulation in virtual full duplexing system. In IEEE/CIC international conference on communications in China (ICCC), 2015 (pp. 1–5).
18.
go back to reference Guan, W., & Liu, K. J. R. (2011). Two-way denoise-and-forward relaying with non-coherent differential modulation. In IEEE global telecommunications conference—GLOBECOM, 2011 (pp. 1–5). Guan, W., & Liu, K. J. R. (2011). Two-way denoise-and-forward relaying with non-coherent differential modulation. In IEEE global telecommunications conference—GLOBECOM, 2011 (pp. 1–5).
19.
go back to reference Masjedi, M., Hoseini, A. M. D., & Gazor, S. (2016). Non-coherent detection and denoise-and-forward two-way relay networks. IEEE Transactions on Communications, 64(11), 4497–4505.CrossRef Masjedi, M., Hoseini, A. M. D., & Gazor, S. (2016). Non-coherent detection and denoise-and-forward two-way relay networks. IEEE Transactions on Communications, 64(11), 4497–4505.CrossRef
20.
go back to reference Popovski, P., & Yomo, H. (2006). The anti-packets can increase the achievable throughput of a wireless multi-hop network. In 2006 IEEE international conference on communications (Vol. 9, pp. 3885–3890). Popovski, P., & Yomo, H. (2006). The anti-packets can increase the achievable throughput of a wireless multi-hop network. In 2006 IEEE international conference on communications (Vol. 9, pp. 3885–3890).
21.
go back to reference Zhang, Z., Lv, T., & Yang, S. (2013). Round-robin relaying with diversity in amplify-and-forward multisource cooperative communications. IEEE Transactions on Vehicular Technology, 62(3), 1251–1266.CrossRef Zhang, Z., Lv, T., & Yang, S. (2013). Round-robin relaying with diversity in amplify-and-forward multisource cooperative communications. IEEE Transactions on Vehicular Technology, 62(3), 1251–1266.CrossRef
22.
go back to reference Alavi, F., & Saeedi, H. (2015). Radio resource allocation to provide physical layer security in relay-assisted cognitive radio networks. IET Communications, 9(17), 2124–2130.CrossRef Alavi, F., & Saeedi, H. (2015). Radio resource allocation to provide physical layer security in relay-assisted cognitive radio networks. IET Communications, 9(17), 2124–2130.CrossRef
Metadata
Title
Secure Relay Selection of Cognitive Two-Way Denoise-and-Forward Relaying Networks
Authors
Ruifeng Gao
Xiaodong Ji
Zhihua Bao
Publication date
26-10-2018
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 4/2018
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-018-5987-8

Other articles of this Issue 4/2018

Wireless Personal Communications 4/2018 Go to the issue