Skip to main content

2017 | OriginalPaper | Buchkapitel

Secrecy Performance of Joint Relay and Jammer Selection Methods in Cluster Networks: With and Without Hardware Noises

verfasst von : Phu Tran Tin, Tran Trung Duy, Phuong T. Tran, Miroslav Voznak

Erschienen in: AETA 2016: Recent Advances in Electrical Engineering and Related Sciences

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this paper, we propose joint relay and jammer selection protocols to enhance secrecy performance for cluster-based multi-hop networks. In particular, without channel state information (CSI) of the eavesdropping links, one of available nodes at each cluster is selected to forward the source data, relying on the CSI of the data links, while a jammer node is randomly chosen to generate artificial noises to an eavesdropper. We also investigate the impact of hardware noises on the secrecy performance of the proposed protocols. When the transceiver hardware is perfect, we derive exact closed-form expressions of secrecy outage probability (SOP) for the proposed protocols over Rayleigh fading channel. We then perform Monte Carlo based computer simulations to verify the theoretical results.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Gopala, P.K., Lai, L., Gamal, H.E.: On the secrecy capacity of fading channels. IEEE Trans. Inf. Theory 54(10), 4687–4698 (2008)MathSciNetCrossRefMATH Gopala, P.K., Lai, L., Gamal, H.E.: On the secrecy capacity of fading channels. IEEE Trans. Inf. Theory 54(10), 4687–4698 (2008)MathSciNetCrossRefMATH
3.
Zurück zum Zitat Krikidis, I.: Opportunistic relay selection for cooperative networks with secrecy constraints. IET Commun. 4(15), 1787–1791 (2010)CrossRef Krikidis, I.: Opportunistic relay selection for cooperative networks with secrecy constraints. IET Commun. 4(15), 1787–1791 (2010)CrossRef
4.
Zurück zum Zitat Krikidis, I., Thompson, J., Mclaughlin, S.: Relay selection for secure cooperative networks with jamming. IEEE Trans. Wirel. Commun. 8(10), 5003–5011 (2009)CrossRef Krikidis, I., Thompson, J., Mclaughlin, S.: Relay selection for secure cooperative networks with jamming. IEEE Trans. Wirel. Commun. 8(10), 5003–5011 (2009)CrossRef
5.
Zurück zum Zitat Mo, J., Tao, M., Liu, Y.: Relay placement for physical layer security: a secure connection perspective. IEEE Commun. Lett. 16(6) (2012) Mo, J., Tao, M., Liu, Y.: Relay placement for physical layer security: a secure connection perspective. IEEE Commun. Lett. 16(6) (2012)
6.
Zurück zum Zitat Duy, T.T., Son, P.N.: Secrecy performances of multicast underlay cognitive protocols with partial relay selection and without eavesdropper’s information. KSII Trans. Internet Inf. Syst. (TIIS) 9(11), 4623–4643 (2015) Duy, T.T., Son, P.N.: Secrecy performances of multicast underlay cognitive protocols with partial relay selection and without eavesdropper’s information. KSII Trans. Internet Inf. Syst. (TIIS) 9(11), 4623–4643 (2015)
7.
Zurück zum Zitat Duong, T.Q., Duy, T.T., Elkashlan, M., Tran, N.H., Dobre, O.A.: Secured cooperative cognitive radio networks with relay selection. In: IEEE Global Communications Conference (Globecom 2014), Austin, TX USA, pp. 3074–3079, December 2014 Duong, T.Q., Duy, T.T., Elkashlan, M., Tran, N.H., Dobre, O.A.: Secured cooperative cognitive radio networks with relay selection. In: IEEE Global Communications Conference (Globecom 2014), Austin, TX USA, pp. 3074–3079, December 2014
8.
Zurück zum Zitat Liu, Y., Wang, L., Duy, T.T., Elkashlan, M., Duong, T.Q.: Relay selection for security enhancement in cognitive relay networks. IEEE Wirel. Commun. Lett. 4(1), 46–49 (2015)CrossRef Liu, Y., Wang, L., Duy, T.T., Elkashlan, M., Duong, T.Q.: Relay selection for security enhancement in cognitive relay networks. IEEE Wirel. Commun. Lett. 4(1), 46–49 (2015)CrossRef
9.
Zurück zum Zitat Duy, T.T., Duong, T.Q., Thanh, T.L., Bao, V.N.Q.: Secrecy performance analysis with relay selection methods under impact of co-channel interference. IET Commun. 9(11), 1427–1435 (2015)CrossRef Duy, T.T., Duong, T.Q., Thanh, T.L., Bao, V.N.Q.: Secrecy performance analysis with relay selection methods under impact of co-channel interference. IET Commun. 9(11), 1427–1435 (2015)CrossRef
10.
Zurück zum Zitat Duy, T.T., Kong, H.Y.: Secrecy performance analysis of multihop transmission protocols in cluster networks. Wirel. Pers. Commun. (WPC) 82(4), 2505–2518 (2015)CrossRef Duy, T.T., Kong, H.Y.: Secrecy performance analysis of multihop transmission protocols in cluster networks. Wirel. Pers. Commun. (WPC) 82(4), 2505–2518 (2015)CrossRef
11.
Zurück zum Zitat Duy, T.T., Duong, T.Q., da Costa, D.B., Bao, V.N.Q., Elkashlan, M.: Proactive relay selection with joint impact of hardware impairment and co-channel interference. IEEE Trans. Commun. 63(5), 1594–1606 (2015)CrossRef Duy, T.T., Duong, T.Q., da Costa, D.B., Bao, V.N.Q., Elkashlan, M.: Proactive relay selection with joint impact of hardware impairment and co-channel interference. IEEE Trans. Commun. 63(5), 1594–1606 (2015)CrossRef
Metadaten
Titel
Secrecy Performance of Joint Relay and Jammer Selection Methods in Cluster Networks: With and Without Hardware Noises
verfasst von
Phu Tran Tin
Tran Trung Duy
Phuong T. Tran
Miroslav Voznak
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-50904-4_78