Skip to main content
Erschienen in: Wireless Networks 6/2019

15.02.2019

Secure communication via an untrusted relay with unreliable backhaul connections

verfasst von: Van Phu Tuan, Hyung Yun Kong

Erschienen in: Wireless Networks | Ausgabe 6/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This paper studies the secrecy performance of a wireless energy harvesting system in which a source connected to wireless backhaul links sends information to a destination via an untrusted relay that not only helps the overall commutation but also overhears the sources confidential information. The secrecy capacity is created by using destination-assisted jamming signals. The jamming provides additional energy to the relay. To analyze the secrecy performance of the proposed system, we derived analytical expressions for the secrecy outage probability (SOP) and the average secrecy capacity, and the high-power approximations for the SOP. The accuracy of the calculations is verified by Monte Carlo simulations. Numerical results provide useful insight into the effects of the system parameters, such as the failure probability of unreliable backhaul links, the transmit powers, the power-splitting ratio, and the locations of the relay, on the secrecy performance.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Literatur
1.
Zurück zum Zitat Truong, T., Nguyen, M., Kundu, C., & Nguyen, L. D. (2018). Secure cognitive radio networks with source selection and unreliable backhaul connections. IET Communications, 12, 1771–1777.CrossRef Truong, T., Nguyen, M., Kundu, C., & Nguyen, L. D. (2018). Secure cognitive radio networks with source selection and unreliable backhaul connections. IET Communications, 12, 1771–1777.CrossRef
2.
Zurück zum Zitat Nguyen, H. T., Zhang, J., Yang, N., Duong, T. Q., & Hwang, W. (2017). Secure cooperative single carrier systems under unreliable backhaul and dense networks impact. IEEE Access, 5, 18310–18324.CrossRef Nguyen, H. T., Zhang, J., Yang, N., Duong, T. Q., & Hwang, W. (2017). Secure cooperative single carrier systems under unreliable backhaul and dense networks impact. IEEE Access, 5, 18310–18324.CrossRef
3.
Zurück zum Zitat Kim, K. J., Yeoh, P. L., Orlik, P. V., & Poor, H. V. (2016). Secrecy performance of finite-sized cooperative single carrier systems with unreliable backhaul connections. IEEE Transaction on Signal Processing, 64(17), 4403–4416.MathSciNetCrossRefMATH Kim, K. J., Yeoh, P. L., Orlik, P. V., & Poor, H. V. (2016). Secrecy performance of finite-sized cooperative single carrier systems with unreliable backhaul connections. IEEE Transaction on Signal Processing, 64(17), 4403–4416.MathSciNetCrossRefMATH
4.
Zurück zum Zitat Ding, Z., Perlaza, S. M., Esnaola, I., & Poor, H. V. (2014). Power allocation strategies in energy harvesting wireless cooperative networks. IEEE Transaction on Wireless Commun., 13(2), 846–860.CrossRef Ding, Z., Perlaza, S. M., Esnaola, I., & Poor, H. V. (2014). Power allocation strategies in energy harvesting wireless cooperative networks. IEEE Transaction on Wireless Commun., 13(2), 846–860.CrossRef
5.
Zurück zum Zitat Nasir, A., Zhou, X., Durrani, S., & Kennedy, R. (2015). Wireless-powered relays in cooperative communications: Time-switching relaying protocols and throughput analysis. IEEE Transactions on Communications, 63(5), 1607–1622.CrossRef Nasir, A., Zhou, X., Durrani, S., & Kennedy, R. (2015). Wireless-powered relays in cooperative communications: Time-switching relaying protocols and throughput analysis. IEEE Transactions on Communications, 63(5), 1607–1622.CrossRef
6.
Zurück zum Zitat Hu, L., et al. (2018). Cooperative jamming for physical layer security enhancement in internet of things. IEEE Internet of Things Journal, 5(1), 219–228.CrossRef Hu, L., et al. (2018). Cooperative jamming for physical layer security enhancement in internet of things. IEEE Internet of Things Journal, 5(1), 219–228.CrossRef
7.
Zurück zum Zitat Liu, Y., Chen, H. H., & Wang, L. (2017). Physical layer security for next generation wireless networks: Theories, technologies, and challenges. IEEE Communications Surveys and Tutorials, 19(1), 347–376.CrossRef Liu, Y., Chen, H. H., & Wang, L. (2017). Physical layer security for next generation wireless networks: Theories, technologies, and challenges. IEEE Communications Surveys and Tutorials, 19(1), 347–376.CrossRef
8.
Zurück zum Zitat Liu, L., Zhang, R., & Chua, K. C. (2014). Secrecy wireless information and power transfer with MISO beamforming. IEEE Transactions on Signal Processing, 62, 1850–1863.MathSciNetCrossRefMATH Liu, L., Zhang, R., & Chua, K. C. (2014). Secrecy wireless information and power transfer with MISO beamforming. IEEE Transactions on Signal Processing, 62, 1850–1863.MathSciNetCrossRefMATH
9.
Zurück zum Zitat Zhang, H., Li, C., Huang, Y., & Yang, L. (2015). Secure beamforming for SWIPT in multiuser MISO broadcast channel with confidential messages. IEEE Communications Letters, 19, 1347–1350.CrossRef Zhang, H., Li, C., Huang, Y., & Yang, L. (2015). Secure beamforming for SWIPT in multiuser MISO broadcast channel with confidential messages. IEEE Communications Letters, 19, 1347–1350.CrossRef
10.
Zurück zum Zitat Hoang, T. M., Duong, T. Q., Vo, N. S., & Kundu, C. (2017). Physical layer security in cooperative energy harvesting networks with a Friendly Jammer. IEEE Wireless Communications Letters, 6, 174–177.CrossRef Hoang, T. M., Duong, T. Q., Vo, N. S., & Kundu, C. (2017). Physical layer security in cooperative energy harvesting networks with a Friendly Jammer. IEEE Wireless Communications Letters, 6, 174–177.CrossRef
11.
Zurück zum Zitat Kalamkar, S. S., & Banerjee, A. (2017). Secure communication via a wireless energy harvesting untrusted relay. IEEE Transactions on Vehicular Technology, 66(3), 2199–2213.CrossRef Kalamkar, S. S., & Banerjee, A. (2017). Secure communication via a wireless energy harvesting untrusted relay. IEEE Transactions on Vehicular Technology, 66(3), 2199–2213.CrossRef
12.
Zurück zum Zitat Guo, J., Zhao, N., Yu, F. R., Liu, X., & Leung, V. C. M. (2017). Exploiting adversarial jamming signals for energy harvesting in interference networks. IEEE Transactions on Wireless Communications, 16, 1267–1280.CrossRef Guo, J., Zhao, N., Yu, F. R., Liu, X., & Leung, V. C. M. (2017). Exploiting adversarial jamming signals for energy harvesting in interference networks. IEEE Transactions on Wireless Communications, 16, 1267–1280.CrossRef
13.
Zurück zum Zitat Zhao, N., Cao, Y., Yu, F. R., Chen, Y., Jin, M., & Leung, V. C. M. (2018). Artificial noise assisted secure interference networks with wireless power transfer. IEEE Transactions on Vehicular Technology, 67, 1087–1098.CrossRef Zhao, N., Cao, Y., Yu, F. R., Chen, Y., Jin, M., & Leung, V. C. M. (2018). Artificial noise assisted secure interference networks with wireless power transfer. IEEE Transactions on Vehicular Technology, 67, 1087–1098.CrossRef
14.
Zurück zum Zitat Yin, C., Nguyen, H. T., Kundu, C., Kaleem, Z., Garcia-Palacios, E., & Duong, T. Q. (2018). Secure energy harvesting relay networks with unreliable Backhaul connections. IEEE Access, 6, 12074–12084.CrossRef Yin, C., Nguyen, H. T., Kundu, C., Kaleem, Z., Garcia-Palacios, E., & Duong, T. Q. (2018). Secure energy harvesting relay networks with unreliable Backhaul connections. IEEE Access, 6, 12074–12084.CrossRef
15.
Zurück zum Zitat Zhou, X., Zhang, R., & Ho, C. K. (2013). Wireless information and power transfer: Architecture design and rate-energy tradeoff. IEEE Transactions on Communications, 61, 4754–4767.CrossRef Zhou, X., Zhang, R., & Ho, C. K. (2013). Wireless information and power transfer: Architecture design and rate-energy tradeoff. IEEE Transactions on Communications, 61, 4754–4767.CrossRef
16.
Zurück zum Zitat Gradshteyn, I. S., & Ryzhik, I. M. (2007). Table of integrals, series, and products (7th ed.). New York: Academic Press.MATH Gradshteyn, I. S., & Ryzhik, I. M. (2007). Table of integrals, series, and products (7th ed.). New York: Academic Press.MATH
17.
Zurück zum Zitat Cao, Y., et al. (2018). Optimization or alignment: Secure primary transmission assisted by secondary networks. IEEE Journal on Selected Areas in Communications, 36, 905–917.CrossRef Cao, Y., et al. (2018). Optimization or alignment: Secure primary transmission assisted by secondary networks. IEEE Journal on Selected Areas in Communications, 36, 905–917.CrossRef
18.
Zurück zum Zitat Khafagy, M. G., Ismail, A., Alouini, M. S., & Assa, S. (2015). Efficient cooperative protocols for full duplex relaying over Nakagami-m fading channels. IEEE Transactions on Wireless Communications, 14(6), 3456–3470.CrossRef Khafagy, M. G., Ismail, A., Alouini, M. S., & Assa, S. (2015). Efficient cooperative protocols for full duplex relaying over Nakagami-m fading channels. IEEE Transactions on Wireless Communications, 14(6), 3456–3470.CrossRef
19.
Zurück zum Zitat Olver, F. W. J., Lozier, D. W., Boisvert, R. F., & Clark, C. W. (2010). NIST handbook of mathematical functions. Cambridge: Cambridge University Press.MATH Olver, F. W. J., Lozier, D. W., Boisvert, R. F., & Clark, C. W. (2010). NIST handbook of mathematical functions. Cambridge: Cambridge University Press.MATH
20.
Zurück zum Zitat Zhu, G., Zhong, C., Suraweera, H. A., Zhang, Z., Yuen, C., & Yin, R. (2014). Ergodic capacity comparison of different relay precoding schemes in dual-hop AF systems with co-Channel interferer. IEEE Transactions on Communications, 62(7), 2314–2328.CrossRef Zhu, G., Zhong, C., Suraweera, H. A., Zhang, Z., Yuen, C., & Yin, R. (2014). Ergodic capacity comparison of different relay precoding schemes in dual-hop AF systems with co-Channel interferer. IEEE Transactions on Communications, 62(7), 2314–2328.CrossRef
21.
Zurück zum Zitat Mathai, A. M., & Saxena, R. K. (1978). The H-function with applications in statistics and other disciplines. New York: Wiley.MATH Mathai, A. M., & Saxena, R. K. (1978). The H-function with applications in statistics and other disciplines. New York: Wiley.MATH
Metadaten
Titel
Secure communication via an untrusted relay with unreliable backhaul connections
verfasst von
Van Phu Tuan
Hyung Yun Kong
Publikationsdatum
15.02.2019
Verlag
Springer US
Erschienen in
Wireless Networks / Ausgabe 6/2019
Print ISSN: 1022-0038
Elektronische ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-019-01940-9

Weitere Artikel der Ausgabe 6/2019

Wireless Networks 6/2019 Zur Ausgabe

Neuer Inhalt