Skip to main content

Lund University Publications

LUND UNIVERSITY LIBRARIES

Relaying techniques for enhancing the physical layer secrecy in cooperative networks with multiple eavesdroppers

Al-nahari, Azzam LU ; Krikidis, Ioannis ; Ibrahim, Ahmed ; Dessouky, Moawad and Abd El-Samie, Fathi (2012) In Transactions on Emerging Telecommunications Technologies 25(4). p.445-460
Abstract
Physical layer security has recently attracted considerable attention in the context of information-theoretic point of view. In this paper, we investigate relay selection schemes for security-constrained half-duplex cooperative wireless networks with multiple eavesdroppers, which have the ability to cooperate to overhear the source transmission. The proposed techniques select a trusted decode-and-forward relay to assist the source transmission and maximize the achievable secure rate for different eavesdropper policies (cooperation or not); for the two cases, we assume that the channel is always available. In addition, a jamming method that selects two relay nodes to create an intentional interference at both phases of the... (More)
Physical layer security has recently attracted considerable attention in the context of information-theoretic point of view. In this paper, we investigate relay selection schemes for security-constrained half-duplex cooperative wireless networks with multiple eavesdroppers, which have the ability to cooperate to overhear the source transmission. The proposed techniques select a trusted decode-and-forward relay to assist the source transmission and maximize the achievable secure rate for different eavesdropper policies (cooperation or not); for the two cases, we assume that the channel is always available. In addition, a jamming method that selects two relay nodes to create an intentional interference at both phases of the decode-and-forward protocol to confound the eavesdropper nodes is also considered. Both the source–destination and source–eavesdroppers links are taken into account in the proposed analysis. Secrecy rate and secrecy outage probability are the two performance metrics that are used to verify the effectiveness of the proposed schemes while asymptotic approximations of the secrecy outage probability are also derived. Simulation and analytical results demonstrate the performance improvement of the proposed schemes. (Less)
Please use this url to cite or link to this publication:
author
; ; ; and
publishing date
type
Contribution to journal
publication status
published
subject
in
Transactions on Emerging Telecommunications Technologies
volume
25
issue
4
pages
445 - 460
publisher
Wiley
external identifiers
  • scopus:84902263784
ISSN
2161-3915
DOI
10.1002/ett.2581
language
English
LU publication?
no
id
34553d35-15fa-4c8a-b18c-2ef4500e90ba (old id 3223777)
date added to LUP
2016-04-04 08:20:56
date last changed
2022-02-01 20:31:43
@article{34553d35-15fa-4c8a-b18c-2ef4500e90ba,
  abstract     = {{Physical layer security has recently attracted considerable attention in the context of information-theoretic point of view. In this paper, we investigate relay selection schemes for security-constrained half-duplex cooperative wireless networks with multiple eavesdroppers, which have the ability to cooperate to overhear the source transmission. The proposed techniques select a trusted decode-and-forward relay to assist the source transmission and maximize the achievable secure rate for different eavesdropper policies (cooperation or not); for the two cases, we assume that the channel is always available. In addition, a jamming method that selects two relay nodes to create an intentional interference at both phases of the decode-and-forward protocol to confound the eavesdropper nodes is also considered. Both the source–destination and source–eavesdroppers links are taken into account in the proposed analysis. Secrecy rate and secrecy outage probability are the two performance metrics that are used to verify the effectiveness of the proposed schemes while asymptotic approximations of the secrecy outage probability are also derived. Simulation and analytical results demonstrate the performance improvement of the proposed schemes.}},
  author       = {{Al-nahari, Azzam and Krikidis, Ioannis and Ibrahim, Ahmed and Dessouky, Moawad and Abd El-Samie, Fathi}},
  issn         = {{2161-3915}},
  language     = {{eng}},
  month        = {{11}},
  number       = {{4}},
  pages        = {{445--460}},
  publisher    = {{Wiley}},
  series       = {{Transactions on Emerging Telecommunications Technologies}},
  title        = {{Relaying techniques for enhancing the physical layer secrecy in cooperative networks with multiple eavesdroppers}},
  url          = {{http://dx.doi.org/10.1002/ett.2581}},
  doi          = {{10.1002/ett.2581}},
  volume       = {{25}},
  year         = {{2012}},
}