Secure Selection for Decode-and-Forward Cooperative Networks with Untrusted Relay
DENG Dan1, ZHOU Wen2
1. School of Information Engineering, Guangzhou Panyu Polytechnic. Guangzhou, Guangdong 511483, China;
2. College of Information Science and Technology, Nanjing Forestry University, Nanjing, Jiangshu 210037, China
Secure communication in decode-and-forward cooperative networks with untrusted relay in the presence of direct links is investigated in this paper.In the considered system,one base-station is selected for secure transmission to the destination node with the aid of an untrusted relay node.Three selection criteria are proposed to improve the secrecy capacity based on both the direct links and the relaying links.The exact close-form expressions and corresponding asymptotic expressions on secrecy outage probability are derived.From the asymptotic expressions and simulation results,the sub-optimal criterion has the same performance with the optimal criterion.Furthermore,the partial selection criterion achieves the full diversity gain.
[1] Fan Lisheng,Lei Xianfu,Duong T Q,Elkashlan M.Secure multiuser communications in multiple amplify-and-forward relay networks[J].IEEE Transactions on Communications,2014,62(9):3299-3310.
[2] Huang Xiaobin,He Jing,Li Quanzhong,Zhang Qi,Qin Jiayin.Optimal power allocation for multicarrier secure communications in full-duplex decode-and-forward relay networks[J].IEEE Communications Letters,2014,18(12):2169-2172.
[3] Fan L,Zhang S,Duong T Q,Karagiannidis G K.Secure switch-and-stay combining (SSSC) for cognitive relay networks[J].IEEE Transactions on Communications,2016,64(1):70-82.
[4] Krikidis I,Thompson J.,Mclaughlin S,Goertz N.Amplify-and-forward with partial relay selection[J].IEEE Communications Letters,2008,12(4):235-237.
[5] Lee Jong Ho.Full-duplex relay for enhancing physical layer security in multi-hop relaying systems[J].IEEE Communications Letters,2015,19(4):525-528.
[6] Maletic N,Cabarkapa M,Neskovic N,Budimir D.Hardware impairments impact on fixed-gain AF relaying performance in Nakagami-m fading[J].Electronics Letters,2015,52(2):121-122.
[7] Wang Dong,Bai Bo,Chen Wei,Han Zhu.Energy efficient secure communication over decode-and-forward relay channels[J].IEEE Transactions on Communications,2015,63(3):892-905.
[8] Zhao Mingxiong,Wang Xiangfeng,Feng Suili.Joint power splitting and secure beamforming design in the multiple non-regenerative wireless-powered relay networks[J].IEEE Communications Letters,2015,19(9):1540-1543.
[9] Zhou Siyuan,Alfano Giuseppa,Nordio Alessandro,Chiasserini Carla Fabiana.Ergodic capacity analysis of mimo relay network over rayleigh-rician channels[J].Communications Letters IEEE,2015,19(4):601-604.
[10] Maleki Sadr M,Mahboobi B,Mehrizi S,Ahmadian-Attari M.Stochastic robust collaborative beamforming:non-regenerative relay[J].IEEE Transactions on Communications,2016,64(3):947-958.
[11] Wu Nien En,Li Hsueh Jyh.Effect of feedback delay on secure cooperative networks with joint relay and jammer selection[J].IEEE Wireless Communication Letters,2013,2(4):415-418.
[12] Suraweera,H A,Michalopoulos,D S,Karagiannidis,G K Semi-blind amplify-and-forward with partial relay selection[J].Electronics Letters,2009,45(6):317-319.
[13] Zhou Yameng,Pan Gaofeng,Li Tingting,Liu Hequn.Secrecy outage performance for partial relay selection schemes in cooperative systems[J].IET Communications,2015,9(16):1980-1987.
[14] He Biao,Zhou Xiangyun.Secure on-off transmission design with channel estimation errors[J].IEEE Transactions on Information Forensics & Security,2013,8(12):1923-1936.
[15] Dai Mingjun,Chi Sung.A distributed on-off amplify-and-forward protocol for the fading parallel relay channel[J].Communications Letters IEEE,2009,13(9):643-645.
[16] Long Min,Chen Yunfei,Renzo M Di.Performance analysis of relay selection in the presence of on-off relay traffic[J].IEEE Transactions on Vehicular Technology,2014,63(6):2959-2964.
[17] Cui Hongyu,Song Lingyang,Jiao Bingli.Weighted bidirectional relay selection for outdated channel state information[J].IEEE Transactions on Communications,2014,62(62):500-509.
[18] Deng Dan,Fan Lisheng,Zhao Rui,Hu Rose Qingyang.Secure communications in multiple amplify-and-forward relay networks with outdated channel state information[J].Transactions on Emerging Telecommunications Technologies,2016,33(4):457-464.
[19] Khan F A,Tourki K,Alouini M S,Qaraqe K A.Opportunistic fixed gain bidirectional relaying with outdated CSI[A].IEEE Vehicular Technology Conference[C].Boston,USA:IEEE Press,2015.1-5.
[20] Lei Xianfu,Fan Lisheng,Hu Rose Qingyang,Michalopoulos Diomidis S,Fan Pingzhi.Secure multiuser communications in multiple decode-and-forward relay networks with direct links[A].Global Communications Conference[C].Austin,USA.:IEEE ress,2014.3180-3185
[21] Fan Lisheng,Yang Nan,Duong Trung,Elkashlan Maged.Exploiting direct links for physical layer security in multi-user multi-relay networks[J].IEEE Transactions on Wireless Communications,2016,15(6):3856-3867.
[22] 杨斌,王文杰,殷勤业.基于混合信号的放大转发中继系统的物理层安全传输[J].电子学报,2016,44(2):268-274. YANG Bin,WANG Wen-jie,YIN Qin-ye.Secure wireless communication for af relay system with hybrid signals[J].Acta Electrica Sinica,2016,44(2):268-274.(in Chinese)
[23] Ferdinand Nuwan S,Costa Daniel Benevides da,Latva-aho Matti.Physical layer security in mimo ostbc line-of-sight wiretap channels with arbitrary transmit/receive antenna correlation[J].IEEE Wireless Communications Letters,2013,2(5):467-470.
[24] Sun L,Ren P,Du Q.,Wang Y.Security-aware relaying scheme for cooperative networks with untrusted relay nodes[J].IEEE Communications Letters,2015,19(3):463-466.
[25] Zhang S,Fan L,Peng M,Poor H.Near-optimal modulo-and-forward scheme for the untrusted relay channel[J].IEEE Transactions on Information Theory,2016,62(5):2545-2556.
[26] Ju Min Chul,Kim Do Hoon,Hwang Kyu Sung.Opportunistic transmission of nonregenerative network with untrusted relay[J].IEEE Transactions on Vehicular Technology,2015,64(6):2703-2709.
[27] 吴亚峰,赵睿,贺玉成,谢维波.基于有限反馈的非可信中继系统的物理层安全性能分析[J].电子学报,2015,43(11):2247-2254. WU Ya-feng1,ZHAO Rui1,HE Yu-cheng,XIE Wei-bo.Performance analysis of physical layer security of untrusted relay system based on limited feedback[J].Acta Electrica Sinica,2015,43(11):2247-2254.(in Chinese)
[28] Gradshteyn I S,Ryzhik I M.Table of Integrals,Series,and Products[M].San Diego,USA:Academic Press,Elsevier Inc,2007.372-374.