Performance analysis of the link selection for secure device-to-device communications with an untrusted relay
نویسندگان
چکیده
In this paper, we study the performance of the selection combining and switch and stay combining methods in secure cooperative device-to-device (D2D) communications underlying a cellular network where an untrusted amplify and forward relay helps D2D communications. In our model, we specifically consider the interference from the cellular system over the D2D pair and the interference from the D2D pair over the cellular system. We assume that D2D communication is performed in such a way that the required outage probability of the cellular system is preserved. We obtain an exact closed-form expression for the lower bound of secrecy outage probability of the D2D pair, as well as an asymptotic expression for the outage probability for both the selection combining and switch and stay combining schemes. Using simulations, we study and compare the performance behavior of the selection combining and switch and stay combining schemes as the system parameters change.
منابع مشابه
Performance Study of Untrusted Relay Network Utilizing Cooperative Jammer
Abstract—In this paper, the problem of secure transmission in two-hop amplify-and-forward (AF) systems with an untrusted relay is investigated. To prevent the untrusted relay from intercepting the source message and to achieve positive secrecy rate, the destination-based cooperative jamming (DBCJ) technique is used. In this method the destination sends an intended jamming signal to the relay. T...
متن کاملPerformance Analysis of Device to Device Communications Overlaying/Underlaying Cellular Network
Minimizing the outage probability and maximizing throughput are two important aspects in device to device (D2D) communications, which are greatly related to each other. In this paper, first, the exact formulas of the outage probability for D2D communications underlaying or overlaying cellular network are derived which jointly experience Additive White Gaussian Noise (AWGN) and Rayleigh multipat...
متن کاملPerformance Analysis of Wireless Cooperative Networks with Iterative Incremental Relay Selection
In this paper, an iterative incremental relay selection (IIRS) scheme is considered for wireless cooperative networks in order to increase the reliability of transmission. Different from the conventional incremental relay selection which incrementally selects a best relay for only one iteration; the IIRS scheme iteratively applies the incremental relaying and relay selection processes. To evalu...
متن کاملAn Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks
Due to the explosion of smart devices, data traffic over cellular networks has seen an exponential rise in recent years. This increase in mobile data traffic has caused an immediate need for offloading traffic from operators. Device-to-Device(D2D) communication is a promising solution to boost the capacity of cellular networks and alleviate the heavy burden on backhaul links. However, dir...
متن کاملSecure Communications in CIoT Networks with a Wireless Energy Harvesting Untrusted Relay
The Internet of Things (IoT) represents a bright prospect that a variety of common appliances can connect to one another, as well as with the rest of the Internet, to vastly improve our lives. Unique communication and security challenges have been brought out by the limited hardware, low-complexity, and severe energy constraints of IoT devices. In addition, a severe spectrum scarcity problem ha...
متن کامل