Relay and jammer selection schemes for improving physical layer security in two-way cooperative networks

نویسندگان

  • Doaa H. Ibrahim
  • Emad S. Hassan
  • Sami A. El-Dolil
چکیده

This paper is concerned with the relay and jammers selection in two-way cooperative networks to improve their physical layer security. Three different categories of selection schemes are proposed which are; selection schemes without jamming, selection schemes with conventional jamming and selection schemes with controlled jamming. The selection process is analyzed for two different network models; single eavesdropper model and multiple cooperating and non-cooperating eavesdroppers’ model. The proposed schemes select three intermediate nodes during two communication phases and use the Decodeand-Forward (DF) strategy to assist the sources to deliver their data to the corresponding destinations. The performance of the proposed schemes is analyzed in terms of ergodic secrecy rate and secrecy outage probability metrics. The obtained results show that the selection schemes with jamming outperform the schemes without jamming when the intermediate nodes are distributed dispersedly between sources and eavesdropper nodes. However, when the intermediate nodes cluster gets close to one of the sources, they are not superior any more due to the strong interference on the destination nodes. Therefore, a hybrid scheme which switches between selection schemes with jamming and schemes without jamming is introduced to overcome the negative effects of interference. Finally, a comparison between relay and jammers selection schemes in both one-way and two-way cooperative networks is given in terms of both secrecy metrics. The obtained results reveal that, despite the presence of cooperating eavesdroppers, the proposed selection schemes are still able to improve both the secrecy rate and the secrecy outage probability of the twoway cooperative networks. © 2015 Elsevier Ltd. All rights reserved.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Performance Study of Untrusted Relay Network Utilizing Cooperative Jammer

Abstract—In this paper, the problem of secure transmission in two-hop amplify-and-forward (AF) systems with an untrusted relay is investigated. To prevent the untrusted relay from intercepting the source message and to achieve positive secrecy rate, the destination-based cooperative jamming (DBCJ) technique is used. In this method the destination sends an intended jamming signal to the relay. T...

متن کامل

Performance Analysis of Wireless Cooperative Networks with Iterative Incremental Relay Selection

In this paper, an iterative incremental relay selection (IIRS) scheme is considered for wireless cooperative networks in order to increase the reliability of transmission. Different from the conventional incremental relay selection which incrementally selects a best relay for only one iteration; the IIRS scheme iteratively applies the incremental relaying and relay selection processes. To evalu...

متن کامل

Study of Relay Selection for Physical-Layer Security in Buffer-Aided Relay Networks Based on the Secrecy Rate Criterion

In this paper, we investigate an opportunistic relay and jammer scheme along with relay selection algorithms based on the secrecy rate criterion in multiple-input multiple-output buffer-aided down link relay networks, which consist of one source, a number of relay nodes, legitimate users and eavesdroppers, with the constraints of physical layer security. The opportunistic relay and jammer schem...

متن کامل

Sum-Rate Maximization Based on Power Constraints for Cooperative AF Relay Networks

In this paper, our objective is maximizing total sum-rate subject to power constraints on total relay transmit power or individual relay powers, for amplify-and-forward single-antenna relay-based wireless communication networks. We derive a closed-form solution for the total power constraint optimization problem and show that the individual relay power constraints optimization problem is a quad...

متن کامل

A Comparison between Different Meta-Heuristic Techniques in Power Allocation for Physical Layer Security

Node cooperation can protect wireless networks from eavesdropping by using the physical characteristics of wireless channels rather than cryptographic methods. Allocating the proper amount of power to cooperative nodes is a challenging task. In this paper, we use three cooperative nodes, one as relay to increase throughput at the destination and two friendly jammers to degrade eavesdropper&rsqu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Computers & Security

دوره 50  شماره 

صفحات  -

تاریخ انتشار 2015