Secret-Key-Aided Scheme for Securing Untrusted DF Relaying Networks

نویسندگان

  • Ahmed El Shafie
  • Ahmed Sultan
  • Asma Mabrouk
  • Kamel Tourki
  • Naofal Al-Dhahir
چکیده

This paper proposes a new scheme to secure the transmissions in an untrusted decode-and-forward (DF) relaying network. A legitimate source node, Alice, sends her data to a legitimate destination node, Bob, with the aid of an untrusted DF relay node, Charlie. To secure the transmissions from Charlie during relaying time slots, each data codeword is secured using a secret-key codeword that has been previously shared between Alice and Bob during the perfectly secured time slots (i.e., when the channel secrecy rate is positive). The secret-key bits exchanged between Alice and Bob are stored in a finite-length buffer and are used to secure data transmission whenever needed. We model the secret-key buffer as a queueing system and analyze its Markov chain. Our numerical results show the gains of our proposed scheme relative to benchmarks. Moreover, the proposed scheme achieves an upper bound on the secure throughput.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Amplify-forward and decode-forward cooperation relying on systematic Luby transform coded hybrid automatic-repeat-request

Systematic Luby transform (SLT) codes constitute rateless codes, which are capable of adaptively adjusting their code rate depending on the channel quality without any explicit channel state information (CSI) at the transmitters. SLTs are also suitable for space time collaboration-aided relay networks. In this study, an iterative decoding-aided SLT scheme is combined with 16 quadrature amplitud...

متن کامل

Availability of direct path in half-duplex-based cooperative relay networks

In this paper, we validate the availability of direct path in half-duplex-based cooperative relay networks from a practical point of view. Cooperative relaying is a low-complexity technique, which schedules orthogonal transmissions through the divided time slots. By doing so, transmission impairments due to multi-path fading and path loss are mitigated by obtaining a diversity gain. In conventi...

متن کامل

Adaptive Relaying

Link adaptive relaying (LAR) is one of the most popular techniques which employs soft power scaling approaches at the relay nodes. On the other. Buffer-aided relaying is a new paradigm for wireless cooperative networks. Buffer-Aided Relaying With Adaptive Link Selection – Fixed and Mixed Rate. A wireless relay is a codecadaptive RF receiver with single channel relay. It helps easily deployment ...

متن کامل

Optimal SVD-based Precoding for Secret Key Extraction from Correlated OFDM Sub-Channels

Secret key extraction is a crucial issue in physical layer security and a less complex and, at the same time, a more robust scheme for the next generation of 5G and beyond. Unlike previous works on this topic, in which Orthogonal Frequency Division Multiplexing (OFDM) sub-channels were considered to be independent, the effect of correlation between sub-channels on the secret key rate is address...

متن کامل

Pair-wise path key establishment in wireless sensor networks

When sensor networks deployed in unattended and hostile environments, for securing communication between sensors, secret keys must be established between them. Many key establishment schemes have been proposed for large scale sensor networks. In these schemes, each sensor shares a secret key with its neighbors via preinstalled keys. But it may occur that two end nodes which do not share a key w...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1706.03444  شماره 

صفحات  -

تاریخ انتشار 2017