Opportunistic Secure Relay Selection for a Full-Duplex Cooperative System under Eavesdropping Attack
نویسندگان
چکیده
This paper tackles the issue of single relay selection for secure communication in a fullduplex regenerative cooperative system under attack of an eavesdropper. We propose a novel single relay selection scheme, which does not requires the instantaneous channel state information of wiretap channels, to enhance the system security level. Through simulations, we show that the proposed scheme gives a better system secrecy performance than that of the existing Max-Min counterpart.
منابع مشابه
Physical Layer Security Schemes for Full-Duplex Cooperative Systems: State of the Art and Beyond
Due to the broadcast nature of wireless medium, wireless communication is highly vulnerable to eavesdropping attack. Traditionally, secure wireless data transmission has relied on cryptographic techniques at the network layer which incur high computational power and complexity. As an alternative, physical layer security (PLS) is emerging as a promising paradigm to protect wireless systems by ex...
متن کاملOpportunistic half-duplex/full-duplex relaying mode selection criterion in cognitive relay networks
In this paper, adaptive transmission in a cognitive relay network where a secondary transmitter acts as cooperative relay for a primary transmitter while in return gets the opportunity to send its own data is considered. An opportunistic half-duplex (HD)/full-duplex (FD) relaying mode selection criterion which can utilize the advantages of both HD and FD is proposed. The key idea is that the co...
متن کاملSecuring Untrusted Full-Duplex Relay Channels in the Presence of Multiple External Cluster-Based Eavesdroppers
This letter investigates the physical layer security in a wireless cooperative network where communication is assisted by a full-duplex (FD) untrusted relay in the presence of multiple external eavesdroppers. A cluster-based colluding eavesdropping setting is considered, where illegitimate nodes with common interests are grouped in a cluster. In order to confuse the different eavesdropping clus...
متن کاملPerformance Study of Untrusted Relay Network Utilizing Cooperative Jammer
Abstract—In this paper, the problem of secure transmission in two-hop amplify-and-forward (AF) systems with an untrusted relay is investigated. To prevent the untrusted relay from intercepting the source message and to achieve positive secrecy rate, the destination-based cooperative jamming (DBCJ) technique is used. In this method the destination sends an intended jamming signal to the relay. T...
متن کاملPerformance Analysis of Wireless Cooperative Networks with Iterative Incremental Relay Selection
In this paper, an iterative incremental relay selection (IIRS) scheme is considered for wireless cooperative networks in order to increase the reliability of transmission. Different from the conventional incremental relay selection which incrementally selects a best relay for only one iteration; the IIRS scheme iteratively applies the incremental relaying and relay selection processes. To evalu...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2016