Secrecy Outage Probability of Network-Coded Cooperative Communication
نویسندگان
چکیده
We evaluate the secrecy performance of a multiple access cooperative network where the destination node is wiretapped by a malicious and passive eavesdropper. We propose the application of the network coding technique as an alternative to increase the secrecy at the destination node, on the top of improving the error performance of the legitimate communication, already demonstrated in the literature. Network coding is leveraged by assuming that the legitime cooperative nodes are able to perform non-binary linear combinations of different frames before the transmission. Different scenarios with and without channel state information (CSI) at the transmitter side are evaluated. The effectiveness of the proposed schemes is evaluated in terms of secrecy outage probability through theoretic and numerical analyses. It is shown that, even when the legitimate transmitters do not have any CSI, the secrecy can be increased through the use of network coding when compared to the direct transmission and traditional cooperative techniques.
منابع مشابه
Performance Study of Untrusted Relay Network Utilizing Cooperative Jammer
Abstract—In this paper, the problem of secure transmission in two-hop amplify-and-forward (AF) systems with an untrusted relay is investigated. To prevent the untrusted relay from intercepting the source message and to achieve positive secrecy rate, the destination-based cooperative jamming (DBCJ) technique is used. In this method the destination sends an intended jamming signal to the relay. T...
متن کاملRelay and jammer selection schemes for improving physical layer security in two-way cooperative networks
This paper is concerned with the relay and jammers selection in two-way cooperative networks to improve their physical layer security. Three different categories of selection schemes are proposed which are; selection schemes without jamming, selection schemes with conventional jamming and selection schemes with controlled jamming. The selection process is analyzed for two different network mode...
متن کاملLink Selection for Secure Cooperative Networks with Buffer-Aided Relaying
This paper investigates the secure communication in a two-hop cooperative wireless network, where a bufferaided relay is utilized to forward data from the source to destination, and a passive eavesdropper attempts to intercept data transmission from both the source and relay. Depending on the availability of instantaneous channel state information of the source, two cases of transmission mechan...
متن کاملSecrecy performance of threshold-based decode-and-forward cooperative cognitive radio network
This paper evaluates the intercept and outage probability of a decode-and-forward (DF) underlay cognitive radio network. The secondary users are subject to interference limitations from the primary network, with an eavesdropper tapping the second hop of cognitive network, when all the links undergo Rayleigh fading. For this threshold-based system, without assuming that the DF relays can always ...
متن کاملFriendship-based Cooperative Jamming for Secure Communication in Poisson Networks
Wireless networks with the consideration of social relationships among network nodes are highly appealing for lots of important data communication services. Ensuring the security of such networks is of great importance to facilitate their applications in supporting future social-based services with strong security guarantee. This paper explores the physical layer security-based secure communica...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1406.7858 شماره
صفحات -
تاریخ انتشار 2014