Physical Layer Security Using Two-Path Successive Relaying

نویسندگان

  • Qian Yu Liau
  • Chee Yen Leow
  • Zhiguo Ding
چکیده

Relaying is one of the useful techniques to enhance wireless physical-layer security. Existing literature shows that employing full-duplex relay instead of conventional half-duplex relay improves secrecy capacity and secrecy outage probability, but this is at the price of sophisticated implementation. As an alternative, two-path successive relaying has been proposed to emulate operation of full-duplex relay by scheduling a pair of half-duplex relays to assist the source transmission alternately. However, the performance of two-path successive relaying in secrecy communication remains unexplored. This paper proposes a secrecy two-path successive relaying protocol for a scenario with one source, one destination and two half-duplex relays. The relays operate alternately in a time division mode to forward messages continuously from source to destination in the presence of an eavesdropper. Analytical results reveal that the use of two half-duplex relays in the proposed scheme contributes towards a quadratically lower probability of interception compared to full-duplex relaying. Numerical simulations show that the proposed protocol achieves the ergodic achievable secrecy rate of full-duplex relaying while delivering the lowest probability of interception and secrecy outage probability compared to the existing half duplex relaying, full duplex relaying and full duplex jamming schemes.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Performance of Two-path Successive Relaying in the Presence of Inter-relay Interference

Half-duplex constraint refers to the inability of a radio to transmit and receive signals simultaneously due to the hardware limitation. In cooperative communication, half duplex constraint requires orthogonal time or frequency channel use between source transmission phase and relay transmission phase. This limits the spectral efficiency of conventional relaying to half of the performance of di...

متن کامل

Secure Switch-and-Stay Combining with Multiple Antennas in Cognitive Radio Relay Networks

Eavesdropping is a major concern in Cognitive Radio relay systems, due to the broadcast nature of these systems. Physical Layer Security (PLS) has been seen as a good alternative to enhance the secrecy performance of these networks. Based on the concept of perfect secrecy, PLS uses an information-theoretic approach to prevent secondary transmissions from malicious attacks. In this paper, the Se...

متن کامل

Secrecy Enhancement in Cooperative Relaying Systems

Cooperative communications is obviously an evolution in wireless networks due to its noticeable advantages such as increasing the coverage as well as combating fading and shadowing effects. However, the broadcast characteristic of a wireless medium which is exploited in cooperative communications leads to a variety of security vulnerabilities. As cooperative communication networks are globally ...

متن کامل

DC programming and DCA for enhancing physical layer security via cooperative jamming

The explosive development of computational tools these days is threatening security of cryptographic algorithms those are regarded as primary traditional methods for ensuring information security. Physical layer security approach is introduced as a method for both improving confidentiality of the secret key distribution in cryptography and enabling the data transmission without relaying on high...

متن کامل

Polarization Sensitive Array Based Physical-Layer Security

In this paper we propose a comprehensive framework exploiting the polarization sensitive array (PLA) to improve the physical layer security of wireless communications. More specifically, the polarization difference among signals are utilized to improve the secrecy rate of wireless communications, especially when these signals are spatially indistinguishable. We firstly investigate the PLA based...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره 16  شماره 

صفحات  -

تاریخ انتشار 2016