performance study of untrusted relay network utilizing cooperative jammer
Authors
abstract
abstract—in this paper, the problem of secure transmission in two-hop amplify-and-forward (af) systems with an untrusted relay is investigated. to prevent the untrusted relay from intercepting the source message and to achieve positive secrecy rate, the destination-based cooperative jamming (dbcj) technique is used. in this method the destination sends an intended jamming signal to the relay. this jamming signal helps protecting the source message from being captured reliably at the untrusted relay, while the destination cancels itself intended jamming signal. the optimal power allocation (opa) technique is considered for the presented system. it is observed that the objective function is a quasiconcave function at high signal-to-noise-ratio (snr) regimes. based on this opa technique, we study the ergodic secrecy rate (esr) and the secrecy outage probability (sop) of the system when the source and relay are equipped with a single antenna while the destination is equipped with largescale antenna arrays (lsa). using the achieved closed-form expressions, one can evaluate the performance of the secure system easily and fast and also, they provide significant insight for system design. finally, simulation results indicate the accuracy of the derived expressions.
similar resources
Performance Study of Untrusted Relay Network Utilizing Cooperative Jammer
Abstract—In this paper, the problem of secure transmission in two-hop amplify-and-forward (AF) systems with an untrusted relay is investigated. To prevent the untrusted relay from intercepting the source message and to achieve positive secrecy rate, the destination-based cooperative jamming (DBCJ) technique is used. In this method the destination sends an intended jamming signal to the relay. T...
full textPerformance Study of Untrusted Relay Network Utilizing Cooperative Jammer
93 AIJ Electrical & Electronics Engineering, Vol 48, No. 2, Fall 2016 Please cite this article using: Kuhestani, A., Mohammadi, A., and Emadi, M. J., 2016. “Performance Study of Untrusted Relay Network Utilizing Cooperative Jammer”. Amirkabir International Journal of Electrical and Electronics Engineering, 48(2), pp. 93–99. DOI: 10.22060/eej.2016.820 URL: http://eej.aut.ac.ir/article_820.html *...
full textSecure Two-Way Transmission via Wireless-Powered Untrusted Relay and External Jammer
In this paper, we propose a two-way secure communication scheme where two transceivers exchange confidential messages via a wireless powered untrusted amplify-and-forward (AF) relay in the presence of an external jammer. We take into account both friendly jamming (FJ) and Gaussian noise jamming (GNJ) scenarios. Based on the time switching (TS) architecture at the relay, the data transmission is...
full textJoint Power Allocation at the Base Station and the Relay for Untrusted Relay Cooperation OFDMA Network
The secure communication that multiple OFDMA-based cell-edge mobile stations (MS) can only transmit confidential messages to base station (BS) through an untrusted intermediate relay (UR) is discussed. Specifically, with the destination-based jamming (DBJ) scheme and fixed MS transmission power assumption, our focus is on the joint BS and US power allocation to maximize system sum secrecy rate....
full textRelay and jammer cooperation as a coalitional game in secure cooperative wireless networks
In this paper, we investigate cooperation of conventional relays and friendly jammers subject to secrecy constraints for cooperative networks. In order to obtain an optimized secrecy rate, the source selects several conventional relays and friendly jammers from the intermediate nodes to assist data transmission, and in return, it needs to make a payment. Each intermediate node here has two poss...
full textRelay and jammer selection schemes for improving physical layer security in two-way cooperative networks
This paper is concerned with the relay and jammers selection in two-way cooperative networks to improve their physical layer security. Three different categories of selection schemes are proposed which are; selection schemes without jamming, selection schemes with conventional jamming and selection schemes with controlled jamming. The selection process is analyzed for two different network mode...
full textMy Resources
Save resource for easier access later
Journal title:
international journal of electrical and electronics engineeringجلد ۴۸، شماره ۲، صفحات ۹۳-۱۰۰
Hosted on Doprax cloud platform doprax.com
copyright © 2015-2023