Performance Study of Untrusted Relay Network Utilizing Cooperative Jammer

Authors

  • Abbas Mohammadi Professor, Electrical Engineering Department, Amirkabir University of Technology
  • Ali kuhestani Ph.D. Student, Electrical Engineering Department, Amirkabir University of Technology
  • Mohammad Javad Emadi Assistant Professor, Electrical Engineering Department, Amirkabir University of Technology
Abstract:

Abstract—In this paper, the problem of secure transmission in two-hop amplify-and-forward (AF) systems with an untrusted relay is investigated. To prevent the untrusted relay from intercepting the source message and to achieve positive secrecy rate, the destination-based cooperative jamming (DBCJ) technique is used. In this method the destination sends an intended jamming signal to the relay. This jamming signal helps protecting the source message from being captured reliably at the untrusted relay, while the destination cancels itself intended jamming signal. The optimal power allocation (OPA) technique is considered for the presented system. It is observed that the objective function is a quasiconcave function at high signal-to-noise-ratio (SNR) regimes. Based on this OPA technique, we study the ergodic secrecy rate (ESR) and the secrecy outage probability (SOP) of the system when the source and relay are equipped with a single antenna while the destination is equipped with largescale antenna arrays (LSA). Using the achieved closed-form expressions, one can evaluate the performance of the secure system easily and fast and also, they provide significant insight for system design. Finally, simulation results indicate the accuracy of the derived expressions.

Upgrade to premium to download articles

Sign up to access the full text

Already have an account?login

similar resources

performance study of untrusted relay network utilizing cooperative jammer

abstract—in this paper, the problem of secure transmission in two-hop amplify-and-forward (af) systems with an untrusted relay is investigated. to prevent the untrusted relay from intercepting the source message and to achieve positive secrecy rate, the destination-based cooperative jamming (dbcj) technique is used. in this method the destination sends an intended jamming signal to the relay. t...

full text

Secure Two-Way Transmission via Wireless-Powered Untrusted Relay and External Jammer

In this paper, we propose a two-way secure communication scheme where two transceivers exchange confidential messages via a wireless powered untrusted amplify-and-forward (AF) relay in the presence of an external jammer. We take into account both friendly jamming (FJ) and Gaussian noise jamming (GNJ) scenarios. Based on the time switching (TS) architecture at the relay, the data transmission is...

full text

Joint Power Allocation at the Base Station and the Relay for Untrusted Relay Cooperation OFDMA Network

The secure communication that multiple OFDMA-based cell-edge mobile stations (MS) can only transmit confidential messages to base station (BS) through an untrusted intermediate relay (UR) is discussed. Specifically, with the destination-based jamming (DBJ) scheme and fixed MS transmission power assumption, our focus is on the joint BS and US power allocation to maximize system sum secrecy rate....

full text

Relay and jammer cooperation as a coalitional game in secure cooperative wireless networks

In this paper, we investigate cooperation of conventional relays and friendly jammers subject to secrecy constraints for cooperative networks. In order to obtain an optimized secrecy rate, the source selects several conventional relays and friendly jammers from the intermediate nodes to assist data transmission, and in return, it needs to make a payment. Each intermediate node here has two poss...

full text

Relay and jammer selection schemes for improving physical layer security in two-way cooperative networks

This paper is concerned with the relay and jammers selection in two-way cooperative networks to improve their physical layer security. Three different categories of selection schemes are proposed which are; selection schemes without jamming, selection schemes with conventional jamming and selection schemes with controlled jamming. The selection process is analyzed for two different network mode...

full text

My Resources

Save resource for easier access later

Save to my library Already added to my library

{@ msg_add @}


Journal title

volume 48  issue 2

pages  93- 100

publication date 2016-11-21

By following a journal you will be notified via email when a new issue of this journal is published.

Hosted on Doprax cloud platform doprax.com

copyright © 2015-2023