1,700 research outputs found
Performance Analysis of Hybrid Decode-Amplify-Forward (HDAF) Relaying for Improving Security in Cooperative Wireless Network
In present communication scenario, security and privacy of data being transmitted is very difficult due to the openness of wireless medium. To secure and protect the confidentiality of data being transmitted, physical layer security offers attractive solutions using cooperative relaying schemes, in which relay assists the transmission of data between source and destination. In this work, we consider a cooperative wireless network in which relay either tries to improve the channel capacity of source to destination link using cooperative relaying protocols or reduce the channel capacity of source to eavesdropper link using jamming techniques. In order to improve the performance of the communication system, optimal relay and jammer are selected based on the three proposed relay and jamming selection schemes namely Conventional selection (Without jamming), Optimal selection with jamming (OSJ) and Optimal selection with control jamming (OSCJ).Optimal relay forwards the source information using cooperating relaying protocols such as decode and forward(DF), Amplify and Forward(AF) ,Hybrid decode amplify forward (HDAF) which combines the benefits of both DF and AF schemes. At the same time, jammer generates artificial noise using cooperative jamming scheme, to confuse the eavesdropper. The received signals at the receiver are combined using the various diversity techniques such as maximum ratio combining (MRC) and fixed ratio combining (FRC) techniques.Monte Carlo simulations are carried out and the obtained results are compared for different relay,jammer and eavesdropper locations. A study of comparison is made in terms of secrecy capacity and intercept probability for the proposed relaying schemes in the presence of single eavesdropper. Finally from the simulated comparison study, it is observed that HDAF scheme outperforms AF and DF schemes and we can also observe control jamming selection achieves more secrecy rate compared to without jamming and with optimal jamming
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
Modify-and-Forward for Securing Cooperative Relay Communications
We proposed a new physical layer technique that can enhance the security of
cooperative relay communications. The proposed approach modifies the decoded
message at the relay according to the unique channel state between the relay
and the destination such that the destination can utilize the modified message
to its advantage while the eavesdropper cannot. We present a practical method
for securely sharing the modification rule between the legitimate partners and
present the secrecy outage probability in a quasi-static fading channel. It is
demonstrated that the proposed scheme can provide a significant improvement
over other schemes when the relay can successfully decode the source message.Comment: IEEE International Zurich Seminar on Communications, Feb. 201
Joint Relay Selection and Power Allocation in Large-Scale MIMO Systems with Untrusted Relays and Passive Eavesdroppers
In this paper, a joint relay selection and power allocation (JRP) scheme is
proposed to enhance the physical layer security of a cooperative network, where
a multiple antennas source communicates with a single-antenna destination in
presence of untrusted relays and passive eavesdroppers (Eves). The objective is
to protect the data confidentially while concurrently relying on the untrusted
relays as potential Eves to improve both the security and reliability of the
network. To realize this objective, we consider cooperative jamming performed
by the destination while JRP scheme is implemented. With the aim of maximizing
the instantaneous secrecy rate, we derive a new closed-form solution for the
optimal power allocation and propose a simple relay selection criterion under
two scenarios of non-colluding Eves (NCE) and colluding Eves (CE). For the
proposed scheme, a new closed-form expression is derived for the ergodic
secrecy rate (ESR) and the secrecy outage probability as security metrics, and
a new closed-form expression is presented for the average symbol error rate
(SER) as a reliability measure over Rayleigh fading channels. We further
explicitly characterize the high signal-to-noise ratio slope and power offset
of the ESR to highlight the impacts of system parameters on the ESR. In
addition, we examine the diversity order of the proposed scheme to reveal the
achievable secrecy performance advantage. Finally, the secrecy and reliability
diversity-multiplexing tradeoff of the optimized network are provided.
Numerical results highlight that the ESR performance of the proposed JRP scheme
for NCE and CE cases is increased with respect to the number of untrustworthy
relays.Comment: 18 pages, 10 figures, IEEE Transactions on Information Forensics and
Security (In press
- …