612 research outputs found

    Joint Relay Selection and Power Allocation in Large-Scale MIMO Systems with Untrusted Relays and Passive Eavesdroppers

    Full text link
    In this paper, a joint relay selection and power allocation (JRP) scheme is proposed to enhance the physical layer security of a cooperative network, where a multiple antennas source communicates with a single-antenna destination in presence of untrusted relays and passive eavesdroppers (Eves). The objective is to protect the data confidentially while concurrently relying on the untrusted relays as potential Eves to improve both the security and reliability of the network. To realize this objective, we consider cooperative jamming performed by the destination while JRP scheme is implemented. With the aim of maximizing the instantaneous secrecy rate, we derive a new closed-form solution for the optimal power allocation and propose a simple relay selection criterion under two scenarios of non-colluding Eves (NCE) and colluding Eves (CE). For the proposed scheme, a new closed-form expression is derived for the ergodic secrecy rate (ESR) and the secrecy outage probability as security metrics, and a new closed-form expression is presented for the average symbol error rate (SER) as a reliability measure over Rayleigh fading channels. We further explicitly characterize the high signal-to-noise ratio slope and power offset of the ESR to highlight the impacts of system parameters on the ESR. In addition, we examine the diversity order of the proposed scheme to reveal the achievable secrecy performance advantage. Finally, the secrecy and reliability diversity-multiplexing tradeoff of the optimized network are provided. Numerical results highlight that the ESR performance of the proposed JRP scheme for NCE and CE cases is increased with respect to the number of untrustworthy relays.Comment: 18 pages, 10 figures, IEEE Transactions on Information Forensics and Security (In press

    Relay Selection for Wireless Communications Against Eavesdropping: A Security-Reliability Tradeoff Perspective

    Full text link
    This article examines the secrecy coding aided wireless communications from a source to a destination in the presence of an eavesdropper from a security-reliability tradeoff (SRT) perspective. Explicitly, the security is quantified in terms of the intercept probability experienced at the eavesdropper, while the outage probability encountered at the destination is used to measure the transmission reliability. We characterize the SRT of conventional direct transmission from the source to the destination and show that if the outage probability is increased, the intercept probability decreases, and vice versa. We first demonstrate that the employment of relay nodes for assisting the source-destination transmissions is capable of defending against eavesdropping, followed by quantifying the benefits of single-relay selection (SRS) as well as of multi-relay selection (MRS) schemes. More specifically, in the SRS scheme, only the single "best" relay is selected for forwarding the source signal to the destination, whereas the MRS scheme allows multiple relays to participate in this process. It is illustrated that both the SRS and MRS schemes achieve a better SRT than the conventional direct transmission, especially upon increasing the number of relays. Numerical results also show that as expected, the MRS outperforms the SRS in terms of its SRT. Additionally, we present some open challenges and future directions for the wireless relay aided physical-layer security.Comment: 16 pages, IEEE Network, 201

    Security-reliability tradeoff analysis of artificial noise aided two-way opportunistic relay selection

    No full text
    In this paper, we investigate the physical-layer security of cooperative communications relying on multiple twoway relays using the decode-and-forward (DF) protocol in the presence of an eavesdropper, where the eavesdropper appears to tap the transmissions of both the source and of the relay. The design-tradeoff to be resolved is that the throughput is improved by invoking two-way relaying, but the secrecy of wireless transmissions may be degraded, since the eavesdropper may overhear the signals transmitted by both the source and relay nodes. We conceive an artificial noise aided two-way opportunistic relay selection (ANaTWORS) scheme for enhancing the security of the pair of source nodes communicating with the assistance of multiple two-way relays. Furthermore, we analyze both the outage probability and intercept probability of the proposed ANaTWORS scheme, where the security and reliability are characterized in terms of the intercept probability and the security outage probability. For comparison, we also provide the security-reliability tradeoff (SRT) analysis of both the traditional direct transmission and of the one-way relaying schemes. It is shown that the proposed ANaTWORS scheme outperforms both the conventional direct transmission and the one-way relay methods in terms of its SRTs. More specifically, in the low main-userto- eavesdropper ratio (MUER) region, the proposed ANaTWORS scheme is capable of guaranteeing secure transmissions, whereas no SRT gain is achieved by the conventional one-way relaying. In fact, the one-way relaying scheme may even be inferior to the traditional direct transmission scheme in terms of its SRT

    Two-path succesive relaying schemes in the presence of inter-relay interference

    Get PDF
    Relaying is a promising technique to improve wireless network performance. A conventional relay transmits and receives signals in two orthogonal channels due to half duplex constraint of wireless network. This results in inefficient use of spectral resources. Two-Path Successive Relaying (TPSR) has been proposed to recover loss in spectral efficiency. However, the performance of TPSR is degraded by Inter-Relay Interference (IRI). This thesis investigates the performance of TPSR affected by IRI and proposes several schemes to improve relaying reliability, throughput and secrecy. Simulations revealed that the existing TPSR could perform worse than the conventional Half Duplex Relaying (HDR) scheme. Opportunistic TPSR schemes are proposed to improve the capacity performance. Several relay pair selection criteria are developed to ensure the selection of the best performing relay pair. Adaptive schemes which dynamically switch between TPSR and conventional HDR are proposed to further improve the performance. Simulation and analytical results show that the proposed schemes can achieve up to 45% ergodic capacity improvement and lower outage probability compared to baseline schemes, while achieving the maximum diversity and multiplexing tradeoff of the multi-input single-output channel. In addition, this thesis proposes secrecy TPSR schemes to protect secrecy of wireless transmission from eavesdropper. The use of two relays in the proposed schemes deliver more robust secrecy transmission while the use of scheduled jamming signals improves secrecy rate. Simulation and analytical results reveal that the proposed schemes can achieve up to 62% ergodic secrecy capacity improvement and quadratically lower intercept and secrecy outage probabilities if compared to existing schemes. Overall, this thesis demonstrates that the proposed TPSR schemes are able to deliver performance improvement in terms of throughput, reliability and secrecy in the presence of IRI

    Security versus Reliability Analysis of Opportunistic Relaying

    Full text link
    Physical-layer security is emerging as a promising paradigm of securing wireless communications against eavesdropping between legitimate users, when the main link spanning from source to destination has better propagation conditions than the wiretap link from source to eavesdropper. In this paper, we identify and analyze the tradeoffs between the security and reliability of wireless communications in the presence of eavesdropping attacks. Typically, the reliability of the main link can be improved by increasing the source's transmit power (or decreasing its date rate) to reduce the outage probability, which unfortunately increases the risk that an eavesdropper succeeds in intercepting the source message through the wiretap link, since the outage probability of the wiretap link also decreases when a higher transmit power (or lower date rate) is used. We characterize the security-reliability tradeoffs (SRT) of conventional direct transmission from source to destination in the presence of an eavesdropper, where the security and reliability are quantified in terms of the intercept probability by an eavesdropper and the outage probability experienced at the destination, respectively. In order to improve the SRT, we then propose opportunistic relay selection (ORS) and quantify the attainable SRT improvement upon increasing the number of relays. It is shown that given the maximum tolerable intercept probability, the outage probability of our ORS scheme approaches zero for NN \to \infty, where NN is the number of relays. Conversely, given the maximum tolerable outage probability, the intercept probability of our ORS scheme tends to zero for NN \to \infty.Comment: 9 pages. IEEE Transactions on Vehicular Technology, 201

    Multi-Antenna Cooperative Wireless Systems: A Diversity-Multiplexing Tradeoff Perspective

    Full text link
    We consider a general multiple antenna network with multiple sources, multiple destinations and multiple relays in terms of the diversity-multiplexing tradeoff (DMT). We examine several subcases of this most general problem taking into account the processing capability of the relays (half-duplex or full-duplex), and the network geometry (clustered or non-clustered). We first study the multiple antenna relay channel with a full-duplex relay to understand the effect of increased degrees of freedom in the direct link. We find DMT upper bounds and investigate the achievable performance of decode-and-forward (DF), and compress-and-forward (CF) protocols. Our results suggest that while DF is DMT optimal when all terminals have one antenna each, it may not maintain its good performance when the degrees of freedom in the direct link is increased, whereas CF continues to perform optimally. We also study the multiple antenna relay channel with a half-duplex relay. We show that the half-duplex DMT behavior can significantly be different from the full-duplex case. We find that CF is DMT optimal for half-duplex relaying as well, and is the first protocol known to achieve the half-duplex relay DMT. We next study the multiple-access relay channel (MARC) DMT. Finally, we investigate a system with a single source-destination pair and multiple relays, each node with a single antenna, and show that even under the idealistic assumption of full-duplex relays and a clustered network, this virtual multi-input multi-output (MIMO) system can never fully mimic a real MIMO DMT. For cooperative systems with multiple sources and multiple destinations the same limitation remains to be in effect.Comment: version 1: 58 pages, 15 figures, Submitted to IEEE Transactions on Information Theory, version 2: Final version, to appear IEEE IT, title changed, extra figures adde

    Performance enhancement solutions in wireless communication networks

    Get PDF
    In this dissertation thesis, we study the new relaying protocols for different wireless network systems. We analyze and evaluate an efficiency of the transmission in terms of the outage probability over Rayleigh fading channels by mathematical analyses. The theoretical analyses are verified by performing Monte Carlo simulations. First, we study the cooperative relaying in the Two-Way Decode-and-Forward (DF) and multi-relay DF scheme for a secondary system to obtain spectrum access along with a primary system. In particular, we proposed the Two-Way DF scheme with Energy Harvesting, and the Two-Way DF Non-orthogonal Multiple Access (NOMA) scheme with digital network coding. Besides, we also investigate the wireless systems with multi-relay; the best relay selection is presented to optimize the effect of the proposed scheme. The transmission protocols of the proposed schemes EHAF (Energy Harvesting Amplify and Forward) and EHDF (Energy Harvesting Decode and Forward) are compared together in the same environment and in term of outage probability. Hence, with the obtained results, we conclude that the proposed schemes improve the performance of the wireless cooperative relaying systems, particularly their throughput. Second, we focus on investigating the NOMA technology and proposing the optimal solutions (protocols) to advance the data rate and to ensure the Quality of Service (QoS) for the users in the next generation of wireless communications. In this thesis, we propose a Two-Way DF NOMA scheme (called a TWNOMA protocol) in which an intermediate relay helps two source nodes to communicate with each other. Simulation and analysis results show that the proposed protocol TWNOMA is improving the data rate when comparing with a conventional Two-Way scheme using digital network coding (DNC) (called a TWDNC protocol), Two-Way scheme without using DNC (called a TWNDNC protocol) and Two-Way scheme in amplify-and-forward(AF) relay systems (called a TWANC protocol). Finally, we considered the combination of the NOMA and physical layer security (PLS) in the Underlay Cooperative Cognitive Network (UCCN). The best relay selection strategy is investigated, which uses the NOMA and considers the PLS to enhance the transmission efficiency and secrecy of the new generation wireless networks.V této dizertační práci je provedena studie nových přenosových protokolů pro různé bezdrátové síťové systémy. S využitím matematické analýzy jsme analyzovali a vyhodnotili efektivitu přenosu z hlediska pravděpodobnosti výpadku přes Rayleighův kanál. Teoretické analýzy jsou ověřeny provedenými simulacemi metodou Monte Carlo. Nejprve došlo ke studii kooperativního přenosu ve dvoucestném dekóduj-a-předej (Two-Way Decode-and-Forward–TWDF) a vícecestném DF schématu s větším počtem přenosových uzlů pro sekundární systém, kdy takto byl získán přístup ke spektru spolu s primárním systémem. Konkrétně jsme navrhli dvoucestné DF schéma se získáváním energie a dvoucestné DF neortogonální schéma s mnohonásobným přístupem (Non-orthogonal Multiple Access–NOMA) s digitálním síťovým kódováním. Kromě toho rovněž zkoumáme bezdrátové systémy s větším počtem přenosových uzlů, kde je přítomen výběr nejlepšího přenosového uzlu pro optimalizaci efektivnosti navrženého schématu. Přenosové protokoly navržených schémat EHAF (Energy Harvesting Amplify and Forward) a EHDF(Energy Harvesting Decode and Forward) jsou společně porovnány v identickém prostředí z pohledu pravděpodobnosti výpadku. Následně, na základě získaných výsledků, jsme dospěli k závěru, že navržená schémata vylepšují výkonnost bezdrátových kooperativních systémů, konkrétně jejich propustnost. Dále jsme se zaměřili na zkoumání NOMA technologie a navrhli optimální řešení (protokoly) pro urychlení datového přenosu a zajištění QoS v další generaci bezdrátových komunikací. V této práci jsme navrhli dvoucestné DF NOMA schéma (nazýváno jako TWNOMA protokol), ve kterém mezilehlý přenosový uzel napomáhá dvěma zdrojovým uzlům komunikovat mezi sebou. Výsledky simulace a analýzy ukazují, že navržený protokol TWNOMA vylepšuje dosaženou přenosovou rychlost v porovnání s konvenčním dvoucestným schématem používajícím DNC (TWDNC protokol), dvoucestným schématem bez použití DNC (TWNDNC protokol) a dvoucestným schématem v zesil-a-předej (amplify-and-forward) přenosových systémech (TWANC protokol). Nakonec jsme zvážili využití kombinace NOMA a zabezpečení fyzické vrstvy (Physical Layer Security–PLS) v podpůrné kooperativní kognitivní síti (Underlay Cooperative Cognitive Network–UCCN). Zde je zde zkoumán výběr nejlepšího přenosového uzlu, který užívá NOMA a bere v úvahu PLS pro efektivnější přenos a zabezpečení nové generace bezdrátových sítí.440 - Katedra telekomunikační technikyvyhově
    corecore