A Two-Hop Multi-Relay Secure Transmission with Improved Suboptimal Relay Selection Scheme

نویسندگان

  • Lukman A. Olawoyin
  • Munzali Ahmed Abana
  • Yue Wu
  • Hongwen Yang
چکیده

—This work studies the use of relay selection in reducing the capability of a hidden eavesdropper to intercept the confidential message transmitted between information source and legitimate receiver. Specifically, an improved version of the suboptimal selection with jamming scheme (SSJ) is proposed. To achieve a secure transmission system, we propose the choice of best relay node that will forward the confidential message only when the link quality of the selected relay terminal meets some predefined thresholds and the signal is transmitted with low power. The simulation results show that our proposed scheme can significantly improve the system performance in term of average secrecy throughput and intercept probability.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Energy-efficient Maximization Based Path Selection and Resource Allocation Scheme in Ofdma-based Two-hop Relay Cellular Networks

In this paper, we investigate the energy efficiency problem in downlink transmission of the OFDMA-based two-hop relay cellular networks. Most of the researches on energy efficiency focus on the transmission in traditional cellular system, especially for the uplink transmission. Our objective is to maximize the system energy efficiency for the downlink transmission of the two-hop relay cellular ...

متن کامل

Wireless Transmission of Big Data Using Novel Secure Algorithm

This paper presents a novel algorithm for secure, reliable and flexible transmission of big data in two hop wireless networks using cooperative jamming scheme. Two hop wireless networks consist of source, relay and destination nodes. Big data has to transmit from source to relay and from relay to destination by deploying security in physical layer. Cooperative jamming scheme determines transmis...

متن کامل

Performance Study of Untrusted Relay Network Utilizing Cooperative Jammer

Abstract—In this paper, the problem of secure transmission in two-hop amplify-and-forward (AF) systems with an untrusted relay is investigated. To prevent the untrusted relay from intercepting the source message and to achieve positive secrecy rate, the destination-based cooperative jamming (DBCJ) technique is used. In this method the destination sends an intended jamming signal to the relay. T...

متن کامل

Exploring Relay Cooperation Scheme for Load-Balance Control in Two-hop Secure Communication System

Abstract—This work considers load-balance control among the relays under the secure transmission protocol via relay cooperation in two-hop wireless networks without the information of both eavesdropper channels and locations. The available two-hop secure transmission protocols in physical layer secrecy framework cannot provide a flexible load-balance control, which may significantly limit their...

متن کامل

Performance Analysis of Wireless Cooperative Networks with Iterative Incremental Relay Selection

In this paper, an iterative incremental relay selection (IIRS) scheme is considered for wireless cooperative networks in order to increase the reliability of transmission. Different from the conventional incremental relay selection which incrementally selects a best relay for only one iteration; the IIRS scheme iteratively applies the incremental relaying and relay selection processes. To evalu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • JCM

دوره 11  شماره 

صفحات  -

تاریخ انتشار 2016