Secure Data Transmission in Cooperative Modes: Relay and MAC
نویسندگان
چکیده
Cooperation in clouds provides a promising technique for 5G wireless networks, supporting higher data rates. Security of data transmission over wireless clouds could put constraints on devices; whether to cooperate or not. Therefore, our aim is to provide analytical framework for the security on the physical layer of such setup and to define the constraints embodied with cooperation in small size wireless clouds. In this paper, two legitimate transmitters Alice and John cooperate to increase the reliable transmission rate received by their common legitimate receiver Bob, where one eavesdropper, Eve exists. We provide the achievable secure data transmission rates with cooperative relaying and when no cooperation exists creating a Multiple Access Channel (MAC). The paper considers the analysis of different cooperative scenarios: a cooperative scenario with two relaying devices, a cooperative scenario without relaying, a non-cooperative scenario, and cooperation from one side. We derive analytical expressions for the optimal power allocation that maximizes the achievable secrecy rates for the different set of scenarios where the implication of cooperation on the achievable secrecy rates was analyzed. We propose a distributed algorithm that allows the devices to select whether to cooperate or not and to choose their optimal power allocation based on the cooperation framework selected. Moreover, we defined distance constraints to enforce the benefits of cooperation between devices in a wireless cloud.
منابع مشابه
Performance Study of Untrusted Relay Network Utilizing Cooperative Jammer
Abstract—In this paper, the problem of secure transmission in two-hop amplify-and-forward (AF) systems with an untrusted relay is investigated. To prevent the untrusted relay from intercepting the source message and to achieve positive secrecy rate, the destination-based cooperative jamming (DBCJ) technique is used. In this method the destination sends an intended jamming signal to the relay. T...
متن کاملAn Efficient Cooperative Mac Protocol for Wireless Lan
In cooperative communication in wireless networks, selection of best relay node is an important task. And provide secure transmission is also a challenging work. Our proposed protocol provides a new approach for relay selection and secure transmission in cooperative network for wireless network. Secure and efficient relays are selected on the basis of RPI table that maintain RPI points which is...
متن کاملWireless Transmission of Big Data Using Novel Secure Algorithm
This paper presents a novel algorithm for secure, reliable and flexible transmission of big data in two hop wireless networks using cooperative jamming scheme. Two hop wireless networks consist of source, relay and destination nodes. Big data has to transmit from source to relay and from relay to destination by deploying security in physical layer. Cooperative jamming scheme determines transmis...
متن کاملExtension of the Coverage Region of Multiple Access Channels by Using a Relay
From practical and theoretical viewpoints, performance analysis of communication systems by using information-theoretic results is important. In this paper, based on our previous work on Multiple Access Channel (MAC) and Multiple Access Relay Channel (MARC), we analyze the impact of a relay on the fundamental wireless communications concept, i.e., coverage region of MARC, as a basic model for u...
متن کاملPower Allocation In Cooperative Relay Channels
This paper concerns power allocation in relay-assisted wireless channels for two-hop transmission. First, the transmitter sends the information to both the relay and receiver parts. Next, in the second hop, the transmitter cooperates with the relay to increase the received signal to noise ratio (SNR), assuming the relay makes use of the Amplify and Forward (AF) strategy. Moreover, it is assumed...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1405.3507 شماره
صفحات -
تاریخ انتشار 2014