Performance Study of Untrusted Relay Network Utilizing Cooperative Jammer

نویسندگان

  • Abbas Mohammadi Professor, Electrical Engineering Department, Amirkabir University of Technology
  • Ali kuhestani Ph.D. Student, Electrical Engineering Department, Amirkabir University of Technology
  • Mohammad Javad Emadi Assistant Professor, Electrical Engineering Department, Amirkabir University of Technology
چکیده مقاله:

Abstract—In this paper, the problem of secure transmission in two-hop amplify-and-forward (AF) systems with an untrusted relay is investigated. To prevent the untrusted relay from intercepting the source message and to achieve positive secrecy rate, the destination-based cooperative jamming (DBCJ) technique is used. In this method the destination sends an intended jamming signal to the relay. This jamming signal helps protecting the source message from being captured reliably at the untrusted relay, while the destination cancels itself intended jamming signal. The optimal power allocation (OPA) technique is considered for the presented system. It is observed that the objective function is a quasiconcave function at high signal-to-noise-ratio (SNR) regimes. Based on this OPA technique, we study the ergodic secrecy rate (ESR) and the secrecy outage probability (SOP) of the system when the source and relay are equipped with a single antenna while the destination is equipped with largescale antenna arrays (LSA). Using the achieved closed-form expressions, one can evaluate the performance of the secure system easily and fast and also, they provide significant insight for system design. Finally, simulation results indicate the accuracy of the derived expressions.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

performance study of untrusted relay network utilizing cooperative jammer

abstract—in this paper, the problem of secure transmission in two-hop amplify-and-forward (af) systems with an untrusted relay is investigated. to prevent the untrusted relay from intercepting the source message and to achieve positive secrecy rate, the destination-based cooperative jamming (dbcj) technique is used. in this method the destination sends an intended jamming signal to the relay. t...

متن کامل

Secure Two-Way Transmission via Wireless-Powered Untrusted Relay and External Jammer

In this paper, we propose a two-way secure communication scheme where two transceivers exchange confidential messages via a wireless powered untrusted amplify-and-forward (AF) relay in the presence of an external jammer. We take into account both friendly jamming (FJ) and Gaussian noise jamming (GNJ) scenarios. Based on the time switching (TS) architecture at the relay, the data transmission is...

متن کامل

Joint Power Allocation at the Base Station and the Relay for Untrusted Relay Cooperation OFDMA Network

The secure communication that multiple OFDMA-based cell-edge mobile stations (MS) can only transmit confidential messages to base station (BS) through an untrusted intermediate relay (UR) is discussed. Specifically, with the destination-based jamming (DBJ) scheme and fixed MS transmission power assumption, our focus is on the joint BS and US power allocation to maximize system sum secrecy rate....

متن کامل

Relay and jammer cooperation as a coalitional game in secure cooperative wireless networks

In this paper, we investigate cooperation of conventional relays and friendly jammers subject to secrecy constraints for cooperative networks. In order to obtain an optimized secrecy rate, the source selects several conventional relays and friendly jammers from the intermediate nodes to assist data transmission, and in return, it needs to make a payment. Each intermediate node here has two poss...

متن کامل

Relay and jammer selection schemes for improving physical layer security in two-way cooperative networks

This paper is concerned with the relay and jammers selection in two-way cooperative networks to improve their physical layer security. Three different categories of selection schemes are proposed which are; selection schemes without jamming, selection schemes with conventional jamming and selection schemes with controlled jamming. The selection process is analyzed for two different network mode...

متن کامل

منابع من

با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ذخیره در منابع من قبلا به منابع من ذحیره شده

{@ msg_add @}


عنوان ژورنال

دوره 48  شماره 2

صفحات  93- 100

تاریخ انتشار 2016-11-21

با دنبال کردن یک ژورنال هنگامی که شماره جدید این ژورنال منتشر می شود به شما از طریق ایمیل اطلاع داده می شود.

میزبانی شده توسط پلتفرم ابری doprax.com

copyright © 2015-2023