Max-Ratio Relay Selection in Secure Buffer-Aided Cooperative Wireless Networks

This paper considers the security of transmission in buffer-aided decode-and-forward cooperative wireless networks. An eavesdropper which can intercept the data transmission from both the source and relay nodes is considered to threaten the security of transmission. Finite size data buffers are assumed to be available at every relay in order to avoid having to select concurrently the best source-to-relay and relay-to-destination links. A new max-ratio relay selection policy is proposed to optimize the secrecy transmission by considering all the possible source-to-relay and relay-to-destination links and selecting the relay having the link which maximizes the signal to eavesdropper channel gain ratio. Two cases are considered in terms of knowledge of the eavesdropper channel strengths: exact and average gains, respectively. Closed-form expressions for the secrecy outage probability for both cases are obtained, which are verified by simulations. The proposed max-ratio relay selection scheme is shown to outperform one based on a max-min-ratio relay scheme.

[1]  D. Vere-Jones Markov Chains , 1972, Nature.

[2]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[3]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[4]  H. A. David,et al.  Order Statistics (2nd ed). , 1981 .

[5]  G. A. Mack,et al.  Order Statistics (2nd Ed.) , 1983 .

[6]  Robert J. Plemmons,et al.  Nonnegative Matrices in the Mathematical Sciences , 1979, Classics in Applied Mathematics.

[7]  Charles M. Grinstead,et al.  Introduction to probability , 1999, Statistics for the Behavioural Sciences.

[8]  John N. Tsitsiklis,et al.  Introduction to Probability , 2002 .

[9]  Imre Csiszár,et al.  Secrecy Capacities for Multiterminal Channel Models , 2005, IEEE Transactions on Information Theory.

[10]  Aggelos Bletsas,et al.  A simple Cooperative diversity method based on network path selection , 2005, IEEE Journal on Selected Areas in Communications.

[11]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.

[12]  H. Vincent Poor,et al.  Recovering Multiplexing Loss through Successive Relaying Using Repetition Coding , 2007, IEEE Transactions on Wireless Communications.

[13]  Ender Tekin,et al.  The Gaussian multiple access wire-tap channel: wireless secrecy and cooperative jamming , 2007, 2007 Information Theory and Applications Workshop.

[14]  Wei Zhang,et al.  Power Control in Cognitive Radio Systems Based on Spectrum Sensing Side Information , 2007, 2007 IEEE International Conference on Communications.

[15]  Amir Ghasemi,et al.  Fundamental limits of spectrum-sharing in fading environments , 2007, IEEE Transactions on Wireless Communications.

[16]  Michele Nogueira Lima,et al.  Identity-based key management in mobile ad hoc networks: techniques and applications , 2008, IEEE Wireless Communications.

[17]  H. Vincent Poor,et al.  Multiple-Access Channels With Confidential Messages , 2008, IEEE Transactions on Information Theory.

[18]  Gregory W. Wornell,et al.  Secure Broadcasting Over Fading Channels , 2008, IEEE Transactions on Information Theory.

[19]  Song Rong-fang An Improved Cooperative Diversity Method Based on Network Path Selection , 2008 .

[20]  H. Poor,et al.  Buffering in a Three-Node Relay Network (Part 2) , 2008 .

[21]  Zhu Han,et al.  Secure wireless communications via cooperation , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.

[22]  Shlomo Shamai,et al.  Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.

[23]  Ender Tekin,et al.  The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.

[24]  H. Vincent Poor,et al.  Buffering in a Three-Node Relay Network , 2008, IEEE Transactions on Wireless Communications.

[25]  Hesham El Gamal,et al.  The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.

[26]  Roy D. Yates,et al.  Discrete Memoryless Interference and Broadcast Channels With Confidential Messages: Secrecy Rate Regions , 2007, IEEE Transactions on Information Theory.

[27]  Tharmalingam Ratnarajah,et al.  On the Performance of Opportunistic Cooperative Wireless Networks , 2008, IEEE Transactions on Communications.

[28]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[29]  Zhu Han,et al.  Amplify-and-forward based cooperation for secure wireless communications , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.

[30]  Petar Popovski,et al.  Wireless Secrecy in Cellular Systems With Infrastructure-Aided Cooperation , 2009, IEEE Transactions on Information Forensics and Security.

[31]  John S. Thompson,et al.  Relay selection for secure cooperative networks with jamming , 2009, IEEE Transactions on Wireless Communications.

[32]  Joseph Lipka,et al.  A Table of Integrals , 2010 .

[33]  Ioannis Krikidis,et al.  Opportunistic relay selection for cooperative networks with secrecy constraints , 2010, IET Commun..

[34]  Herbert A. David,et al.  Order Statistics , 2011, International Encyclopedia of Statistical Science.

[35]  David Gesbert,et al.  Efficient Selective Feedback Design for Multicell Cooperative Networks , 2011, IEEE Transactions on Vehicular Technology.

[36]  Lutz H.-J. Lampe,et al.  Buffer-aided relaying in a three node network , 2012, 2012 IEEE International Symposium on Information Theory Proceedings.

[37]  John S. Thompson,et al.  Buffer-Aided Relay Selection for Cooperative Diversity Systems without Delay Constraints , 2012, IEEE Transactions on Wireless Communications.

[38]  Zhu Han,et al.  Joint Relay and Jammer Selection for Secure Two-Way Relay Networks , 2011, IEEE Transactions on Information Forensics and Security.

[39]  John S. Thompson,et al.  Comment on "Relay Selection for Secure Cooperative Networks with Jamming" , 2012, IEEE Transactions on Wireless Communications.

[40]  Zhiguo Ding,et al.  A General Relaying Transmission Protocol for MIMO Secrecy Communications , 2012, IEEE Transactions on Communications.

[41]  Robert Schober,et al.  Max-Max Relay Selection for Relays with Buffers , 2012, IEEE Transactions on Wireless Communications.

[42]  Robert Schober,et al.  Buffer-Aided Relaying with Adaptive Link Selection , 2012, IEEE Journal on Selected Areas in Communications.

[43]  Huaping Liu,et al.  Sum-Rate Optimization in a Two-Way Relay Network with Buffering , 2012, IEEE Communications Letters.

[44]  Kerstin Vogler,et al.  Table Of Integrals Series And Products , 2016 .