Effects of CSI Knowledge on Secrecy of Threshold-Selection Decode-and-Forward Relaying

This paper considers secrecy of a three node cooperative wireless system in the presence of a passive eavesdropper. The threshold-selection decode-and-forward relay is considered, which can decode the source message correctly only if a predefined signal-to-noise ratio (SNR) is achieved. The effects of channel state information (CSI) availability on secrecy outage probability (SOP) and ergodic secrecy rate (ESR) are investigated, and closed-form expressions are derived. Diversity is achieved from the direct and relaying paths both at the destination and at the eavesdropper by combinations of maximal-ratio combining and selection combining schemes. An asymptotic analysis is provided when each hop SNR is the same in the balanced case and when it is different in the unbalanced case. The analysis shows that both hops can be a bottleneck for secure communication; however, they do not affect the secrecy identically. While it is observed that CSI knowledge can improve secrecy, the amount of improvement for SOP is more when the required rate is low and for ESR when the operating SNR is also low. It is also shown that the source to eavesdropper link SNR is more crucial for secure communication.

[1]  K. J. Ray Liu,et al.  Optimum threshold-selection relaying for decode-and-forward cooperation protocol , 2006, IEEE Wireless Communications and Networking Conference, 2006. WCNC 2006..

[2]  Mérouane Debbah,et al.  Relay Selection Schemes for Dual-Hop Networks under Security Constraints with Multiple Eavesdroppers , 2013, IEEE Transactions on Wireless Communications.

[3]  O. Olabiyi,et al.  Ergodic Secrecy Rates of Secure Wireless Communications , 2014, 2014 IEEE Military Communications Conference.

[4]  Miguel R. D. Rodrigues,et al.  Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.

[5]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.

[6]  Xianbin Wang,et al.  Secrecy capacity enhancement in two-hop DF relaying systems in the presence of eavesdropper , 2015, 2015 IEEE International Conference on Communications (ICC).

[7]  Saeed Vahidian,et al.  Relay Selection for Security-Constrained Cooperative Communication in the Presence of Eavesdropper's Overhearing and Interference , 2015, IEEE Wireless Communications Letters.

[8]  John S. Thompson,et al.  Relay selection for secure cooperative networks with jamming , 2009, IEEE Transactions on Wireless Communications.

[9]  Esa R. Alotaibi,et al.  Ergodic secrecy capacity analysis for cooperative communication with relay selection under non-identical distribution , 2016, 2016 IEEE International Conference on Communications (ICC).

[10]  Ioannis Krikidis,et al.  Opportunistic relay selection for cooperative networks with secrecy constraints , 2010, IET Commun..

[11]  Chinmoy Kundu,et al.  Secrecy performance of dual-hop decode-and-forward relay system with diversity combining at the eavesdropper , 2016, IET Commun..

[12]  Octavia A. Dobre,et al.  Secrecy Performance of Dual-Hop Threshold Relaying System with Diversity Reception , 2016, 2016 IEEE 84th Vehicular Technology Conference (VTC-Fall).

[13]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[14]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[15]  Chinmoy Kundu,et al.  Secrecy Outage of Dual-Hop Regenerative Multi-Relay System With Relay Selection , 2015, IEEE Transactions on Wireless Communications.

[16]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[17]  Caijun Zhong,et al.  Opportunistic Relay Selection for Secrecy Enhancement in Cooperative Networks , 2015, IEEE Transactions on Communications.

[18]  Steven P. Weber,et al.  On Cooperative Relaying Schemes for Wireless Physical Layer Security , 2010, IEEE Transactions on Signal Processing.

[19]  H. Vincent Poor,et al.  Security Enhancement of Cooperative Single Carrier Systems , 2015, IEEE Transactions on Information Forensics and Security.

[20]  Pingzhi Fan,et al.  Secure multiuser communications in multiple decode-and-forward relay networks with direct links , 2014, 2014 IEEE Global Communications Conference.

[21]  Octavia A. Dobre,et al.  Relay Selection to Improve Secrecy in Cooperative Threshold Decode-and-Forward Relaying , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).

[22]  Nan Yang,et al.  Secrecy Outage Probability of Selective Relaying Wiretap Channels with Collaborative Eavesdropping , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).

[23]  Xianbin Wang,et al.  Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks , 2013, IEEE Journal on Selected Areas in Communications.

[24]  A. Lee Swindlehurst,et al.  Secure Relay and Jammer Selection for Physical Layer Security , 2015, IEEE Signal Processing Letters.

[25]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[26]  Gregory W. Wornell,et al.  Cooperative diversity in wireless networks: Efficient protocols and outage behavior , 2004, IEEE Transactions on Information Theory.

[27]  Meixia Tao,et al.  Relay Placement for Physical Layer Security: A Secure Connection Perspective , 2012, IEEE Communications Letters.

[28]  Yueming Cai,et al.  Average secrecy rate analysis with relay selection using decode-and-forward strategy in cooperative networks , 2013, 2013 International Conference on Wireless Communications and Signal Processing.

[29]  D. G. Brennan Linear Diversity Combining Techniques , 1959, Proceedings of the IRE.

[30]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[31]  I. S. Gradshteyn,et al.  1 – ELEMENTARY FUNCTIONS , 1980 .

[32]  Hesham El Gamal,et al.  The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.

[33]  Esa R. Alotaibi,et al.  Relay Selection for Multi-Destination in Cooperative Networks with Secrecy Constraints , 2014, 2014 IEEE 80th Vehicular Technology Conference (VTC2014-Fall).

[34]  Carles Padró,et al.  Information Theoretic Security , 2013, Lecture Notes in Computer Science.