Performance of Selection cooperation in the presence of a malicious relay

The performance of Selection cooperation in the presence of a malicious relay is analyzed. The malicious relay introduces a new form of Denial of Service (DoS) attack at the physical layer, inhibiting source-destination communication from reaping the diversity and SNR gains produced through cooperation in the network. In this form of DOS attack, the relay does not alter the source information while relaying. From the analysis it is found that in the presence of a malicious relay, Selection cooperation achieves a diversity order of 2 irrespective of the number of relays in the network and the malicious relay position has a significant effect on the performance of the system.

[1]  Elza Erkip,et al.  User cooperation diversity. Part I. System description , 2003, IEEE Trans. Commun..

[2]  Zhu Han,et al.  Distributed Cooperative Transmission with Unreliable and Untrustworthy Relay Channels , 2009, EURASIP J. Wirel. Commun. Netw..

[3]  Gregory W. Wornell,et al.  Cooperative diversity in wireless networks: Efficient protocols and outage behavior , 2004, IEEE Transactions on Information Theory.

[4]  Nasir D. Memon,et al.  Cooperative diversity with selfish users , 2008, 2008 42nd Annual Conference on Information Sciences and Systems.

[5]  Nasir D. Memon,et al.  Detecting Malicious Behavior in Cooperative Diversity , 2007, 2007 41st Annual Conference on Information Sciences and Systems.

[6]  Elza Erkip,et al.  User cooperation diversity. Part II. Implementation aspects and performance analysis , 2003, IEEE Trans. Commun..

[7]  George K. Karagiannidis,et al.  Performance analysis of single relay selection in rayleigh fading , 2008, IEEE Transactions on Wireless Communications.

[8]  R. Adve,et al.  On Selection Cooperation in Distributed Networks , 2006, 2006 40th Annual Conference on Information Sciences and Systems.

[9]  Raviraj S. Adve,et al.  Improving amplify-and-forward relay networks: optimal power allocation versus selection , 2006, IEEE Transactions on Wireless Communications.

[10]  Gregory W. Wornell,et al.  Distributed space-time-coded protocols for exploiting cooperative diversity in wireless networks , 2003, IEEE Trans. Inf. Theory.

[11]  Neelesh B. Mehta,et al.  Analysis, Insights and Generalization of a Fast Decentralized Relay Selection Mechanism , 2009, 2009 IEEE International Conference on Communications.

[12]  H.T. Sencar,et al.  Cooperative diversity in the presence of a misbehaving relay : Performance analysis , 2007, 2007 IEEE Sarnoff Symposium.

[13]  Min Wu,et al.  Tracing Malicious Relays in Cooperative Wireless Communications , 2007, IEEE Transactions on Information Forensics and Security.

[14]  Aggelos Bletsas,et al.  A simple Cooperative diversity method based on network path selection , 2005, IEEE Journal on Selected Areas in Communications.