Greedy Algorithm Applied Secrecy Rate Analysis in the Cooperative Communication

Cooperative communication is the future tendency because of low cost. Three fundamental schemes including Amplify-and-Forward (AF) mode, Decode-and-Forward (DF) mode and Compress and Forward (CF) mode could be employed. In the system, relays play the role to transmit the delivered signal to the destination. However, there might be the eavesdroppers pretend the relay to snip the message. Currently, privacy and security are highly requested in the communication. Hence, the secrecy protection becomes important. Traditionally, the complex encryption scheme would be applied but it is not practical to apply to the equipment with low computing resources. According to Shannon Theory, positive secrecy rate could support secure communications. Maximum secrecy rate is the initial step to analyze the possible secure communication in the cooperative system. The exhaustive method to find the extreme secrecy rate in the system could be realized. However, time efficiency is not considerable. In order to reduce the computational complexity, a greedy algorithm might provide an acceptable solution to approach the purpose of analysis. In this work, the DF mode cooperative mode is adopted for analysis with a greedy algorithm. The result shows the effects of eavesdropper are not significant if the destination station select the strong signal from legitimate stations.

[1]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[2]  Aria Nosratinia,et al.  Cooperative communication in wireless networks , 2004, IEEE Communications Magazine.

[3]  Jarernsri L. Mitrpanont,et al.  Exhaustive Greedy Algorithm for Optimizing Intermediate Result Sizes of Join Queries , 2009, 2009 Eighth IEEE/ACIS International Conference on Computer and Information Science.

[4]  Chintha Tellambura,et al.  Admission control-based joint bandwidth and power allocation in multi-user DF relay networks , 2010, 2010 Conference Record of the Forty Fourth Asilomar Conference on Signals, Systems and Computers.

[5]  Geoffrey Ye Li,et al.  Simplified Relay Selection and Power Allocation in Cooperative Cognitive Radio Systems , 2011, IEEE Transactions on Wireless Communications.

[6]  Hsiao-Chen Lu,et al.  Cooperative Strategies in Wireless Relay Networks , 2012, IEEE Journal on Selected Areas in Communications.

[7]  Wan Choi,et al.  On the Cooperative Diversity Gain in Underlay Cognitive Radio Systems , 2012, IEEE Transactions on Communications.

[8]  Guevara Noubir,et al.  Distributed Cooperation and Diversity for Hybrid Wireless Networks , 2010, IEEE Transactions on Mobile Computing.

[9]  Andrei V. Gurtov,et al.  Two-phase authentication protocol for wireless sensor networks in distributed IoT applications , 2014, 2014 IEEE Wireless Communications and Networking Conference (WCNC).

[10]  Lifeng Wang,et al.  Physical Layer Security of Maximal Ratio Combining in Two-Wave With Diffuse Power Fading Channels , 2014, IEEE Transactions on Information Forensics and Security.

[11]  Xiaoming Chen,et al.  Large-Scale MIMO Relaying Techniques for Physical Layer Security: AF or DF? , 2015, IEEE Transactions on Wireless Communications.

[12]  Victor C. M. Leung,et al.  Improving physical-layer security in wireless communications using diversity techniques , 2014, IEEE Network.