Effects of relaying schemes in scalable wireless sensor networks

Wireless communication uses the open and shared medium to transmit data from one point to another point. Since data is shared in unbounded medium, so security attacks in wireless communication is more in comparison of other medium. Physical layer security (PLS) provides a new idea to consider the issues related to security. The effect of relaying schemes in traditional and pessimistic scenario has been performed in terms of secrecy rate. The situation in which relay helps the eavesdropper is assumed as pessimistic scenario. The obtained numerical results shows that for pessimistic scenario, DF relaying outperforms AF if source-relay channel gain is greater than an optimum value. Moreover, for better eavesdropper channel also, a non-zero secrecy rate is possible for relay-destination channel gain greater than a particular value using relaying schemes in traditional scenario.

[1]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[2]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[3]  Xinmiao Zhang,et al.  Wireless Security and Cryptography: Specifications and Implementations , 2007 .

[4]  Shlomo Shamai,et al.  Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.

[5]  Jianhui Wu,et al.  Secure wireless communications via cooperative relaying and jamming , 2011, 2011 IEEE GLOBECOM Workshops (GC Wkshps).

[6]  Jian Wang,et al.  Analyzing Amplify-and-Forward and Decode-and-Forward Cooperative Strategies in Wyner's Channel Model , 2009, 2009 IEEE Wireless Communications and Networking Conference.

[7]  Hesham El Gamal,et al.  Cooperation for Secure Communication: The Relay Wiretap Channel , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.

[8]  M. Yuksel,et al.  Secure Communication with a Relay Helping the Wire-tapper , 2007, 2007 IEEE Information Theory Workshop.

[9]  Zhao Junxi,et al.  Achievable secrecy rate of the relay-eavesdropper channel with generalized feedback , 2011, 2011 International Conference on Wireless Communications and Signal Processing (WCSP).

[10]  Hesham El Gamal,et al.  The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.

[11]  Yasutada Oohama,et al.  Coding for relay channels with confidential messages , 2001, Proceedings 2001 IEEE Information Theory Workshop (Cat. No.01EX494).

[12]  Gregory W. Wornell,et al.  Cooperative diversity in wireless networks: Efficient protocols and outage behavior , 2004, IEEE Transactions on Information Theory.

[13]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[14]  Rodney A. Kennedy,et al.  Cooperative jamming for secrecy in decentralized wireless networks , 2012, 2012 IEEE International Conference on Communications (ICC).