Opportunistic Selection for Decode-and-Forward Cooperative Networks with Secure Probabilistic Constraints

This work presents theoretical analysis on security performance for relay selections based on either statistical or instantaneous channel state information (CSI) of the eavesdropper (CSI-E) channels in a decode-and-forward relaying network. By considering security constraints, we have derived exact expressions for the average secrecy rate and the secrecy outage probability. Moreover, analytical expressions of the false secrecy probability are derived for the suboptimal relay selection based on statistical CSI-E, which are used as the constrained functions of new selection metrics. Furthermore, our work achieves a better tradeoff between the outage probability and the false secrecy probability. The accuracy of our performance analysis is verified by simulation results.

[1]  Hong Man,et al.  Maximal Ratio Diversity Combining Enhanced Security , 2011, IEEE Communications Letters.

[2]  Xiaodai Dong,et al.  MIMO Relaying Broadcast Channels With Linear Precoding and Quantized Channel State Information Feedback , 2010, IEEE Transactions on Signal Processing.

[3]  Xiaodai Dong,et al.  Joint Precoding Optimization for Multiuser Multi-Antenna Relaying Downlinks Using Quadratic Programming , 2011, IEEE Transactions on Communications.

[4]  Yawgeng A. Chau,et al.  Channel statistics and performance of cooperative selection diversity with dual-hop amplify-and-forward relay over Rayleigh fading channels , 2008, IEEE Transactions on Wireless Communications.

[5]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2007, ISIT.

[6]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[7]  Hesham El Gamal,et al.  The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.

[8]  Gerhard Fettweis,et al.  Relay-based deployment concepts for wireless and mobile broadband radio , 2004, IEEE Communications Magazine.

[9]  Aylin Yener,et al.  Two-Hop Secure Communication Using an Untrusted Relay , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[10]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[11]  John S. Thompson,et al.  Relay selection for secure cooperative networks with jamming , 2009, IEEE Transactions on Wireless Communications.

[12]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[13]  Xiaodai Dong,et al.  Joint Optimization for Source and Relay Precoding under Multiuser MIMO Downlink Channels , 2010, 2010 IEEE International Conference on Communications.

[14]  Jiaheng Wang,et al.  Performance of Secure Communications Over Correlated Fading Channels , 2012, IEEE Signal Processing Letters.

[15]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[16]  John G. Proakis,et al.  Digital Communications , 1983 .

[17]  Matthew R. McKay,et al.  Secure Transmission With Artificial Noise Over Fading Channels: Achievable Rate and Optimal Power Allocation , 2010, IEEE Transactions on Vehicular Technology.

[18]  Z. Jane Wang,et al.  Closed-Form BER Analysis of Non-Coherent FSK in MISO Double Rayleigh Fading/RFID Channel , 2011, IEEE Communications Letters.

[19]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[20]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[21]  Yasutada Oohama,et al.  Capacity Theorems for Relay Channels with Confidential Messages , 2007, 2007 IEEE International Symposium on Information Theory.

[22]  I. S. Gradshteyn,et al.  Table of Integrals, Series, and Products , 1976 .

[23]  Ioannis Krikidis,et al.  Opportunistic relay selection for cooperative networks with secrecy constraints , 2010, IET Commun..

[24]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.