Leakage rate based hybrid untrustworthy relay selection with channel estimation error

This paper investigates the imperfect channel state information that is caused by channel estimation error on the leakage rate based hybrid untrustworthy relay selection strategy. The investigation considers a dual-hop multiple untrustworthy two-way half/full-duplex bi-directional wireless relaying in the system structure. According to analytical, asymptotic and Monte-Carlo simulation results, the hybrid leakage rate based untrustworthy relay selection strategy achieves cooperative diversity order in high signal-to-noise ratio regimes. Results also show that the channel estimation error causes system coding gain losses in low signal-to-noise ratio regimes. The channel estimation error effects turn out to be at negligible at high signal-to-noise ratio regimes. Results also show that friendly jammer severely effects the system performance and degrades the achievable cooperative diversity order from M to 0 and also causes system coding gain losses in high signal-to-noise ratio regimes.

[1]  Beongku An,et al.  Outage performance of physical layer security for multi-hop underlay cognitive radio networks with imperfect channel state information , 2016, 2016 International Conference on Electronics, Information, and Communications (ICEIC).

[2]  D. Rajan Probability, Random Variables, and Stochastic Processes , 2017 .

[3]  Jianjun Wu,et al.  Jammer selection for secure two-way DF relay communications with imperfect CSI , 2014, 16th International Conference on Advanced Communication Technology.

[4]  Zhen Yang,et al.  Joint Source-Relay Selection for Improving Wireless Physical-Layer Security , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).

[5]  Herbert A. David,et al.  Order Statistics, Third Edition , 2003, Wiley Series in Probability and Statistics.

[6]  John M. Cioffi,et al.  Impact of channel estimation error on physical layer security in dual-hop half/full-duplex two-way wireless relaying networks , 2016, 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[7]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[8]  Kamel Tourki,et al.  Transmission mode selection scheme for physical layer security in multi-user multi-relay systems , 2016, 2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).

[9]  Joan Daemen,et al.  AES Proposal : Rijndael , 1998 .

[10]  Bo Wang,et al.  Secure On–Off Transmission in Slow Fading Wiretap Channel With Imperfect CSI , 2017, IEEE Transactions on Vehicular Technology.

[11]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[12]  Hui-Ming Wang,et al.  An Adaptive Transmission Scheme for Slow Fading Wiretap Channel with Channel Estimation Errors , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).

[13]  Lingyang Song,et al.  Performance Analysis of Bidirectional Relay Selection with Imperfect Channel State Information , 2011, ArXiv.

[14]  Ioannis Krikidis,et al.  Opportunistic relay selection for cooperative networks with secrecy constraints , 2010, IET Commun..

[15]  Volkan Ozduran Leakage rate based hybrid untrustworthy relay selection for a dual-hop half/full-duplex bi-directional wireless relaying networks , 2017, 2017 Advances in Wireless and Optical Communications (RTUWO).

[16]  A. Lee Swindlehurst,et al.  Secure Relay and Jammer Selection for Physical Layer Security , 2015, IEEE Signal Processing Letters.

[17]  John M. Cioffi,et al.  Feedback Delay Effects on Physical Layer Security in a Dual-Hop Half/Full-Duplex Bi-Directional Wireless Relaying Networks , 2016, 2016 IEEE Globecom Workshops (GC Wkshps).