Secure half-duplex dual-hop AF relaying networks with partial relay selection

In this paper, we focus on the half-duplex (HD) relaying with partial relay selection (PRS) scheme using destination-assisted jamming (DAJ). We consider one source (S), one destination (D), one passive eavesdropper and multiple amplify-and-forward (AF) relays. The relay node is selected based on the best instantaneous signal-to-noise ratio (SNR) of the first hop. Closed-form expressions for lower-bound of ergodic secrecy capacity (ESC) and secrecy outage probability (SOP) are derived over independent and identically distributed (i.i.d.) Rayleigh fading environment. Moreover, we present a comparison between the proposed system and the secure AF relaying system with reactive relay selection (RRS). In the RRS, the relay is chosen based on the best SNR of the second hop. Simulation results are presented to verify the exactness of our proposed mathematical analysis.

[1]  Lajos Hanzo,et al.  A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.

[2]  Huiming Wang,et al.  Secrecy rate maximization for SIMO wiretap channel with uncoordinated cooperative jamming under secrecy outage probability constraint , 2016, 2016 IEEE Wireless Communications and Networking Conference.

[3]  Shashibhushan Sharma,et al.  Secrecy outage probability with destination assisted jamming in presence of an untrusted relay , 2016, 2016 IEEE Annual India Conference (INDICON).

[4]  Yueming Cai,et al.  Performance Analysis with Partial Relay Selection in Amplify-and-Forward Cooperative Networks , 2011, 2011 International Conference on Network Computing and Information Security.

[5]  Hien Quoc Ngo,et al.  Secure 5G Wireless Communications: A Joint Relay Selection and Wireless Power Transfer Approach , 2016, IEEE Access.

[6]  I. M. Pyshik,et al.  Table of integrals, series, and products , 1965 .

[7]  Xiaohong Jiang,et al.  Cooperative Jamming in a Two-Hop Relay Wireless Network with Buffer-Aided Relays , 2017, 2017 Fifth International Symposium on Computing and Networking (CANDAR).

[8]  Milton Abramowitz,et al.  Handbook of Mathematical Functions with Formulas, Graphs, and Mathematical Tables , 1964 .

[9]  Wei-Ping Zhu,et al.  Robust Cooperative Secure Beamforming for Simultaneous Wireless Information and Power Transfer in Amplify-and-Forward Relay Networks , 2017, IEEE Transactions on Vehicular Technology.

[10]  Wessam Ajib,et al.  Impact of the CSI on the Performance of Cognitive Relay Networks With Partial Relay Selection , 2016, IEEE Transactions on Vehicular Technology.

[11]  George K. Karagiannidis,et al.  Secure Communications With Cooperative Jamming: Optimal Power Allocation and Secrecy Outage Analysis , 2017, IEEE Transactions on Vehicular Technology.

[12]  M. Abramowitz,et al.  Handbook of Mathematical Functions With Formulas, Graphs and Mathematical Tables (National Bureau of Standards Applied Mathematics Series No. 55) , 1965 .

[13]  Nikos C. Sagias,et al.  Physical Layer Security for Multiple-Antenna Systems: A Unified Approach , 2016, IEEE Transactions on Communications.

[14]  Kamel Tourki,et al.  Relay selection for optimized cooperative jamming scheme , 2015, 2015 23rd European Signal Processing Conference (EUSIPCO).

[15]  John S. Thompson,et al.  Amplify-and-forward with partial relay selection , 2008, IEEE Communications Letters.

[16]  Wen-Zhan Song,et al.  Coprime array adaptive beamforming based on compressive sensing virtual array signal , 2016, 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[17]  Zhongshan Zhang,et al.  Secure Full-Duplex Two-Way Relaying Networks With Optimal Relay Selection , 2017, IEEE Communications Letters.

[18]  Nitin Jain,et al.  Comparative study of different types of relay selection scheme for cooperative wireless communication , 2017, 2017 International Conference on Information, Communication, Instrumentation and Control (ICICIC).