Physical Layer Secrecy Performance of Multi-hop Decode-and-Forward Relay Networks with Multiple Eavesdroppers

Today, wireless networks become the most popular way to communicate. However, information can be easily eavesdropped or extracted by eavesdroppers due to the broadcast nature of wireless communication. Multi-hop relay communication systems provide for higher secrecy performance than direct transmission techniques. In this paper, the physical layer secrecy performance of multi-hop decode-and-forward (DF) relay network is investigated in the presence of multiple passive eavesdroppers over Nakagami-m fading channels. To do so, we find out the exact closed-form expressions of existence probability of secrecy capacity and secrecy outage probability by using statistical characteristics of signal-to-noise ratio (SNR). Importantly, these expressions are in more general forms compared to other results in the literature. The proposed results show a quite agreement between numerical analysis and equivalent Monte-Carlo simulations.

[1]  Vo Nguyen Quoc Bao,et al.  Multihop Decode-and-Forward Relay Networks: Secrecy Analysis and Relay Position Optimization , 2012 .

[2]  Dac-Binh Ha,et al.  Physical layer security in UWB communication systems with transmit antenna selection , 2014, 2014 International Conference on Computing, Management and Telecommunications (ComManTel).

[3]  Aggelos Kiayias,et al.  Robust key generation from signal envelopes in wireless networks , 2007, CCS '07.

[4]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.

[5]  Richard E. Blahut,et al.  Secrecy capacity of SIMO and slow fading channels , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..

[6]  Hyung Yun Kong,et al.  Performance analysis of a decode-and-forward scheme under physical layer security over Rician fading channel , 2013, 2013 International Conference on ICT Convergence (ICTC).

[7]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[8]  Wade Trappe,et al.  Information-Theoretically Secret Key Generation for Fading Wireless Channels , 2009, IEEE Transactions on Information Forensics and Security.

[9]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[10]  Guanding Yu,et al.  On the Secrecy Capacity of Fading Wireless Channel with Multiple Eavesdroppers , 2007, 2007 IEEE International Symposium on Information Theory.

[11]  Mehdi Bennis,et al.  Performance of Transmit Antenna Selection Physical Layer Security Schemes , 2012, IEEE Signal Processing Letters.

[12]  T. Aono,et al.  Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels , 2005, IEEE Transactions on Antennas and Propagation.

[13]  Xianbin Wang,et al.  Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks , 2013, IEEE Journal on Selected Areas in Communications.

[14]  Ueli Maurer,et al.  Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.