The Capacity Analysis in the Secure Cooperative Communication System

With the characteristic of spatial diversity and low cost, cooperative system is a tendency for the future communications. In the wireless communication system, there exist degradation factors such as signal fading, multipath transmission, signal inferences, bandwidth limitation and so on. In addition to these degradation factors, the wireless transmission is not a secure environment. The information might be leaked during the transmission. Currently, the issues of privacy and security have become increasingly important for the mobile users. Traditionally, the security scheme is applied to the higher network layer. Encryption can be complex and difficult without infrastructure. It is not suitable to apply to the equipment with low computing resources, such as Internet of Things (IoT) application. Within information theoretic security characterizes the fundamental ability of the physical layer to provide a secure transmission. Hence, this work concentrates on the secure cooperative communication system. Based on the Shannon third theorem on channel capacity, this work analyzes the secrecy capacity between the source station and the destination station. For a practical situation in the system, the scenario includes multiple source stations, multiple relay stations, multiple destination stations, and eavesdroppers. For the positive secrecy rate consideration, the maximum mutual information between the source station and the destination station and the minimum mutual information between the source station and the eavesdropper should be held. To ensure a secure communication, the derived theoretical solution could be applied to find the optimal relay assignment. Beyond the relay selection, some issues related to the secure cooperative communication are suggested for the future researches in the final.

[1]  Lifeng Wang,et al.  Physical Layer Security of Maximal Ratio Combining in Two-Wave With Diffuse Power Fading Channels , 2014, IEEE Transactions on Information Forensics and Security.

[2]  Raviraj S. Adve,et al.  Selection cooperation in multi-source cooperative networks , 2008, IEEE Transactions on Wireless Communications.

[3]  Aria Nosratinia,et al.  Cooperative communication in wireless networks , 2004, IEEE Communications Magazine.

[4]  Xianbin Wang,et al.  Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks , 2013, IEEE Journal on Selected Areas in Communications.

[5]  Hsiao-Chen Lu,et al.  On cooperative strategies in wireless relay networks , 2011, 2011 Proceedings IEEE INFOCOM.

[6]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[7]  Victor C. M. Leung,et al.  Improving physical-layer security in wireless communications using diversity techniques , 2014, IEEE Network.

[8]  Jyh-Horng Wen,et al.  Performance Evaluation for the Cooperative Communication Systems in Decode-and-Forward Mode with a maximal ratio combining scheme , 2014 .

[9]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[10]  Shiuh-Pyng Shieh,et al.  Emerging Security Threats and Countermeasures in IoT , 2015, AsiaCCS.

[11]  Geoffrey Ye Li,et al.  Simplified Relay Selection and Power Allocation in Cooperative Cognitive Radio Systems , 2011, IEEE Transactions on Wireless Communications.

[12]  Miguel R. D. Rodrigues,et al.  Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.

[13]  Jie Han,et al.  A social-aware routing protocol based on fuzzy logic in vehicular ad hoc networks , 2014, 2014 International Workshop on High Mobility Wireless Communications.

[14]  Feng Xia,et al.  BEEINFO: Interest-Based Forwarding Using Artificial Bee Colony for Socially Aware Networking , 2015, IEEE Transactions on Vehicular Technology.

[15]  Xiaoming Chen,et al.  Large-Scale MIMO Relaying Techniques for Physical Layer Security: AF or DF? , 2015, IEEE Transactions on Wireless Communications.

[16]  Guevara Noubir,et al.  Distributed Cooperation and Diversity for Hybrid Wireless Networks , 2010, IEEE Transactions on Mobile Computing.

[17]  Brian D. Woerner,et al.  Joint power allocation and relay selection for multiuser cooperative communication , 2010, IEEE Transactions on Wireless Communications.

[18]  A. Lee Swindlehurst,et al.  Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.

[19]  Min-Shiang Hwang,et al.  Downlink Relay Selection Algorithm for Amplify-and-Forward Cooperative Communication Systems , 2013, 2013 Seventh International Conference on Complex, Intelligent, and Software Intensive Systems.

[20]  Derrick Wing Kwan Ng,et al.  Robust Beamforming for Secure Communication in Systems With Wireless Information and Power Transfer , 2013, IEEE Transactions on Wireless Communications.