Loading…

Relaying techniques for enhancing the physical layer secrecy in cooperative networks with multiple eavesdroppers

ABSTRACT Physical layer security has recently attracted considerable attention in the context of information‐theoretic point of view. In this paper, we investigate relay selection schemes for security‐constrained half‐duplex cooperative wireless networks with multiple eavesdroppers, which have the a...

Full description

Saved in:
Bibliographic Details
Published in:Transactions on emerging telecommunications technologies 2014-04, Vol.25 (4), p.445-460
Main Authors: Al-nahari, Azzam Y., Krikidis, Ioannis, Ibrahim, Ahmed S., Dessouky, Moawad I., Abd El-Samie, Fathi E.
Format: Article
Language:English
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c3031-1c9b24d97d8b025cb4341d0bb9cf87c017532a7dd2203f6c74b46f911c3526a03
cites cdi_FETCH-LOGICAL-c3031-1c9b24d97d8b025cb4341d0bb9cf87c017532a7dd2203f6c74b46f911c3526a03
container_end_page 460
container_issue 4
container_start_page 445
container_title Transactions on emerging telecommunications technologies
container_volume 25
creator Al-nahari, Azzam Y.
Krikidis, Ioannis
Ibrahim, Ahmed S.
Dessouky, Moawad I.
Abd El-Samie, Fathi E.
description ABSTRACT Physical layer security has recently attracted considerable attention in the context of information‐theoretic point of view. In this paper, we investigate relay selection schemes for security‐constrained half‐duplex cooperative wireless networks with multiple eavesdroppers, which have the ability to cooperate to overhear the source transmission. The proposed techniques select a trusted decode‐and‐forward relay to assist the source transmission and maximize the achievable secure rate for different eavesdropper policies (cooperation or not); for the two cases, we assume that the channel is always available. In addition, a jamming method that selects two relay nodes to create an intentional interference at both phases of the decode‐and‐forward protocol to confound the eavesdropper nodes is also considered. Both the source–destination and source–eavesdroppers links are taken into account in the proposed analysis. Secrecy rate and secrecy outage probability are the two performance metrics that are used to verify the effectiveness of the proposed schemes while asymptotic approximations of the secrecy outage probability are also derived. Simulation and analytical results demonstrate the performance improvement of the proposed schemes. Copyright © 2012 John Wiley & Sons, Ltd. In his paper, we investigate relay selection schemes for security‐constrained half‐duplex cooperative wireless networks with multiple eavesdroppers, which have the ability to cooperate to overhear the source transmission. The proposed techniques select a trusted decode‐and‐forward relay to assist the source transmission and maximize the achievable secure rate for different eavesdropper policies (cooperation or not); for the two cases, we assume that the channel is always available. In addition, a jamming method that selects two relay nodes to create an intentional interference at both phases of the decode‐and‐forward protocol to confound the eavesdropper nodes is also considered.
doi_str_mv 10.1002/ett.2581
format article
fullrecord <record><control><sourceid>istex_cross</sourceid><recordid>TN_cdi_crossref_primary_10_1002_ett_2581</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>ark_67375_WNG_HW0M9JF8_R</sourcerecordid><originalsourceid>FETCH-LOGICAL-c3031-1c9b24d97d8b025cb4341d0bb9cf87c017532a7dd2203f6c74b46f911c3526a03</originalsourceid><addsrcrecordid>eNp10MtKw0AUBuBBFCxa8BFm6SZ1LrkupfSiVIVS6XKYTE7M2DSJM9PW7Nz6mj6JqRXRhWdzDvwfZ_EjdEHJgBLCrsC5AQtieoR6jIbU4wkNjn_dp6hv7TPpJgpY4Mc95OZQylZXT9iBKir9sgGL89pgqApZqa-gANwUrdVKlrjDYD7e3i0oA6rFusKqrhsw0ukt4ArcrjYri3faFXi9KZ1uSug8yC3YzNRNR-05OsllaaH_vc_Q43i0GE692cPkZng98xQnnHpUJSnzsyTK4pSwQKU-92lG0jRReRwpQqOAMxllGWOE56GK_NQP84RSxQMWSsLP0OXhrzK1tQZy0Ri9lqYVlIh9YaIrTOwL66h3oDtdQvuvE6PF4q_X1sHrj5dmJcKIR4FY3k_EdEnukttxLOb8EzXogDw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Relaying techniques for enhancing the physical layer secrecy in cooperative networks with multiple eavesdroppers</title><source>Wiley-Blackwell Read &amp; Publish Collection</source><creator>Al-nahari, Azzam Y. ; Krikidis, Ioannis ; Ibrahim, Ahmed S. ; Dessouky, Moawad I. ; Abd El-Samie, Fathi E.</creator><creatorcontrib>Al-nahari, Azzam Y. ; Krikidis, Ioannis ; Ibrahim, Ahmed S. ; Dessouky, Moawad I. ; Abd El-Samie, Fathi E.</creatorcontrib><description>ABSTRACT Physical layer security has recently attracted considerable attention in the context of information‐theoretic point of view. In this paper, we investigate relay selection schemes for security‐constrained half‐duplex cooperative wireless networks with multiple eavesdroppers, which have the ability to cooperate to overhear the source transmission. The proposed techniques select a trusted decode‐and‐forward relay to assist the source transmission and maximize the achievable secure rate for different eavesdropper policies (cooperation or not); for the two cases, we assume that the channel is always available. In addition, a jamming method that selects two relay nodes to create an intentional interference at both phases of the decode‐and‐forward protocol to confound the eavesdropper nodes is also considered. Both the source–destination and source–eavesdroppers links are taken into account in the proposed analysis. Secrecy rate and secrecy outage probability are the two performance metrics that are used to verify the effectiveness of the proposed schemes while asymptotic approximations of the secrecy outage probability are also derived. Simulation and analytical results demonstrate the performance improvement of the proposed schemes. Copyright © 2012 John Wiley &amp; Sons, Ltd. In his paper, we investigate relay selection schemes for security‐constrained half‐duplex cooperative wireless networks with multiple eavesdroppers, which have the ability to cooperate to overhear the source transmission. The proposed techniques select a trusted decode‐and‐forward relay to assist the source transmission and maximize the achievable secure rate for different eavesdropper policies (cooperation or not); for the two cases, we assume that the channel is always available. In addition, a jamming method that selects two relay nodes to create an intentional interference at both phases of the decode‐and‐forward protocol to confound the eavesdropper nodes is also considered.</description><identifier>ISSN: 2161-3915</identifier><identifier>EISSN: 2161-3915</identifier><identifier>DOI: 10.1002/ett.2581</identifier><language>eng</language><publisher>Blackwell Publishing Ltd</publisher><ispartof>Transactions on emerging telecommunications technologies, 2014-04, Vol.25 (4), p.445-460</ispartof><rights>Copyright © 2012 John Wiley &amp; Sons, Ltd.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c3031-1c9b24d97d8b025cb4341d0bb9cf87c017532a7dd2203f6c74b46f911c3526a03</citedby><cites>FETCH-LOGICAL-c3031-1c9b24d97d8b025cb4341d0bb9cf87c017532a7dd2203f6c74b46f911c3526a03</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27901,27902</link.rule.ids></links><search><creatorcontrib>Al-nahari, Azzam Y.</creatorcontrib><creatorcontrib>Krikidis, Ioannis</creatorcontrib><creatorcontrib>Ibrahim, Ahmed S.</creatorcontrib><creatorcontrib>Dessouky, Moawad I.</creatorcontrib><creatorcontrib>Abd El-Samie, Fathi E.</creatorcontrib><title>Relaying techniques for enhancing the physical layer secrecy in cooperative networks with multiple eavesdroppers</title><title>Transactions on emerging telecommunications technologies</title><addtitle>Trans. Emerging Tel. Tech</addtitle><description>ABSTRACT Physical layer security has recently attracted considerable attention in the context of information‐theoretic point of view. In this paper, we investigate relay selection schemes for security‐constrained half‐duplex cooperative wireless networks with multiple eavesdroppers, which have the ability to cooperate to overhear the source transmission. The proposed techniques select a trusted decode‐and‐forward relay to assist the source transmission and maximize the achievable secure rate for different eavesdropper policies (cooperation or not); for the two cases, we assume that the channel is always available. In addition, a jamming method that selects two relay nodes to create an intentional interference at both phases of the decode‐and‐forward protocol to confound the eavesdropper nodes is also considered. Both the source–destination and source–eavesdroppers links are taken into account in the proposed analysis. Secrecy rate and secrecy outage probability are the two performance metrics that are used to verify the effectiveness of the proposed schemes while asymptotic approximations of the secrecy outage probability are also derived. Simulation and analytical results demonstrate the performance improvement of the proposed schemes. Copyright © 2012 John Wiley &amp; Sons, Ltd. In his paper, we investigate relay selection schemes for security‐constrained half‐duplex cooperative wireless networks with multiple eavesdroppers, which have the ability to cooperate to overhear the source transmission. The proposed techniques select a trusted decode‐and‐forward relay to assist the source transmission and maximize the achievable secure rate for different eavesdropper policies (cooperation or not); for the two cases, we assume that the channel is always available. In addition, a jamming method that selects two relay nodes to create an intentional interference at both phases of the decode‐and‐forward protocol to confound the eavesdropper nodes is also considered.</description><issn>2161-3915</issn><issn>2161-3915</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2014</creationdate><recordtype>article</recordtype><recordid>eNp10MtKw0AUBuBBFCxa8BFm6SZ1LrkupfSiVIVS6XKYTE7M2DSJM9PW7Nz6mj6JqRXRhWdzDvwfZ_EjdEHJgBLCrsC5AQtieoR6jIbU4wkNjn_dp6hv7TPpJgpY4Mc95OZQylZXT9iBKir9sgGL89pgqApZqa-gANwUrdVKlrjDYD7e3i0oA6rFusKqrhsw0ukt4ArcrjYri3faFXi9KZ1uSug8yC3YzNRNR-05OsllaaH_vc_Q43i0GE692cPkZng98xQnnHpUJSnzsyTK4pSwQKU-92lG0jRReRwpQqOAMxllGWOE56GK_NQP84RSxQMWSsLP0OXhrzK1tQZy0Ri9lqYVlIh9YaIrTOwL66h3oDtdQvuvE6PF4q_X1sHrj5dmJcKIR4FY3k_EdEnukttxLOb8EzXogDw</recordid><startdate>201404</startdate><enddate>201404</enddate><creator>Al-nahari, Azzam Y.</creator><creator>Krikidis, Ioannis</creator><creator>Ibrahim, Ahmed S.</creator><creator>Dessouky, Moawad I.</creator><creator>Abd El-Samie, Fathi E.</creator><general>Blackwell Publishing Ltd</general><scope>BSCLL</scope><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>201404</creationdate><title>Relaying techniques for enhancing the physical layer secrecy in cooperative networks with multiple eavesdroppers</title><author>Al-nahari, Azzam Y. ; Krikidis, Ioannis ; Ibrahim, Ahmed S. ; Dessouky, Moawad I. ; Abd El-Samie, Fathi E.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c3031-1c9b24d97d8b025cb4341d0bb9cf87c017532a7dd2203f6c74b46f911c3526a03</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2014</creationdate><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Al-nahari, Azzam Y.</creatorcontrib><creatorcontrib>Krikidis, Ioannis</creatorcontrib><creatorcontrib>Ibrahim, Ahmed S.</creatorcontrib><creatorcontrib>Dessouky, Moawad I.</creatorcontrib><creatorcontrib>Abd El-Samie, Fathi E.</creatorcontrib><collection>Istex</collection><collection>CrossRef</collection><jtitle>Transactions on emerging telecommunications technologies</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Al-nahari, Azzam Y.</au><au>Krikidis, Ioannis</au><au>Ibrahim, Ahmed S.</au><au>Dessouky, Moawad I.</au><au>Abd El-Samie, Fathi E.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Relaying techniques for enhancing the physical layer secrecy in cooperative networks with multiple eavesdroppers</atitle><jtitle>Transactions on emerging telecommunications technologies</jtitle><addtitle>Trans. Emerging Tel. Tech</addtitle><date>2014-04</date><risdate>2014</risdate><volume>25</volume><issue>4</issue><spage>445</spage><epage>460</epage><pages>445-460</pages><issn>2161-3915</issn><eissn>2161-3915</eissn><abstract>ABSTRACT Physical layer security has recently attracted considerable attention in the context of information‐theoretic point of view. In this paper, we investigate relay selection schemes for security‐constrained half‐duplex cooperative wireless networks with multiple eavesdroppers, which have the ability to cooperate to overhear the source transmission. The proposed techniques select a trusted decode‐and‐forward relay to assist the source transmission and maximize the achievable secure rate for different eavesdropper policies (cooperation or not); for the two cases, we assume that the channel is always available. In addition, a jamming method that selects two relay nodes to create an intentional interference at both phases of the decode‐and‐forward protocol to confound the eavesdropper nodes is also considered. Both the source–destination and source–eavesdroppers links are taken into account in the proposed analysis. Secrecy rate and secrecy outage probability are the two performance metrics that are used to verify the effectiveness of the proposed schemes while asymptotic approximations of the secrecy outage probability are also derived. Simulation and analytical results demonstrate the performance improvement of the proposed schemes. Copyright © 2012 John Wiley &amp; Sons, Ltd. In his paper, we investigate relay selection schemes for security‐constrained half‐duplex cooperative wireless networks with multiple eavesdroppers, which have the ability to cooperate to overhear the source transmission. The proposed techniques select a trusted decode‐and‐forward relay to assist the source transmission and maximize the achievable secure rate for different eavesdropper policies (cooperation or not); for the two cases, we assume that the channel is always available. In addition, a jamming method that selects two relay nodes to create an intentional interference at both phases of the decode‐and‐forward protocol to confound the eavesdropper nodes is also considered.</abstract><pub>Blackwell Publishing Ltd</pub><doi>10.1002/ett.2581</doi><tpages>16</tpages></addata></record>
fulltext fulltext
identifier ISSN: 2161-3915
ispartof Transactions on emerging telecommunications technologies, 2014-04, Vol.25 (4), p.445-460
issn 2161-3915
2161-3915
language eng
recordid cdi_crossref_primary_10_1002_ett_2581
source Wiley-Blackwell Read & Publish Collection
title Relaying techniques for enhancing the physical layer secrecy in cooperative networks with multiple eavesdroppers
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-03T14%3A16%3A12IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-istex_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Relaying%20techniques%20for%20enhancing%20the%20physical%20layer%E2%80%89secrecy%20in%20cooperative%20networks%20with%20multiple%E2%80%89eavesdroppers&rft.jtitle=Transactions%20on%20emerging%20telecommunications%20technologies&rft.au=Al-nahari,%20Azzam%20Y.&rft.date=2014-04&rft.volume=25&rft.issue=4&rft.spage=445&rft.epage=460&rft.pages=445-460&rft.issn=2161-3915&rft.eissn=2161-3915&rft_id=info:doi/10.1002/ett.2581&rft_dat=%3Cistex_cross%3Eark_67375_WNG_HW0M9JF8_R%3C/istex_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c3031-1c9b24d97d8b025cb4341d0bb9cf87c017532a7dd2203f6c74b46f911c3526a03%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true