Abstract
As a promising technique for wireless networks, cooperative communications is coming to maturity in both theory and practice. The main merit of the cooperation technique is its capability in providing additional transmission links to harvest the spatial diversity gain at the physical layer. However, due to the broadcast nature of wireless medium, the diversity gain can be also freely achieved at the potential eavesdropper if the cooperation is performed blindly. To solve this problem, we propose a security-embedded opportunistic user cooperation scheme (OUCS) in this paper. The OUCS first defines a concept called secrecy-providing capability (SPC) for both the source and the cooperative relays. By comparing the values of SPC of these nodes, the OUCS jointly decides whether to cooperate and with whom to cooperate from the perspective of physical layer security. The secrecy outage performance of the OUCS is then derived. From the results we prove that full diversity can be achieved (i.e., the diversity order is N + 1 for N cooperative relays), which outperforms existing alternatives. Finally, numerical results are provided to validate the theoretical analysis.
Similar content being viewed by others
Notes
There are examples of real-world systems corresponding to the three cases: (A) the eavesdropper performs strict passive eavesdropping; (B) the location of the eavesdropper can be determined to analyze its average channel conditions; (C) the eavesdropper is also a legitimate node which transmits its own signals but is prohibited from obtaining the confidential messages [24].
The achievable secrecy rate can be further increased if the source continues to transmit in Phase II. For a simple comparison between the OUCS and alternatives, this manner is not considered in this paper.
The results with a shared frequency resource (i.e., an identical \(\gamma _{SE}\)) are also simulated in the next section, which show a similar outage performance and a same diversity order as the orthogonal scenario.
In [22], only the eavesdropper exploits the direct link.
References
Sendonaris, A., Erkip, E., & Aazhang, B. (2003). User cooperation diversity—Part I: System description. IEEE Transactions on Communications, 51(11), 1927–1938.
Laneman, J. N., Tse, D. N. C., & Wornell, G. W. (2004). Cooperative diversity in wireless networks: Efficient protocols and outage behavior. IEEE Transactions on Information Theory, 50(12), 3062–3080.
Ibrahim, A. S., Sadek, A. K., Su, W., & Liu, K. J. R. (2008). Cooperative communications with relay-selection: When to cooperate and whom to cooperate with? IEEE Transactions on Wireless Communications, 7(7), 2814–2827.
Gong, X., Chandrashekhar, T. P. S., Zhang, J., & Poor, H. V. (2012). Opportunistic cooperative networking: To relay or not to relay? IEEE Journal on Selected Areas in Communications, 30(2), 307–314.
Liu, Y., Man, Y., Song, M., Zhang, H., & Wang, L. (2015). A cooperative diversity transmission scheme by superposition coding relaying for a wireless system with multiple relays. Wireless Networks. doi:10.1007/s11276-014-0877-9.
Nomikos, N., Charalambous, T., Krikidis, I., Skoutas, D. N., Vouyioukas, D., & Johansson, M. (2015). A buffer-aided successive opportunistic relay selection scheme with power adaptation and inter-relay interference cancellation for cooperative diversity systems. IEEE Transactions on Communications, 63(5), 1623–1634.
Wyner, A. D. (1975). The wire-tap channel. Bell System Technical Journal, 54(8), 1355–1387.
Csiszar, I., & Korner, J. (1978). Broadcast channels with confidential messages. IEEE Transactions on Information Theory, 24(3), 339–348.
Barros, J., & Rodrigues, M. R. D. (2006). Secrecy capacity of wireless channels. In: Proceedings of IEEE ISIT ’06 (pp. 356–360).
Gopala, P. K., Lai, L., & Gamal, H. E. (2008). On the secrecy capacity of fading channels. IEEE Transactions on Information Theory, 54(10), 4687–4698.
Saad, W., Zhou, X., Han, Z., & Poor, H. V. (2014). On the physical layer security of backscatter wireless systems. IEEE Transactions on Wireless Communications, 13(6), 3442–3451.
Yang, N., Wang, L., Geraci, G., Elkashlan, M., Yuan, J., & Renzo, M. D. (2015). Safeguarding 5G wireless communication networks using physical layer security. IEEE Communications Magazine, 53(4), 20–27.
Krikidis, I., Thompson, J. S., & McLaughlin, S. (2009). Relay selection for secure cooperative networks with jamming. IEEE Transactions on Wireless Communications, 8(10), 5003–5011.
Dong, L., Han, Z., Petropulu, A., & Poor, H. V. (2010). Improving wireless physical layer security via cooperating relays. IEEE Transactions on Signal Processing, 58(3), 1875–1888.
Bassily, R., & Ulukus, S. (2013). Deaf cooperation and relay selection strategies for secure communication in multiple relay networks. IEEE Transactions on Signal Processing, 61(6), 1544–1554.
Hui, H., Swindlehurst, A. L., Li, G., & Liang, J. (2015). Secure relay and jammer selection for physical layer security. IEEE Signal Processing Letters, 22(8), 1147–1151.
Krikidis, I. (2010). Opportunistic relay selection for cooperative networks with secrecy constraints. IET Communications, 4(15), 1787–1791.
Zou, Y., Wang, X., & Shen, W. (2013). Optimal relay selection for physical-layer security in cooperative wireless networks. IEEE Journal on Selected Areas in Communications, 31(10), 2099–2111.
Fan, L., Lei, X., Duong, T. Q., Elkashlan, M., & Karagiannidis, G. K. (2014). Secure multiuser communications in multiple amplify-and-forward relay networks. IEEE Transactions on Communications, 62(9), 3299–3310.
Sakran, H., Shokair, M., Nasr, O., EI-Rabaie, S., & EI-Azm, A. A. (2012). Proposed relay selection scheme for physical layer security in cognitive radio networks. IET Communications, 6(16), 2676–2687.
Al-nahari, A. Y., Krikidis, I., Ibrahim, A. S., Dessouky, M. I., & El-Samie, F. E. A. (2012). Relaying techniques for enhancing the physical layer secrecy in cooperative networks with multiple eavesdroppers. Transactions on Emerging Telecommunications Technologies. doi:10.1002/ett.2581.
Zou, Y., Zhu, J., Wang, X., & Leung, V. C. M. (2015). Improving physical-layer security in wireless communications using diversity techniques. IEEE Network, 29(1), 42–48.
Niu, H., Sun, L., Ito, M., & Sezaki, K. (2014). User cooperation analysis under eavesdropping attack: A game theory perspective. In: Proceedings of IEEE PIMRC ’14 (pp. 139–144).
Mo, J., Tao, M., & Liu, Y. (2012). Relay placement for physical layer security: A secure connection perspective. IEEE Communications Letters, 16(6), 878–881.
Lai, L., & Gamal, H. E. (2008). The relay-eavesdropper channel: Cooperation for secrecy. IEEE Transactions on Information Theory, 54(9), 4005–4019.
Awan, Z. H., Zaidi, A., & Vandendorpe, L. (2012). Secure communication over parallel relay channel. IEEE Transactions on Information Forensics and Security, 7(2), 359–371.
Koyluoglu, O. O., Koksal, C. E., & Gamal, H. E. (2012). On secrecy capacity scaling in wireless networks. IEEE Transactions on Information Theory, 58(5), 3000–3015.
Niu, H., Sun, L., Iwai, M., & Sezaki, K. (2013). Secrecy-enhanced cooperation scheme with multiuser diversity in wireless relay networks. IEICE Communications Express, 2(10), 409–414.
Bletsas, A., Khisti, A., Reed, D. P., & Lippman, A. (2006). A simple cooperative diversity method based on network path selection. IEEE Journal on Selected Areas in Communications, 24(3), 659–672.
Gradshteyn, I. S., & Ryzhik, I. M. (2007). Table of integrals, series, and products (7th ed.). New York: Academic Press.
Author information
Authors and Affiliations
Corresponding author
Appendix: Diversity order analysis of \(P_{out}^{A{\text{-}}up}\)
Appendix: Diversity order analysis of \(P_{out}^{A{\text{-}}up}\)
Equation (9) can be divided into different parts based on “+” and “−” operations,
where, \(a = \frac{1}{{{2^{2{R_s}}}}}\). The results of the last three parts of Eq. (9) are similar to \(P_{out}^{A-up2}\), \(P_{out}^{A - up3}\) and \(P_{out}^{A - up4}\) respectively. Therefore,
Rights and permissions
About this article
Cite this article
Niu, H., Zhu, N., Sun, L. et al. Security-embedded opportunistic user cooperation with full diversity. Wireless Netw 22, 1513–1522 (2016). https://doi.org/10.1007/s11276-015-1044-7
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11276-015-1044-7