1st International ICST Workshop on the Security and Privacy of Emerging Ubiquitous Communication Systems

Research Article

Securing Cooperative Transmission in Wireless Communications

  • @INPROCEEDINGS{10.1109/MOBIQ.2007.4451071,
        author={Zhu  Han and Yan  Lindsay Sun},
        title={Securing Cooperative Transmission in Wireless Communications},
        proceedings={1st International ICST Workshop on the Security and Privacy of Emerging Ubiquitous Communication Systems},
        publisher={IEEE},
        proceedings_a={SPEUCS},
        year={2008},
        month={2},
        keywords={Analytical models  Bit error rate  Broadcasting  Channel capacity  Channel estimation  Communication system security  Information security  Relays  Wireless communication  Wireless networks},
        doi={10.1109/MOBIQ.2007.4451071}
    }
    
  • Zhu Han
    Yan Lindsay Sun
    Year: 2008
    Securing Cooperative Transmission in Wireless Communications
    SPEUCS
    IEEE
    DOI: 10.1109/MOBIQ.2007.4451071
Zhu Han1, Yan Lindsay Sun2
  • 1: Electrical and Computer Engineering Department, Boise State University
  • 2: Electrical and Computer Engineering Department, University of Rhode Island

Abstract

Cooperative transmission is an emerging communication technique that takes advantages of spatial diversity and broadcast natures of wireless channels to improve wireless channel capacity. However, cooperative transmission can be vulnerable to malicious attacks, especially in its current design. In this paper, we examine whether the cooperative transmission still have performance advantages when we consider the security issues. In particular, we identify various attacks against cooperative transmission, analyze the vulnerabilities of current schemes, design a trust-assisted cooperative transmission scheme, and evaluate the proposed scheme through analysis and simulations. The proposed scheme can fix the security problems and maintain the performance advantage. It performs much better than the traditional scheme when there are malicious/greedy relays or severe channel estimation errors. In addition, we investigate the advantage of cooperative transmission in terms of defending bad mouth attacks. A recovery of link bit error rate is observed.