sis 14(2): e2

Research Article

Exploring Relay Cooperation for Secure and Reliable Transmission in Two-HopWireless Networks

Download947 downloads
  • @ARTICLE{10.4108/sis.1.2.e2,
        author={Yulong Shen and Yuanyu  Zhang},
        title={Exploring Relay Cooperation for Secure and Reliable Transmission in Two-HopWireless Networks},
        journal={EAI Endorsed Transactions on Scalable Information Systems},
        volume={1},
        number={2},
        publisher={ICST},
        journal_a={SIS},
        year={2014},
        month={3},
        keywords={Two-Hop Wireless Networks, Cooperative Relay, Physical Layer Security, Transmission Outage, Secrecy Outage},
        doi={10.4108/sis.1.2.e2}
    }
    
  • Yulong Shen
    Yuanyu Zhang
    Year: 2014
    Exploring Relay Cooperation for Secure and Reliable Transmission in Two-HopWireless Networks
    SIS
    ICST
    DOI: 10.4108/sis.1.2.e2
Yulong Shen1,*, Yuanyu Zhang2,3
  • 1: School of Computer Science and Technology, Xidian University, China
  • 2: State Key Lab. of Integrated Service Network, Xi’an, Shaanxi, China.
  • 3: School of Systems Information Science, Future University Hakodate, Japan
*Contact email: ylshen@mail.xidian.edu.cn

Abstract

This work considers the problem of secure and reliable information transmission via relay cooperation in two-hop relay wireless networks without the information of both eavesdropper channels and locations. While previous work on this problem mainly studied infinite networks and their asymptotic behavior and scaling law results, this papers focuses on a more practical network with finite number of system nodes and explores the corresponding exact result on the number of eavesdroppers one network can tolerate to ensure desired secrecy and reliability. We first study the scenario where path-loss is equal between all pairs of nodes and consider two transmission protocols there, one adopts an optimal but complex relay selection process with less load balance capacity while the other adopts a random but simple relay selection process with good load balance capacity. Theoretical analysis and numerical results are then provided to determine the maximum number of eavesdroppers one network can tolerate to ensure a desired performance in terms of the secrecy outage probability and transmission outage probability. We further extend our study to the more general scenario where path-loss between each pair of nodes also depends on the distance between them, for which a new transmission protocol with both preferable relay selection and good load balance as well as the corresponding theoretical analysis and numerical results are presented.