Skip to main content
Log in

Secrecy Rate of Two-Hop AF Relaying Networks with an Untrusted Relay

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Two cooperative communication protocols, two-way and one-way half-duplex relayings, are investigated and then compared in the amplify-and-forward (AF) mode. The relay is assumed to play the roles of eavesdropper and relay (i.e., an untrusted relay). With a fair power constraint at each node, the secrecy rate of the one-way relaying protocol is proved to be zero strictly. For the two-way relaying protocol, the signal-to-noise ratio (SNR) threshold is derived, above which the secrecy rate is non-zero. Defining a parameter, namely mistrust level, and non-zero secrecy rate can be achieved for the one-way relaying protocol in certain range of the mistrust level at high SNR. With a fair total power constraint, no matter how unreliable the relay is, the two-way AF half-duplex relaying protocol is proved to be a better choice under high SNR.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Wyner, A. D. (1975). The wire-tap channel. Bell System Technical Journal, 54(8), 1355–1387.

    Article  MATH  MathSciNet  Google Scholar 

  2. Csiszár, I., & Körner, J. (1978). Broadcast channels with confidential messages. IEEE Transactions on Information Theory, 24, 339–348.

    Article  MATH  Google Scholar 

  3. Leung-Yan-Cheong, S. K., & Hellman, M. E. (1978). The Gaussian wiretap channel. IEEE Transactions on Information Theory, 24, 451–456.

    Article  MATH  MathSciNet  Google Scholar 

  4. Dong, L., et al. (2010). Improving wireless physical layer security via cooperating relays. IEEE Transactions on Signal Processing, 58(3), 1875–1888.

    Article  MathSciNet  Google Scholar 

  5. Zhu, J., Mo, J., & Tao, M. (2010). Cooperative secret communication with artificial noise in symmetric interference channel. IEEE Communications Letters, 14(10), 885–887.

    Article  Google Scholar 

  6. Zhang, R., et al. (2010). Physical layer security for two way relay communications with friendly jammers. In IEEE GLOBECOM 10, Miami, FL, 2010.

  7. Jeong, C., Kim, I. M., & Kim, D. I. (2012). Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system. IEEE Transactions on Signal Processing, 60(1), 310–325.

    Article  MathSciNet  Google Scholar 

  8. Wang, H. M., Yin, Q., & Xia, X. G. (2012). Distributed beamforming for physical-layer security of two-way relay networks. IEEE Transactions on Signal Processing, 60(7), 3532–3545.

    Article  MathSciNet  Google Scholar 

  9. Krikidis, I. (2010). Opportunistic relay selection for cooperative networks with secrecy constraints. IET Communications, 4(15), 1787–1791.

    Article  Google Scholar 

  10. Han, Y., et al. (2009). Performance bounds for two-way amplify-and-forward relaying. IEEE Transactions on Wireless Communications, 8(1), 432–439.

    Article  Google Scholar 

  11. Ping, J., & Ting, S. H. (2009). Rate performance of AF two-way relaying in low SNR region. IEEE Communications Letters, 13(4), 233–235.

    Article  Google Scholar 

  12. He, X., & Yener, A. (2008). Two-hop secure communication using an untrusted relay: A case for cooperative jamming. In IEEE GLOBECOM 08, New Orleans, LA, 2008.

  13. Gómez Mármol, F., Martínez Pérez, G., & Gómez Skarmeta, A. F. (2009). TACS, a trust model for P2P networks. Wireless Personal Communications, 51(1), 153–164.

    Article  Google Scholar 

Download references

Acknowledgments

The authors thank the anonymous reviewers for the valuable comments and suggestions. The work is supported by the National Natural Science Foundation of China (Grant Nos. 61262084 and 61141007), the Natural Science Foundation of Jiangxi Province, China (Grant Nos. 20132BAB201019 and 20114BAB201018), the Foundation for Young Scientists of Jiangxi Province (Jinggang Star) (Grant No. 20122BCB23002), and the Opening Project of Shanghai Key Laboratory of Integrate Administration Technologies for Information Security (No. AGK2012005).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nanrun Zhou.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Zhou, N., Chen, X., Li, C. et al. Secrecy Rate of Two-Hop AF Relaying Networks with an Untrusted Relay. Wireless Pers Commun 75, 119–129 (2014). https://doi.org/10.1007/s11277-013-1351-1

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-013-1351-1

Keywords

Navigation