Advertisement

Secrecy Performance Analysis of Hybrid AF-DF Relaying Under Multi Hop Environment

  • Shweta PalEmail author
  • Poonam Jindal
Article
  • 17 Downloads

Abstract

In this work, a three-hop wireless relaying model comprising of a single source and destination node, along with two relay nodes and an eavesdropper is considered. We made a detailed performance analysis comparison between the multi-hop network and the conventional single-hop model by considering different parameters. Due to the broadcast behaviour of a wireless communication network the propagated message from the source is captured by both intended and an unintended receiver. This will lead to severe security breaches in a wireless medium, so providing fully secure communication is a critical issue. Physical layer security developed as a new archetype to afford security to a wireless communication network. Multi-hop networks are favourite over single-hop networks for better coverage extension and lower interference levels. To use the benefits of both, amplify and forward and decode and forward protocol collectively, a new scheme known as hybrid amplify decode and forward relaying based on signal to noise ratio is presented. The scheme is proposed for multi hop environment with secrecy capacity as a performance metric. Secrecy capacity of proposed scheme outperforms both AF and DF for different distance parameters and path loss exponent under multi-hop environment.

Keywords

Amplify and forward Hybrid amplify decode and forward (HADF) Single and multi-hop environment Secrecy capacity Decode and forward Physical layer security (PLS) 

Notes

References

  1. 1.
    Jindal, P., & Singh, B. (2015). RC4 encryption-a literature survey. International Conference on Information and Communication Technologies.  https://doi.org/10.1016/j.procs.2015.02.129.CrossRefGoogle Scholar
  2. 2.
    Jindal, P., & Singh, B. (2015). Analyzing the security-performance tradeoff in block ciphers. IEEE, ICCCA,.  https://doi.org/10.1109/CCAA.2015.7148425.CrossRefGoogle Scholar
  3. 3.
    Hamamreh, J. M., Furqan, H. M., & Arslan, H. (2009). Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey. IEEE Communications Surveys and Tutorials,21(2), 1773–1828.CrossRefGoogle Scholar
  4. 4.
    Jindal, P., & Singh, B. (2017). Optimization of the security-performance tradeoff in RC4 encryption algorithm. Wireless Personal Communications,92(3), 1221–1250.CrossRefGoogle Scholar
  5. 5.
    Sinha, R., & Jindal, P. (2017). A study of physical layer security with energy harvesting in single hop relaying environment. In IEEE conference on signal processing and integrated networks. Google Scholar
  6. 6.
    Pahuja, S., & Jindal, P. (2019). Cooperative communication in physical layer security: Technologies and challenges. Wireless Personal Communications,108, 811–837.CrossRefGoogle Scholar
  7. 7.
    Son, P. N., & Kong, H. Y. (2015). Cooperative communication with energy harvesting relays under physical layer security. IET Journals,9, 17.Google Scholar
  8. 8.
    Xing, S., Ma, Z., Fei, Y., & Poor, H. V. (2013). A general robust linear transceiver design for multi-hop amplify-and-forward MIMO relaying systems. IEEE Transactions on Signal Processing,61(5), 1196–1209.MathSciNetCrossRefGoogle Scholar
  9. 9.
    Zheng, G., Choo, L., & Wong, K. (2009). Optimal cooperative jamming to enhance physical layer security using relays. IEEE Transactions on Signal Processing,59(3), 1317–1322.MathSciNetCrossRefGoogle Scholar
  10. 10.
    Dong, L., Han, Z., Petropulu, A. P., & Poor, H. V. (2010). Improving wireless physical layer security via cooperating relays. IEEE Transactions on Signal Processing,58(3), 1875–1888.MathSciNetCrossRefGoogle Scholar
  11. 11.
    Farhadi, G., & Beaulieu, N. C. (2009). Power-optimized amplify-and-forward multi-hop relaying systems. IEEE Transactions on Wireless Communications,8(9), 4634–4643.CrossRefGoogle Scholar
  12. 12.
    Bhatnagar, M. R. (2012). Performance analysis of a path selection scheme in multi-hop decode-and-forward protocol. IEEE Communications Letters,16(12), 1980–1983.CrossRefGoogle Scholar
  13. 13.
    Gawtham, K. D., & Jindal, P. (2016). Analysis of amplify and forward technique to improve secrecy rate in multi-hop relaying system. In Proceedings of IEEE RTEICT (pp. 62–64).Google Scholar
  14. 14.
    Pavan Kumar, M. S., Bhattacharjee, R., Herhold, P., Fettweis, G. (2005). Cooperative muti-hop relaying over fading channel. In International conference on signal processing 8 communications (SPCOM).  https://doi.org/10.1109/spcom.2004.1458395.
  15. 15.
    Laneman, J., & Tse, D. (2004). Cooperative diversity in wireless networks: Efficient protocols and outage behavior. IEEE Transactions on Information Theory,50, 3062–3080.MathSciNetCrossRefGoogle Scholar
  16. 16.
    Lun, D. et al. (2009). Amplify-and-forward based cooperation for secure wireless communications. In IEEE international conference on acoustics, speech and signal processing, ICASSP 2009.Google Scholar
  17. 17.
    Thatha, D., Gurrala, K. K., & Das, S. (2015). Performance analysis of hybrid decode-amplify-forward (HDAF) relaying for improving security in cooperative wireless network. In: 2015 global conference on communication technologies (GCCT) (pp. 682–687).Google Scholar
  18. 18.
    Gurrala, K. K., & Das, S. (2015). Maximized channel capacity based power allocation technique for multi relay hybrid decode-amplify-forward cooperative network. Wireless Personal Communications,87(3), 663–678.CrossRefGoogle Scholar
  19. 19.
    Duong, T. Q., & Zepernick, H. J. (2009). Hybrid decode-amplify-forward cooperative communications with multiple relays. In Proceedings of IEEE wireless communications and networking conference Budapest (pp. 1–6).Google Scholar
  20. 20.
    Chen, H., Liu, J., Zhai, C., & Zheng, L. (2010). Performance analysis of SNR based hybrid decode amplify-forward cooperative diversity networks over Rayleigh fading channels. In Proceedings of wireless communications and networking conference (WCNC) (pp. 1–6).Google Scholar
  21. 21.
    Liu, W., Zhou, X., Durrani, S., & Popovski, P. (2016). Secure communication with a wireless-powered friendly jammer. IEEE Transactions on Wireless Communications,15(1), 401–415.CrossRefGoogle Scholar
  22. 22.
    Rasethuntsa, T. R., Kumar, S., & Kaur, M. (2019). A comprehensive performance evaluation of a DF-based multi-hop system over α-κ-µ and α-κ-µ-extreme fading channels.Google Scholar
  23. 23.
    Lee, J. H. (2015). Full-duplex relay for enhancing physical layer security in multi-hop relaying systems. IEEE Communications Letters,19(4), 525528.CrossRefGoogle Scholar
  24. 24.
    Li, J., Petropulu, A. P., & Weber, S. (2011). On cooperative relaying schemes for wireless physical layer security. IEEE Transactions on Signal Processing,59(10), 4985–4997.MathSciNetCrossRefGoogle Scholar
  25. 25.
    Kumar, N., & Bhatia, V. (2015). Performance analysis of amplify-and-forward cooperative networks with best-relay selection over Weibull fading channels. Wireless Personal Communications,85, 641–653.CrossRefGoogle Scholar
  26. 26.
    Sanguinetti, L., DAmico, A. A., & Rong, Y. (2012). A tutorial on the optimization of amplify-and-forward MIMO relay systems. IEEE Journal on Selected Areas in Communications,30(8), 1331–1346.CrossRefGoogle Scholar
  27. 27.
    Thatha, D., Gurrala, K. K., & Das, S. (2015). Performance analysis of hybrid decode-amplify forward (HDAF) relaying for improving security in cooperative wireless network. In Proceedings of 2015 global conference on communication technologies (GCCT 2015. Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.Department of Electronics and CommunicationNIT, KurukshetraKurukshetraIndia

Personalised recommendations