Abstract
By generating a jamming message at the jammer node, a system can reduce wiretapping in the physical layer because this message can refuse the illegal eavesdropper node. The network coding technique of operating an XOR between two binary messages improves the performance. In this paper, we propose three protocols that use network coding at the two source nodes and/or the binary jamming technique at a relay in the two-way relaying network under physical layer security, compared to a conventional secrecy transmission protocol. The main idea to improve the system performance is that, if the data is transmitted securely, the next transmission time slots using the digital network coding will not consider the presence of the eavesdropper node, because the eavesdropper node cannot obtain the data. The system performance is analyzed and evaluated in terms of the exact closed-form outage probability over Rayleigh fading channels. The simulation results using a Monte-Carlo simulation are in complete agreement with the theoretical results.
Similar content being viewed by others
References
Hong, Y.-W. P., Huang, W. J., & Kuo, C.-C. J. (2010). Cooperative communication and networking: Technologies and system design. Berlin: Springer.
Jamshidi, A., Nasiri-Kenari, M., & Taherpour, A. (2007). Outage probability analysis of a coded cooperative OFDM system in multipath Rayleigh fading channels. In IEEE 18th international symposium on, pers. indoor and mobile radio comm. (pp. 1–6)
Kharat, P. K., & Gavade, J. D. (2013). Cooperative communication: New trend in wireless communication. International Journal of Future Generation Communication and Networking, 6, 157–166.
Nosratinia, A., Hunter, T. E., & Hedayat, A. (2004). Cooperative communication in wireless network. IEEE Communication Magazine, 42, 74–80.
Duy, T. T., & Kong, H. Y. (2014). Adaptive cooperative decode-and-forward transmission with power allocation under interference constraint. Wireless Personal Communication, 74, 401–414.
Sun, X., Wei, X., Jiang, M., & Zhao, C. (2013). Opportunistic selection for decode-and-forward cooperative networks with secure probabilistic constraints. Wireless Personal Communication, 70, 1633–1652.
Huang, C., & Zhang, Xiao-Ping. (2013). Performances of amplify-and-forward cooperative relay networks with different topologies. Wireless Personal Communication, 69, 561–577.
Kapucu, N., Bilim, M., & Develi, I. (2013). SER performance of amplify-and-forward cooperative diversity over asymmetric fading channels. Wireless Personal Communication, 73, 1117–1127.
Lai, L., & Gamal, H. E. (2008). The relay-eavesdropper channel. IEEE Transactions on Information Theory, 54, 4005–4019.
Perron, E., Diggavi, S., & Telatar, I.E. (2009). On cooperative wireless network secrecy, IEEE INFOCOM (pp. 1935-1943)
Wyner, A. D. (1975). The wire-tap channel. Bell System Technical Journal, 54, 1355–1387.
Dong, L., Han, Z., Petropulu, A. P., & Poor, H. V. (2010). Improving wireless physical layer security via cooperating relays. IEEE Transactions on Signal Processing, 58, 1875–1888.
Krikidis, I., Thompson, J. S., & Mclaughlin, S. (2009). Relay selection for secure cooperative networks with jamming. IEEE Transactions on Wirelss Communications, 8, 5003–5011.
Truc, T. T., & Kong, H. Y. (2014). An application of network-coding technique into cooperative jamming. In The 27th Biennial symposium on comm. (QBSC) (pp. 218–222)
Zhang, R., Song, L., Han, Z., & Jiao, B. (2012). Physical layer security for two-way untrusted relaying with friendly jammers. IEE Transactions on Vehicular Technology, 61, 3693–3704.
Son, P. N., & Kong, H. Y. (2014). Exact outage probability of a decode-and-forward scheme with best relay selection under physical layer security. Wireless Personal Communication, 74, 325–342.
Son, P. N., & Kong, H. Y. (2014). Exact outage probability of two-way decode-and-forward scheme with opportunistic relay selection under physical layer security. Wireless Personal Communication, 77, 2889–2917.
Son, P. N., & Kong, H. Y. (2014). An integration of source and jammer for a decode-and-forward two-way scheme under physical layer security. Wireless Personal Communication, 79, 1741–1764.
Author information
Authors and Affiliations
Corresponding author
Appendices
Appendix 1: Solving the probability \(\Pr [ {AS{R_{SR}} > {R_t}} ]\) in (32)
From (5), we can calculate \(\Pr [ {AS{R_{SR}} > {R_t}} ]\) as follows
Let \({X_l}\) be i.i.d. exponential RVs \({| {{h_l}} |^2}\), \(l \in { {1,2,3,4,5} }\). Then, the probability density function (PDF) of \({X_l}\) is given by
Substituting (49) into (48), we obtain
Appendix 2: Solving the Probability \(\Pr [ {{C_{RS}} > {R_t}} ]\) in (34)
From (14), we can calculate \(\Pr [ {{C_{RS}} > {R_t}} ]\) as follows
Appendix 3: Solving the Probability \(\Pr [ {AS{R_{RS}} > {R_t},AS{R_{RD}} > {R_t}} ]\) in (36)
From (19) and (20), we can express \(\Pr [ {AS{R_{RS}} > {R_t},AS{R_{RD}} > {R_t}} ]\) as follows
Substituting (49) into (52), we obtain
Rights and permissions
About this article
Cite this article
Nguyen, S.Q., Kong, H.Y. Combining Binary Jamming and Network Coding to Improve Outage Performance in Two-Way Relaying Networks under Physical Layer Security. Wireless Pers Commun 85, 2431–2446 (2015). https://doi.org/10.1007/s11277-015-2913-1
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-015-2913-1