Advertisement

Trusted Cooperative Transmissions: Turning a Security Weakness into a Security Enhancement

Chapter

Abstract

Since the invention of wireless telegraphy, the effort to improve wireless channel capacity has never stopped. In the last decade, significant advancement has been made and this advancement has featured two milestones. The first milestone is Multiple-Input-Multiple-Output (MIMO) techniques, which create spatial diversity by taking advantage of multiple antennas and improvesthe wireless channel capacity by an amount on the order of the number of antennas on a wireless device. The second milestone is cooperative transmission. Instead of relying on the installation of multiple antennas on one wireless device, cooperative transmission achieves spatial diversity through physical layer cooperation. In cooperative transmission, when the source node transmits a message to the destination node, the nearby nodes that overhear this transmission will “help” the source and destination by relaying the replicas of the message, and the destination will combine the multiple received waveforms so as to improve the link quality. In other words, cooperative transmission techniques utilize nearby nodes as virtual antennas, and mimic the effects of MIMO in achieving spatial diversity.

Keywords

Channel State Information Outage Probability Relay Node Malicious Node Relay Selection 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    A. Sendonaris, E. Erkip, and B. Aazhang, “User cooperation diversity, Part I: system description,” IEEE Transactions on Communications, vol. 51, no. 11, pp. 1927–1938, November 2003.Google Scholar
  2. 2.
    A. Sendonaris, E. Erkip, and B. Aazhang, User cooperation diversity, Part II: implementation aspects and performance analysis,”IEEE Transactions on Communications, Vol. 51, No. 11, pp. 1939–1948, November 2003.CrossRefGoogle Scholar
  3. 3.
    J. N. Laneman, D. N. C. Tse, and G. W. Wornell, “Cooperative diversity in wireless networks: efficient protocols and outage behavior,” IEEE Transactions on Information Theory, vol. 50, no. 12, pp. 3062–3080, December 2004.CrossRefMathSciNetGoogle Scholar
  4. 4.
    J. N. Laneman and G. W. Wornell, “Distributed space-time coded protocols for exploiting cooperative diversity in wireless networks,” IEEE Transactions on Information Theory, vol. 49, pp. 2415–2525, October 2003.CrossRefMathSciNetGoogle Scholar
  5. 5.
    T. M. Cover and A. El Gamal, “Capacity theorems for the relay channel”, IEEE Information Theory, vol. 25, issue 5, pp. 572–584, September 1979.MATHCrossRefGoogle Scholar
  6. 6.
    http : //ieee802.org/16/relay/ Google Scholar
  7. 7.
    W. Su, A. K. Sadek, and K. J. R. Liu, “SER performance analysis and optimum power allocation for decode-and-forward cooperation protocol in wireless networks,” in Proceedings of IEEE Wireless Communications and Networking Conference (WCNC), New Orleans, LA, March 13–17, 2005.Google Scholar
  8. 8.
    A. Host-Madsen, “Upper and lower bounds for channel capacity of asynchronous cooperative diversity networks,” IEEE Transactions on Information Theory, vol. 50, no. 4, pp. 3062–3080, Dec. 2004.Google Scholar
  9. 9.
    A. Host-Madsen, “A new achievable rate for cooperative diversity based on generalized writing on dirty paper,” in Proceedings of IEEE International Symposium Information Theory, pp. 317, Yokohama, Japan, June 2003.Google Scholar
  10. 10.
    T. E. Hunter and A. Nosratinia, “Performance analysis of coded cooperation diversity”, in Proceedings of 2003 International Conference on Communications (ICC03), vol. 4, pp. 2688–2692, Seattle, WA, May 2003.Google Scholar
  11. 11.
    T. E. Hunter, S. Sanayei, and A. Nosratinia, “Outage analysis of coded cooperation,” IEEE Transactions on Information Theory, vol. 52, no. 2, pp. 375–391, Feburary 2006.CrossRefMathSciNetGoogle Scholar
  12. 12.
    M. A. Khojastepour, A. Sabharwal, and B. Aazhang, “On the capacity of ‘cheap’ relay networks,” in Proceedings of 37th Annual Conference on Information Sciences and Systems, Baltimore, MD, March 2003.Google Scholar
  13. 13.
    J. Luo, R. S. Blum, L. J. Greenstein, L. J. Cimini, and A. M. Haimovich, “New approaches for cooperative use of multiple antennas in ad hoc wireless networks,” in Proceedings of IEEE Vehicular Technology Conference, vol. 4, pp. 2769–2773, Los Angeles, CA, September 2004.Google Scholar
  14. 14.
    Y. Zhao, R. S. Adve, and T. J. Lim, “Improving amplify-and-forward relay networks: optimal power allocation versus selection”, in Proceedings of IEEE International Symposium on Information Theory, Seattle, WA, July 2006.Google Scholar
  15. 15.
    Z. Han, X. Zhang, and H. V. Poor, “Cooperative transmission protocols with high spectral efficiency and high diversity order using multiuser detection and network coding”, in Proceedings of IEEE International Conference on Communications, Glasgow, Scotland, June 2007.Google Scholar
  16. 16.
    Z. Han, T. Himsoon, W. Siriwongpairat, and K. J. Ray Liu, “Energy efficient cooperative transmission over multiuser OFDM networks: who helps whom and how to cooperate”, in Proceedings of IEEE Wireless Communications and Networking Conference, vol. 2, pp. 1030–1035, New Orleans, LA, March 2005.Google Scholar
  17. 17.
    Z. Yang, J. Liu, and A. Host-Madsen, “Cooperative routing and power allocation in ad-hoc networks,” in Proceedings of IEEE Global Telecommunications Conference, Dallas, TX, November 2005.Google Scholar
  18. 18.
    A. E. Khandani, E. Modiano, L. Zheng, and J. Abounadi, “Cooperative routing in wireless networks,” Advannces in Pervasive Computing and Networking, Kluwer Academic Publishers, Eds. B. K. Szymanski and B. Yener, 2004.Google Scholar
  19. 19.
    A. S. Ibrahim, Z. Han, and K. J. R. Liu, “Distributed power-efficient cooperative routing in wireless ad hoc networks”, in Proceedings of IEEE Globe Telecommunication Conference (Globecom), Washington DC, November 2007.Google Scholar
  20. 20.
    Z. Han and H. V. Poor, “Lifetime improvement in wireless sensor networks via collaborative beamforming and cooperative transmission”, IEE Microwaves, Antennas and Propagation, Special Issue on Antenna Systems and Propagation for Future Wireless Communications, vol. 1, issue 6, pp. 1103–1110, 2007.Google Scholar
  21. 21.
    J. Boyer, D. D. Falconer, and H. Yanikomeroglu, “Multihop diversity in wireless relaying channels”, IEEE Transactions on Communications, vol. 52, no. 10, pp. 1820–1830, October 2004.CrossRefGoogle Scholar
  22. 22.
    J. Boyer, D. D. Falconer, and H. Yanikomeroglu, “Cooperative connectivity models for wireless relay networks”, IEEE Transactions on Wireless Communications, vol. 6, no. 6, pp. 1992–2000, June 2007.CrossRefGoogle Scholar
  23. 23.
    F. Li, K. Wu, and A. Lippman, “Energy-efficient cooperative routing in multi-hop wireless ad hoc networks,” in Proceedings of IEEE International Performance, Computing, and Communications Conference, pp. 215–222, Phoenix, AZ, April 2006.Google Scholar
  24. 24.
    A. K. Sadek, W. Su, and K. J. R. Liu, “A class of cooperative communication protocols for multi-node wireless networks,” in Proceedings of IEEE International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Newyork, June 2005.Google Scholar
  25. 25.
    A. Bletsas, A. Lippman, and D. P. Reed, “A simple distributed method for relay selection in cooperative diversity wireless networks, based on reciprocity and channel measurements”, in Proceedings of IEEE Vehicular Technology Conference, vol. 3, pp. 1484–1488, Stockholm, Sweden, May 2005.Google Scholar
  26. 26.
    B. Wang, Z. Han, and K. J. Ray Liu, “Distributed relay selection and power control for multiuser cooperative communication networks using buyer/seller game”, in Proceedings of Annual IEEE Conference on Computer Communications, INFOCOM’07, Anchorage, AK, May 2007.Google Scholar
  27. 27.
    Z. Han and H. V. Poor, “Coalition game with cooperative transmission: a cure for the curse of boundary nodes in selfish packet-forwarding wireless networks”, in Proceedings of 5th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, (WiOpt07), Limassol, Cyprus, April 2007.Google Scholar
  28. 28.
    Z. Han and K. J. R. Liu, Resource Allocation for Wireless Networks: Basics, Techniques, and Applications, Cambridge University Press, UK, April, 2008.Google Scholar
  29. 29.
    D. Gunduz and E. Erkip, “Joint source-channel cooperation: Diversity versus spectral efficiency,” in Proceedings of 2004 IEEE International Symposium Information Theory, Chicago, IL, June–July 2004 p. 392.Google Scholar
  30. 30.
    I. Maric and R. D. Yates, “Cooperative multihop broadcast for wireless networks,” IEEE Journal on Selected Areas in Communications, vol. 22, no. 6, pp. 1080–1088, August 2004.CrossRefGoogle Scholar
  31. 31.
    Z. Han and Y. Lindsay Sun, “Self-learning cooperative transmission — coping with unreliability due to mobility, channel estimation errors, and untrustworthy nodes”, in Proceedings of IEEE Globe Telecommunication Conference (Globecom), Washington DC, November 2007.Google Scholar
  32. 32.
    Z. Han and Y. Sun “ Securing cooperative transmission in wireless communications, channel,” in Proceedings of 1st ACM Workshop on Security for Emerging Ubiquitous Wireless Networks, Philadelphia, PA, August 2007.Google Scholar
  33. 33.
    A. Jsang, R. Ismail, and C. Boyd, “A survey of trust and reputation systems for online service provision,” Decision Support Systems, vol. 43, no. 2, pp. 618–644, March 2007.CrossRefGoogle Scholar
  34. 34.
    M. Langheinrich, “When trust does not compute - the role of trust in ubiquitous computing,” in Proceedings of the Fifth International Conference on Ubiquitous Computing (UBICOMP’03), Seattle, Washington, October 2003.Google Scholar
  35. 35.
    Y. Sun, W. Yu, Z. Han, and K. J. Ray Liu, “Information theoretic framework of trust modeling and evaluation for ad hoc networks,” IEEE Journal on Selected Areas in Communications, Special Issue on Security in Wireless Ad Hoc Networks, vol. 24, no. 2, pp. 305–317, April 2006.MATHGoogle Scholar
  36. 36.
    A. Jsang and R. Ismail, “The beta reputation system,” in Proceedings of the 15th Bled Electronic Commerce Conference, Bled, Slovenia, June 2002.Google Scholar
  37. 37.
    G. Theodorakopoulos and J. S. Baras, “Trust evaluation in ad-hoc networks,” in Proceedings of the ACM Workshop on Wireless Security (WiSE’04), Philadelphia, PA, October 2004.Google Scholar
  38. 38.
    S. Boyd and L. Vandenberghe, Convex optimization, Cambridge University Press, 2006. (http://www.stanford.edu/ ˜ boyd/cvxbook.html)Google Scholar
  39. 39.
    A. K. Sadek, W. Su, and K. J. Ray Liu, “A class of cooperative communication protocols for multi-node wireless networks,” in Proceedings of IEEE International Workshop on Signal Processing Advances in Wireless Communications, SPAWC’05, New York, NY, June 2005.Google Scholar
  40. 40.
    Y.Wang and J. Vassileva, “A review on trust and reputation for web service selection,” in Proceedings of the first Int. Workshop on Trust and Reputation Magnement in Massively Distributed Computing Systems (TRAM’07), June 2007.Google Scholar
  41. 41.
    A. Jsang, R. Ismail, and C. Boyd, “A survey of trust and reputation systems for online service provision,” in Decision Support Systems, 2005.Google Scholar
  42. 42.
    W. Xu, K. Ma, W. Trappe, and Y. Zhang “Jamming sensor networks: attack and defense strategies,” IEEE Networks, vol. 20, no. 3, pp. 41–47, May–June 2006.CrossRefGoogle Scholar
  43. 43.
    W. Xu, T. Wood, W. Trappe, and Y. Zhang “Channel surfing and spatial retreats: defenses against wireless denial of service,” in Proceedings of 2004 ACM Workshop on Wireless Security, pp. 80–89, Philadelphia, PA, October 2004.Google Scholar
  44. 44.
    J. G. Proakis, Digital Communications, 3rd edition, McGraw-Hill, New York 1995.Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2009

Authors and Affiliations

  1. 1.University of Rhode IslandKingston, RIUSA
  2. 2.ECE DepartmentUniversity of HoustonHouston, TXUSA

Personalised recommendations