Skip to main content

Secrecy Performance of Joint Relay and Jammer Selection Methods in Cluster Networks: With and Without Hardware Noises

  • Conference paper
  • First Online:
AETA 2016: Recent Advances in Electrical Engineering and Related Sciences (AETA 2016)

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 415))

  • 2078 Accesses

Abstract

In this paper, we propose joint relay and jammer selection protocols to enhance secrecy performance for cluster-based multi-hop networks. In particular, without channel state information (CSI) of the eavesdropping links, one of available nodes at each cluster is selected to forward the source data, relying on the CSI of the data links, while a jammer node is randomly chosen to generate artificial noises to an eavesdropper. We also investigate the impact of hardware noises on the secrecy performance of the proposed protocols. When the transceiver hardware is perfect, we derive exact closed-form expressions of secrecy outage probability (SOP) for the proposed protocols over Rayleigh fading channel. We then perform Monte Carlo based computer simulations to verify the theoretical results.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Wyner, A.D.: The wire-tap channel. AT&T Bell Labs. Tech. J. 54(8), 1355–1387 (1975)

    Article  MathSciNet  MATH  Google Scholar 

  2. Gopala, P.K., Lai, L., Gamal, H.E.: On the secrecy capacity of fading channels. IEEE Trans. Inf. Theory 54(10), 4687–4698 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  3. Krikidis, I.: Opportunistic relay selection for cooperative networks with secrecy constraints. IET Commun. 4(15), 1787–1791 (2010)

    Article  Google Scholar 

  4. Krikidis, I., Thompson, J., Mclaughlin, S.: Relay selection for secure cooperative networks with jamming. IEEE Trans. Wirel. Commun. 8(10), 5003–5011 (2009)

    Article  Google Scholar 

  5. Mo, J., Tao, M., Liu, Y.: Relay placement for physical layer security: a secure connection perspective. IEEE Commun. Lett. 16(6) (2012)

    Google Scholar 

  6. Duy, T.T., Son, P.N.: Secrecy performances of multicast underlay cognitive protocols with partial relay selection and without eavesdropper’s information. KSII Trans. Internet Inf. Syst. (TIIS) 9(11), 4623–4643 (2015)

    Google Scholar 

  7. Duong, T.Q., Duy, T.T., Elkashlan, M., Tran, N.H., Dobre, O.A.: Secured cooperative cognitive radio networks with relay selection. In: IEEE Global Communications Conference (Globecom 2014), Austin, TX USA, pp. 3074–3079, December 2014

    Google Scholar 

  8. Liu, Y., Wang, L., Duy, T.T., Elkashlan, M., Duong, T.Q.: Relay selection for security enhancement in cognitive relay networks. IEEE Wirel. Commun. Lett. 4(1), 46–49 (2015)

    Article  Google Scholar 

  9. Duy, T.T., Duong, T.Q., Thanh, T.L., Bao, V.N.Q.: Secrecy performance analysis with relay selection methods under impact of co-channel interference. IET Commun. 9(11), 1427–1435 (2015)

    Article  Google Scholar 

  10. Duy, T.T., Kong, H.Y.: Secrecy performance analysis of multihop transmission protocols in cluster networks. Wirel. Pers. Commun. (WPC) 82(4), 2505–2518 (2015)

    Article  Google Scholar 

  11. Duy, T.T., Duong, T.Q., da Costa, D.B., Bao, V.N.Q., Elkashlan, M.: Proactive relay selection with joint impact of hardware impairment and co-channel interference. IEEE Trans. Commun. 63(5), 1594–1606 (2015)

    Article  Google Scholar 

Download references

Acknowledgments

This research is funded by Vietnam National Foundation for Science and Technology Development (NAFOSTED) under grant number 102.01-2014.33.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Phu Tran Tin .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Tin, P.T., Duy, T.T., Tran, P.T., Voznak, M. (2017). Secrecy Performance of Joint Relay and Jammer Selection Methods in Cluster Networks: With and Without Hardware Noises. In: Duy, V., Dao, T., Kim, S., Tien, N., Zelinka, I. (eds) AETA 2016: Recent Advances in Electrical Engineering and Related Sciences. AETA 2016. Lecture Notes in Electrical Engineering, vol 415. Springer, Cham. https://doi.org/10.1007/978-3-319-50904-4_78

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-50904-4_78

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-50903-7

  • Online ISBN: 978-3-319-50904-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics