Secure Algorithm via Hybrid Relaying Scheme and Resource Allocation for OFDM Networks

  • Xianwen Zhou
  • Pinyi Ren
  • Qinghe Du
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 237)


Due to its high spectrum efficiency, strong ability to resist multipath fading, OFDM networks is widely applied in various wireless communication systems. However, physical layer security is also an important problem in OFDM networks. By using relay nodes, the secrecy outage probability can be reduced since relay nodes could increase freedoms of optimization for the cooperative OFDM networks. By optimizing multiple variables, which includes adaptive hybrid relaying scheme, relay selection, and resource allocation, we propose the secure algorithm which aims at minimizing the secrecy outage probability of multiuser in cooperative OFDM networks. To achieve this goal, we establish an optimization problem including multiple optimization variables. Then, we convert the optimization problem into a graph theory problem. Simulation results show that the secure algorithm can significantly reduce the secrecy outage probability of multiuser in cooperative OFDM networks.


Physical layer security Hybrid relaying scheme Resource allocation Cooperative OFDM networks 


  1. 1.
    Shannon, C.E.: Communication theory of secrecy systems. Bell Syst. Tech. J. 28(4), 656–715 (1949)MathSciNetCrossRefzbMATHGoogle Scholar
  2. 2.
    Wyner, A.D.: The wire-tap channel. Bell Syst. Tech. J. 54(8), 1355–1387 (1975)MathSciNetCrossRefzbMATHGoogle Scholar
  3. 3.
    Li, J., Petropulu, A.P., Weber, S.: Optimal cooperative relaying schemes for improving wireless physical layer security. IEEE Trans. Sig. Process. 59(10), 4985–4997 (2011)CrossRefGoogle Scholar
  4. 4.
    Yang, Y., Li, Q., Ma, W.K., Ge, J.: Cooperative secure beamforming for AF relay networks with multiple eavesdroppers. IEEE Sig. Process. Lett. 20(1), 35–38 (2013)CrossRefGoogle Scholar
  5. 5.
    Dong, L., Han, Z., Petropulu, A.P., Poor, H.V.: Improving wireless physical layer security via cooperating relays. IEEE Trans. Sig. Process. 58(3), 1875–1888 (2010)MathSciNetCrossRefGoogle Scholar
  6. 6.
    Goeckel, D., Vasudevan, S., Towsley, D., Adams, S.: Artificial noise generation from cooperative relays for everlasting secrecy in two-hop wireless networks. IEEE J. Sel. Areas Commun. 29(10), 2067–2076 (2011)CrossRefGoogle Scholar
  7. 7.
    Gamal, H.E., Lai, L.: The relay-eavesdropper channel: cooperation for secrecy. In: IEEE International Symposium on Information Theory, pp. 931–935 (2012)Google Scholar
  8. 8.
    Mo, J., Tao, M., Liu, Y.: Relay placement for physical layer security: a secure connection perspective. IEEE Commun. Lett. 16(6), 878–881 (2012)CrossRefGoogle Scholar
  9. 9.
    Cai, C., Cai, Y., Wang, R., Yang, W.: Resource allocation for physical layer security in cooperative OFDM networks. In: IEEE International Conference on Wireless Communications Signal Processing, pp. 1–5 (2015)Google Scholar
  10. 10.
    Jeong, C., Kim, I.M.: Optimal power allocation for secure multicarrier relay systems. IEEE Trans. Sig. Process. 59(11), 5428–5442 (2011)MathSciNetCrossRefGoogle Scholar
  11. 11.
    Ng, D.W.K., Lo, E.S., Schober, R.: Secure resource allocation and scheduling for OFDMA decode-and-forward relay networks. IEEE Trans. Wirel. Commun. 10(10), 3528–3540 (2011)CrossRefGoogle Scholar
  12. 12.
    Cai, C., Cai, Y., Yang, W.: Subcarrier allocation for physical-layer security in cooperative OFDMA networks. IEICE Trans. Commun. 94(12), 3387–3390 (2011)CrossRefGoogle Scholar
  13. 13.
    Divya, T., Gurrala, K.K., Das, S.: Performance analysis of hybrid decode-amplify-forward (HDAF) relaying for improving security in cooperative wireless network. In: Communication Technologies, pp. 682–687 (2015)Google Scholar
  14. 14.
    Chen, H., Liu, J., Zhai, C., Zheng, L.: Performance analysis of SNR-based hybrid decode-amplify-forward cooperative diversity networks over rayleigh fading channels. In: Wireless Communications and Networking Conference, pp. 1–6 (2010)Google Scholar
  15. 15.
    Duong, T.Q., Zepernick, H.: Hybrid decode-amplify-forward cooperative communications with multiple relays. IEEE Trans. Sig. Process. 273–278 (2009)Google Scholar
  16. 16.
    Duong, T.Q., Zepernick, H.J.: On the performance gain of hybrid decode-amplify-forward cooperative communications. EURASIP J. Wirel. Commun. Netw. 2009, 1–10 (2009)CrossRefGoogle Scholar
  17. 17.
    Chen, H. Ren, P., Sun, L., Du, Q.: A joint optimization of transmission mode selection and resource allocation for cognitive relay networks. In: 2013 IEEE International Conference on Communications (ICC), pp. 2852–2856 (2013)Google Scholar
  18. 18.
    Koide, T., Kubo, H., Watanabe, H.: A study on the tie-set graph theory and network flow optimization problems. Int. J. Circ. Theory Appl. 32(6), 447–470 (2004)CrossRefzbMATHGoogle Scholar

Copyright information

© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2018

Authors and Affiliations

  1. 1.School of Electronic and Information EngineeringXi’an Jiaotong UniversityXi’anChina

Personalised recommendations