Secure and Reliable Transmission with Cooperative Relays in Two-Hop Wireless Networks

  • Yulong Shen
  • Xiaohong Jiang
  • Jianfeng Ma
  • Weisong Shi
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 253)


This work considers the secure and reliable information transmission in two-hop relay wireless networks without the information of both eavesdropper channels and locations. This papers focuses on a more practical network with finite number of system nodes and explores the corresponding exact results on the number of eavesdroppers the network can tolerant to ensure a desired secrecy and reliability. For achieving secure and reliable information transmission in a finite network, two transmission protocols are considered in this paper, one adopts an optimal but complex relay selection process with less load balance capacity while the other adopts a random but simple relay selection process with good load balance capacity. Theoretical analysis is further provided to determine the exact and maximum number of independent and also uniformly distributed eavesdroppers one network can tolerate to satisfy a specified secrecy and reliability requirements.


Two-hop wireless networks Physical layer secrecy Relay cooperation Transmission outage Secrecy outage 


  1. 1.
    Narayanan S (2006) Two-hop forwarding in wireless networks. Dissertation for the degree of Doctor of philosophy, Polytechnic UniversityGoogle Scholar
  2. 2.
    Talbot J, Welsh D (2006) Complexity and crytography: an introduction. Cambridge University Press, CambridgeGoogle Scholar
  3. 3.
    Morrison K, Goeckel D (2011) Power allocation to noise-generating nodes for cooperative secrecy in the wireless environment. In: 45th Asilomar conference on signals, systems and computers (ASILOMAR), pp 275–279Google Scholar
  4. 4.
    Goel S, Negi R (2008) Guaranteeing secrecy using artificial noise. IEEE Trans Wireless Commun 7(6):2180–2189CrossRefGoogle Scholar
  5. 5.
    Lai L, El Gamal H (2008) The relay-eavesdropper channel: cooperation for secrecy. IEEE Trans Inform Theory 54(9):4005–4019Google Scholar
  6. 6.
    Yuksel M, Erkip E (2007) Secure communication with a relay helping the wiretapper. In: Proceedings of 2007 IEEE information theory workshop, Lake Tahoe, CAGoogle Scholar
  7. 7.
    Negi R, Goelm S (2005) Secret communication using artificial noise. In: Proceedings of the IEEE Vehicular Tech. Conf, vol 3, Dallas TX, pp 1906–1910Google Scholar
  8. 8.
    Vasudevan S, Adams S, Geockel D, Ding Z, Towsley D, Leung K (2009) Multi-user diversity for secrecy in wireless networks. In: Information theorem and applications workshopGoogle Scholar
  9. 9.
    He X, Yener A (2008) Two-hop secure communication using an untrusted relay: a case for cooperative jamming. In: Proceedings of 2008 IEEE global telecommunications conference, New Orleans, LAGoogle Scholar
  10. 10.
    Dong L, Han Z, Petropulu A, Poor HV (2010) Improving wireless physical layer security via cooperating relays. IEEE Trans Signal Proc 58(3):1875–1888CrossRefMathSciNetGoogle Scholar
  11. 11.
    Goeckel, Vasudevan S, Towsley D, Adams S, Ding Z, Leung K (2011) Artificial noise generation from cooperative relays for everlasting secrecy in two-hop wireless networks. IEEE J Sel Areas Commun 29(10):2067–2076CrossRefGoogle Scholar
  12. 12.
    Shen Y, Jiang X, Ma J (2013) Generalized secure transmission protocol for flexible load-balance control with cooperative relays in two-hop wireless networks. CoRR abs/1301.1746Google Scholar

Copyright information

© Springer Science+Business Media Dordrecht 2013

Authors and Affiliations

  • Yulong Shen
    • 1
  • Xiaohong Jiang
    • 2
  • Jianfeng Ma
    • 1
  • Weisong Shi
    • 3
  1. 1.School of Computer Science and TechnologyXidian UniversityXi’anChina
  2. 2.School of Systems Information ScienceFuture UniversityHakodateJapan
  3. 3.Department of Computer ScienceWayne State UniversityDetroitUSA

Personalised recommendations