The search functionality is under construction.

IEICE TRANSACTIONS on Communications

Security Performance Analysis for Relay Selection in Cooperative Communication System under Nakagami-m Fading Channel

Guangna ZHANG, Yuanyuan GAO, Huadong LUO, Nan SHA, Shijie WANG, Kui XU

  • Full Text Views

    0

  • Cite this

Summary :

In this paper, we investigate a cooperative communication system comprised of a source, a destination, and multiple decode-and-forward (DF) relays in the presence of a potential malicious eavesdropper is within or without the coverage area of the source. Based on the more general Nakagami-m fading channels, we analyze the security performance of the single-relay selection and multi-relay selection schemes for protecting the source against eavesdropping. In the single-relay selection scheme, only the best relay is chosen to assist in the source transmission. Differing from the single-relay selection, multi-relay selection scheme allows multiple relays to forward the source to the destination. We also consider the classic direct transmission as a benchmark scheme to compare with the two relay selection schemes. We derive the exact closed-form expressions of outage probability (OP) and intercept probability (IP) for the direct transmission, the single-relay selection as well as the multi-relay selection scheme over Nakagami-m fading channel when the eavesdropper is within and without the coverage area of the source. Moreover, the security-reliability tradeoff (SRT) of these three schemes are also analyzed. It is verified that the SRT of the multi-relay selection consistently outperforms the single-relay selection, which of both the single-relay and multi-relay selection schemes outperform the direct transmission when the number of relays is large, no matter the eavesdropper is within or without the coverage of the source. In addition, as the number of DF relays increases, the SRT of relay selection schemes improve notably. However, the SRT of both two relay selection approaches become worse when the eavesdropper is within the coverage area of the source.

Publication
IEICE TRANSACTIONS on Communications Vol.E102-B No.3 pp.603-612
Publication Date
2019/03/01
Publicized
2018/09/14
Online ISSN
1745-1345
DOI
10.1587/transcom.2018EBP3153
Type of Manuscript
PAPER
Category
Wireless Communication Technologies

Authors

Guangna ZHANG
  Graduate School of PLA Army Engineering University
Yuanyuan GAO
  Graduate School of PLA Army Engineering University
Huadong LUO
  Graduate School of PLA Army Engineering University
Nan SHA
  Graduate School of PLA Army Engineering University
Shijie WANG
  Graduate School of PLA Army Engineering University
Kui XU
  Graduate School of PLA Army Engineering University

Keyword