Nothing Special   »   [go: up one dir, main page]

Skip to main content

Secrecy Analysis in the AF Mode Cooperative Communication System

  • Conference paper
  • First Online:
Information Science and Applications 2018 (ICISA 2018)

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 514))

Included in the following conference series:

Abstract

Cooperative system is a tendency for the future communications because of its spatial diversity to improve the system performance. However, the security is a critical issue in the wireless application with a highly private request. Although the encryption schemes have been proposed to approach the secure purpose, those schemes need a lot of computing resource. It is not practical for the applications with a limited computing ability, such as IoT. According to Shannon theory of perfect secrecy, the security could be implemented on the physical layer. Based on the positive secrecy rate, the secure communication could be practical. This work concentrates on the theoretical solution to the secrecy rate in the AF mode cooperative communication system. Also, the numerical results are given. It shows the effects of eavesdropper could not affect the secure communication if the number of the eavesdropper is less than that of relays in the system. The appropriate relay assignment benefits the secure communication.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 229.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 299.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 299.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Singh R, Manu MS (2017) An energy efficient grid based static node deployment strategy for wireless sensor networks. Int J Electron Inf Eng 7(1):32–40

    Google Scholar 

  2. Rana A, Sharma D (2018) Mobile ad-hoc clustering using inclusive particle swarm optimization algorithm. Int J Electron Inf Eng 8(1):1–8

    Google Scholar 

  3. Chen X, Lei L, Zhang H, Yuen C (2015) Large-scale MIMO relaying techniques for physical layer security: AF or DF? IEEE Trans Wirel Commun 14(9):5135–5146

    Article  Google Scholar 

  4. Nosratinia A, Hunter TE, Hedayat A (2004) Cooperative communication in wireless networks. IEEE Commun Mag 42(10):74–80

    Article  Google Scholar 

  5. Agarwal S, Kansal T (2016) Congestion control schemes in ATM networks for ABR services: an overview. Int J Electron Inf Eng 5(2):57–67

    Google Scholar 

  6. Kramer G, Gastpar M, Gupta P (2005) Cooperative strategies and capacity theorems for relay networks. IEEE Trans Inf Theory 51(9):3037–3063

    Article  MathSciNet  Google Scholar 

  7. Wang Y, Noubir G (2013) Distributed cooperation and diversity for hybrid wireless networks. IEEE Trans Mobile Comput 12(3):596–608

    Article  Google Scholar 

  8. Bletsas A, Shin H, Win MZ (2007) Outage analysis for cooperative communication with multiple amplify and forward relays. Electron Lett 43(6):51–52

    Article  Google Scholar 

  9. Yang CY, Lin YS, Wen JH (2014) Greedy algorithm applied relay selection for cooperative communication systems in amplify-and-forward mode. J Electron Sci Technol 12(1):49–53

    Google Scholar 

  10. Choudhury H, Roychoudhury B, Saikia DKr (2016) Security extension for relaxed trust requirement in non3GPP access to the EPS hiten Choudhury. Int J Netw Secur 18(6):1041–1053

    Google Scholar 

  11. He L, Chen Y, Hu X, Qin Z (2017) An efficient and provably secure certificateless key insulated encryption with applications to mobile internet. Int J Netw Secur 19(6):940–949

    Google Scholar 

  12. Chiou SY, Ko WT, Lu EH (2018) A secure ECC-based mobile RFID mutual authentication protocol and its application. Int J Netw Secur 20(2):396–402

    Google Scholar 

  13. Arthi K, Reddy MC (2017) A secure and efficient privacy-preserving attribute matchmaking protocol for mobile social networks. Int J Netw Secur 19(3):421–429

    Google Scholar 

  14. Ngoc LT, Tu VT (2017) Whirlwind: a new method to attack routing protocol in mobile ad hoc network. Int J Netw Secur 19(5):832–838

    Google Scholar 

  15. Kothmayr T, Schmitt C, Hu W, Brünig M, Carle G (2013) DTLS based security and two-way authentication for the Internet of Things. Ad Hoc Netw 11(8):2710–2723

    Article  Google Scholar 

  16. Hou G, Wang Z (2017) A robust and efficient remote authentication scheme from elliptic curve cryptosystem. Int J Netw Secur 19(6):904–911

    Google Scholar 

  17. Qian Q, Jia YL, Zhang R (2016) A lightweight RFID security protocol based on elliptic curve cryptography. Int J Netw Secur 18(2):354–361

    Google Scholar 

  18. Zhang X, Wang B, Wang W (2018) A new remote authentication scheme for anonymous users using elliptic curves cryptosystem. Int J Netw Secur 20(2):390–395

    Google Scholar 

  19. Han L, Xie Q, Liu W (2017) An improved biometric based authentication scheme with user anonymity using elliptic curve cryptosystem. Int J Netw Secur 19(3):469–478

    Google Scholar 

  20. Ng DWK, Lo ES, Schober R (2014) Robust beamforming for secure communication in systems with wireless information and power transfer. IEEE Trans Wirel Commun 13(8):4599–4615

    Article  Google Scholar 

  21. Goswami S, Hoque N, Bhattacharyya DK, Kalita J (2017) An unsupervised method for detection of XSS attack. Int J Netw Secur 19(5):761–775

    Google Scholar 

  22. Srichavengsup W, San-Um W (2016) Data encryption scheme based on rules of cellular automata and chaotic map function for information security. Int J Netw Secur 18(6):1130–1142

    Google Scholar 

  23. Xu D, Wu Z, Wu Z, Zhang Q, Qin L, Zhou J (2015) Internet of Things: hotspot-based discovery service architecture with security mechanism. Int J Netw Secur 17(2):208–216

    Google Scholar 

  24. Porambage P, Schmitt C, Kumar P, Gurtov A, Ylianttila M (2014) Two-phase authentication protocol for wireless sensor networks in distributed IoT applications. In: Proceedings of the 2014 IEEE wireless communications and networking conference, Istanbul, Turkey, pp 2728–2733

    Google Scholar 

  25. Mayzaud A, Badonnel R, Chrisment I (2016) A taxonomy of attacks in RPL-based internet of things. Int J Netw Secur 18(3):459–473

    Google Scholar 

  26. Ma Y (2017) NFC communications-based mutual authentication scheme for the Internet of Things. Int J Netw Secur 19(4):631–638

    Google Scholar 

  27. Bloch M, Barros J (2011) Physical-layer security from information theory to security engineering. Cambridge

    Google Scholar 

  28. Tai WL, Chang YF (2017) Comments on a secure authentication scheme for IoT and cloud servers. Int J Netw Secur 19(4):648–651

    Google Scholar 

  29. Zou Y, Zhu J, Wang X, Leung V (2015) Improving physical-layer security in wireless communications using diversity techniques. IEEE Netw 29(1):42–48

    Article  Google Scholar 

  30. Wang Q, Zhang H, Lyu Q, Wang X, Bao J (2018) A novel physical channel characteristics-based channel hopping scheme for jamming-resistant in wireless communication. Int J Netw Secur 20(3):439–446

    Google Scholar 

  31. Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 29:656–715

    Article  MathSciNet  Google Scholar 

  32. Barros J, Rodrigues MR (2016) Secrecy capacity of wireless channels. In: Proceedings of 2006 IEEE international symposium on information theory, pp 356–360

    Google Scholar 

  33. Chen JS, Yang CY, Hwang MS (2017) The capacity analysis in the secure cooperative communication system. Int J Netw Secur 19(6):863–869

    Google Scholar 

Download references

Acknowledgements

This research was partially supported by the Ministry Of Science and Technology, Taiwan (ROC), under contract no.: MOST 106-2221-E-845-001.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Min-Shiang Hwang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Liang, HY., Yang, CY., Hwang, MS. (2019). Secrecy Analysis in the AF Mode Cooperative Communication System. In: Kim, K., Baek, N. (eds) Information Science and Applications 2018. ICISA 2018. Lecture Notes in Electrical Engineering, vol 514. Springer, Singapore. https://doi.org/10.1007/978-981-13-1056-0_30

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-1056-0_30

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-1055-3

  • Online ISBN: 978-981-13-1056-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics