Abstract
Cooperative system is a tendency for the future communications because of its spatial diversity to improve the system performance. However, the security is a critical issue in the wireless application with a highly private request. Although the encryption schemes have been proposed to approach the secure purpose, those schemes need a lot of computing resource. It is not practical for the applications with a limited computing ability, such as IoT. According to Shannon theory of perfect secrecy, the security could be implemented on the physical layer. Based on the positive secrecy rate, the secure communication could be practical. This work concentrates on the theoretical solution to the secrecy rate in the AF mode cooperative communication system. Also, the numerical results are given. It shows the effects of eavesdropper could not affect the secure communication if the number of the eavesdropper is less than that of relays in the system. The appropriate relay assignment benefits the secure communication.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Singh R, Manu MS (2017) An energy efficient grid based static node deployment strategy for wireless sensor networks. Int J Electron Inf Eng 7(1):32–40
Rana A, Sharma D (2018) Mobile ad-hoc clustering using inclusive particle swarm optimization algorithm. Int J Electron Inf Eng 8(1):1–8
Chen X, Lei L, Zhang H, Yuen C (2015) Large-scale MIMO relaying techniques for physical layer security: AF or DF? IEEE Trans Wirel Commun 14(9):5135–5146
Nosratinia A, Hunter TE, Hedayat A (2004) Cooperative communication in wireless networks. IEEE Commun Mag 42(10):74–80
Agarwal S, Kansal T (2016) Congestion control schemes in ATM networks for ABR services: an overview. Int J Electron Inf Eng 5(2):57–67
Kramer G, Gastpar M, Gupta P (2005) Cooperative strategies and capacity theorems for relay networks. IEEE Trans Inf Theory 51(9):3037–3063
Wang Y, Noubir G (2013) Distributed cooperation and diversity for hybrid wireless networks. IEEE Trans Mobile Comput 12(3):596–608
Bletsas A, Shin H, Win MZ (2007) Outage analysis for cooperative communication with multiple amplify and forward relays. Electron Lett 43(6):51–52
Yang CY, Lin YS, Wen JH (2014) Greedy algorithm applied relay selection for cooperative communication systems in amplify-and-forward mode. J Electron Sci Technol 12(1):49–53
Choudhury H, Roychoudhury B, Saikia DKr (2016) Security extension for relaxed trust requirement in non3GPP access to the EPS hiten Choudhury. Int J Netw Secur 18(6):1041–1053
He L, Chen Y, Hu X, Qin Z (2017) An efficient and provably secure certificateless key insulated encryption with applications to mobile internet. Int J Netw Secur 19(6):940–949
Chiou SY, Ko WT, Lu EH (2018) A secure ECC-based mobile RFID mutual authentication protocol and its application. Int J Netw Secur 20(2):396–402
Arthi K, Reddy MC (2017) A secure and efficient privacy-preserving attribute matchmaking protocol for mobile social networks. Int J Netw Secur 19(3):421–429
Ngoc LT, Tu VT (2017) Whirlwind: a new method to attack routing protocol in mobile ad hoc network. Int J Netw Secur 19(5):832–838
Kothmayr T, Schmitt C, Hu W, Brünig M, Carle G (2013) DTLS based security and two-way authentication for the Internet of Things. Ad Hoc Netw 11(8):2710–2723
Hou G, Wang Z (2017) A robust and efficient remote authentication scheme from elliptic curve cryptosystem. Int J Netw Secur 19(6):904–911
Qian Q, Jia YL, Zhang R (2016) A lightweight RFID security protocol based on elliptic curve cryptography. Int J Netw Secur 18(2):354–361
Zhang X, Wang B, Wang W (2018) A new remote authentication scheme for anonymous users using elliptic curves cryptosystem. Int J Netw Secur 20(2):390–395
Han L, Xie Q, Liu W (2017) An improved biometric based authentication scheme with user anonymity using elliptic curve cryptosystem. Int J Netw Secur 19(3):469–478
Ng DWK, Lo ES, Schober R (2014) Robust beamforming for secure communication in systems with wireless information and power transfer. IEEE Trans Wirel Commun 13(8):4599–4615
Goswami S, Hoque N, Bhattacharyya DK, Kalita J (2017) An unsupervised method for detection of XSS attack. Int J Netw Secur 19(5):761–775
Srichavengsup W, San-Um W (2016) Data encryption scheme based on rules of cellular automata and chaotic map function for information security. Int J Netw Secur 18(6):1130–1142
Xu D, Wu Z, Wu Z, Zhang Q, Qin L, Zhou J (2015) Internet of Things: hotspot-based discovery service architecture with security mechanism. Int J Netw Secur 17(2):208–216
Porambage P, Schmitt C, Kumar P, Gurtov A, Ylianttila M (2014) Two-phase authentication protocol for wireless sensor networks in distributed IoT applications. In: Proceedings of the 2014 IEEE wireless communications and networking conference, Istanbul, Turkey, pp 2728–2733
Mayzaud A, Badonnel R, Chrisment I (2016) A taxonomy of attacks in RPL-based internet of things. Int J Netw Secur 18(3):459–473
Ma Y (2017) NFC communications-based mutual authentication scheme for the Internet of Things. Int J Netw Secur 19(4):631–638
Bloch M, Barros J (2011) Physical-layer security from information theory to security engineering. Cambridge
Tai WL, Chang YF (2017) Comments on a secure authentication scheme for IoT and cloud servers. Int J Netw Secur 19(4):648–651
Zou Y, Zhu J, Wang X, Leung V (2015) Improving physical-layer security in wireless communications using diversity techniques. IEEE Netw 29(1):42–48
Wang Q, Zhang H, Lyu Q, Wang X, Bao J (2018) A novel physical channel characteristics-based channel hopping scheme for jamming-resistant in wireless communication. Int J Netw Secur 20(3):439–446
Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 29:656–715
Barros J, Rodrigues MR (2016) Secrecy capacity of wireless channels. In: Proceedings of 2006 IEEE international symposium on information theory, pp 356–360
Chen JS, Yang CY, Hwang MS (2017) The capacity analysis in the secure cooperative communication system. Int J Netw Secur 19(6):863–869
Acknowledgements
This research was partially supported by the Ministry Of Science and Technology, Taiwan (ROC), under contract no.: MOST 106-2221-E-845-001.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Liang, HY., Yang, CY., Hwang, MS. (2019). Secrecy Analysis in the AF Mode Cooperative Communication System. In: Kim, K., Baek, N. (eds) Information Science and Applications 2018. ICISA 2018. Lecture Notes in Electrical Engineering, vol 514. Springer, Singapore. https://doi.org/10.1007/978-981-13-1056-0_30
Download citation
DOI: https://doi.org/10.1007/978-981-13-1056-0_30
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-1055-3
Online ISBN: 978-981-13-1056-0
eBook Packages: EngineeringEngineering (R0)