Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3631726.3631741acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
short-paper

Physical Layer Security in Air-To-Underwater Untrusted Relay Networks

Published: 12 June 2024 Publication History

Abstract

In air-to-underwater communications, a two-untrusted-relay transmission scheme is introduced utilizing lossy-forward (LF) relaying. In this setup, two untrusted relays are utilized between an airborne source and an underwater destination for air-to-underwater scenarios, with no direct link between them. Leveraging the unique characteristics of LF relaying, which accepts intra-link errors and consistently forwards decoded sequences from relays to the destination, it ensures reliable and secure data transmission in decoder-and-forward-based networks. To gauge the efficacy of this network design in ensuring security and reliability, a metric termed reliable-and-secure probability is formulated. This metric measures the probability that the underwater destination can successfully retrieve the original message from the airborne source, while ensuring that the untrusted relays remain unaware. Intriguingly, our findings suggest that by maintaining a balanced power distribution between the airborne source and underwater relays, a commendable level of the reliable-and-secure probability can be achieved.

References

[1]
Mohammed Amer and Yasser Al-Eryani. 2019. Underwater Optical Communication System Relayed by α − μ Fading Channel: Outage, Capacity and Asymptotic Analysis. arxiv:1911.04243 [cs.IT]
[2]
Lun Dong, Zhu Han, Athina P. Petropulu, and H. Vincent Poor. 2010. Improving Wireless Physical Layer Security via Cooperating Relays. IEEE Transactions on Signal Processing 58, 3 (2010), 1875–1888. https://doi.org/10.1109/TSP.2009.2038412
[3]
Chen Feng, Hui-Ming Wang, and H. Vincent Poor. 2022. Reliable and Secure Short-Packet Communications. IEEE Transactions on Wireless Communications 21, 3 (2022), 1913–1926. https://doi.org/10.1109/TWC.2021.3108042
[4]
Jiguang He, Valtteri Tervo, Xiaobo Zhou, Xin He, Shen Qian, Meng Cheng, Markku Juntti, and Tad Matsumoto. 2019. A Tutorial on Lossy Forwarding Cooperative Relaying. IEEE Communications Surveys & Tutorials 21, 1 (2019), 66–87. https://doi.org/10.1109/COMST.2018.2866711
[5]
Xin He, Xiaobo Zhou, Petri Komulainen, Markku Juntti, and Tad Matsumoto. 2016. A Lower Bound Analysis of Hamming Distortion for a Binary CEO Problem With Joint Source-Channel Coding. IEEE Transactions on Communications 64, 1 (2016), 343–353. https://doi.org/10.1109/TCOMM.2015.2499179
[6]
Sai Li, Liang Yang, Daniel Benevides da Costa, and Siyuan Yu. 2021. Performance Analysis of UAV-Based Mixed RF-UWOC Transmission Systems. IEEE Transactions on Communications 69, 8 (2021), 5559–5572. https://doi.org/10.1109/TCOMM.2021.3076790
[7]
Yi Lou, Ruofan Sun, Julian Cheng, Gang Qiao, and Jinlong Wang. 2022. Physical-Layer Security for UAV-Assisted Air-to-Underwater Communication Systems with Fixed-Gain Amplify-and-Forward Relaying. Drones 6, 11 (2022). https://doi.org/10.3390/drones6110341
[8]
Lu Lv, Hai Jiang, Zhiguo Ding, Long Yang, and Jian Chen. 2020. Secrecy-Enhancing Design for Cooperative Downlink and Uplink NOMA With an Untrusted Relay. IEEE Transactions on Communications 68, 3 (2020), 1698–1715. https://doi.org/10.1109/TCOMM.2019.2960345
[9]
Shen Qian. 2023. Reliable and Secure Short-Packet Communications in Untrusted Diamond Relay Networks. IEEE Access 11 (2023), 24686–24695. https://doi.org/10.1109/ACCESS.2023.3255881
[10]
Wei Yang, Rafael F. Schaefer, and H. Vincent Poor. 2019. Wiretap Channels: Nonasymptotic Fundamental Limits. IEEE Transactions on Information Theory 65, 7 (2019), 4069–4093. https://doi.org/10.1109/TIT.2019.2904500
[11]
Shuangrui Zhao, Jia Liu, Yulong Shen, Xiaohong Jiang, and Norio Shiratori. 2021. Secure and Energy-Efficient Precoding for MIMO Two-Way Untrusted Relay Systems. IEEE Transactions on Information Forensics and Security 16 (2021), 3371–3386. https://doi.org/10.1109/TIFS.2021.3080088
[12]
Xiaobo Zhou, Na Yi, Xin He, Jiancao Hou, Tad Matsumoto, Szymon Szott, Diana Gonzales, Albrecht Wolf, Maximilian Matthe, Sebastian Kuhlmorgen, and Olayinka Adigun. 2015. ICT-619555 RESCUE Deliverable D1.2.1-Assessmenton Feasibility, Achievability, and Limits. Technical Report (2015).

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
WUWNet '23: Proceedings of the 17th International Conference on Underwater Networks & Systems
November 2023
239 pages
ISBN:9798400716744
DOI:10.1145/3631726
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 12 June 2024

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. CEO problem
  2. physical layer security
  3. reliable-and-secure probability
  4. underwater communications

Qualifiers

  • Short-paper
  • Research
  • Refereed limited

Funding Sources

  • Japan Society for the Promotion of Science

Conference

WUWNet 2023

Acceptance Rates

Overall Acceptance Rate 84 of 180 submissions, 47%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 8
    Total Downloads
  • Downloads (Last 12 months)8
  • Downloads (Last 6 weeks)1
Reflects downloads up to 23 Sep 2024

Other Metrics

Citations

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media