Virtual full-duplex buffer-aided relay selection schemes for secure cooperative wireless networks

This paper considers secure communication in buffer-aided cooperative wireless networks in the presence of one eavesdropper, which can intercept the data transmission from both the source and relay nodes. It is assumed that the relays employ the randomize-and-forward (RF) strategy such that the eave...

Full description

Saved in:
Bibliographic Details
Published in:EURASIP journal on wireless communications and networking Vol. 2022; no. 1; pp. 1 - 34
Main Authors: Zhou, Jiayu, Qiao, Deli, Qian, Haifeng
Format: Journal Article
Language:English
Published: Cham Springer International Publishing 12-05-2022
Springer Nature B.V
SpringerOpen
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:This paper considers secure communication in buffer-aided cooperative wireless networks in the presence of one eavesdropper, which can intercept the data transmission from both the source and relay nodes. It is assumed that the relays employ the randomize-and-forward (RF) strategy such that the eavesdropper can only decode the signals received in the two hops independently. Two cooperative secure transmission schemes, i.e., hybrid imitating full-duplex max-max-ratio relay selection (HyIFD) scheme and threshold-based link selection (TBLS) scheme are proposed for adaptive- and fixed-rate transmissions aiming at improving the secrecy throughput and secrecy outage probability, respectively. For adaptive-rate transmissions (ART), the proposed scheme switches among three sub-strategies according to different conditions such as the number of relays and transmit power. Different relays are chosen for reception and transmission according to the ratio of the legitimate channels to the eavesdropper channels to imitate the full-duplex transmission mode. For fixed-rate transmissions (FRT), a hybrid HD/FD transmission mode is designed to increase the transmission probabilities of two hops under the transmission quality constraint. Two parameters are introduced and optimized to minimize the secrecy outage probability. A sub-optimal TBLS (SO-TBLS) scheme is also given. Theoretical analysis of the secrecy throughput and the secrecy outage probability are provided and the closed-form expressions are derived, and verified by numerical results. It is shown that the proposed schemes outperform benchmark schemes in terms of secrecy throughput and secrecy outage probability.
ISSN:1687-1499
1687-1472
1687-1499
DOI:10.1186/s13638-022-02127-1