Virtual full-duplex buffer-aided relay selection schemes for secure cooperative wireless networks
This paper considers secure communication in buffer-aided cooperative wireless networks in the presence of one eavesdropper, which can intercept the data transmission from both the source and relay nodes. It is assumed that the relays employ the randomize-and-forward (RF) strategy such that the eave...
Saved in:
Published in: | EURASIP journal on wireless communications and networking Vol. 2022; no. 1; pp. 1 - 34 |
---|---|
Main Authors: | , , |
Format: | Journal Article |
Language: | English |
Published: |
Cham
Springer International Publishing
12-05-2022
Springer Nature B.V SpringerOpen |
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | This paper considers secure communication in buffer-aided cooperative wireless networks in the presence of one eavesdropper, which can intercept the data transmission from both the source and relay nodes. It is assumed that the relays employ the randomize-and-forward (RF) strategy such that the eavesdropper can only decode the signals received in the two hops independently. Two cooperative secure transmission schemes, i.e., hybrid imitating full-duplex max-max-ratio relay selection (HyIFD) scheme and threshold-based link selection (TBLS) scheme are proposed for adaptive- and fixed-rate transmissions aiming at improving the secrecy throughput and secrecy outage probability, respectively. For adaptive-rate transmissions (ART), the proposed scheme switches among three sub-strategies according to different conditions such as the number of relays and transmit power. Different relays are chosen for reception and transmission according to the ratio of the legitimate channels to the eavesdropper channels to imitate the full-duplex transmission mode. For fixed-rate transmissions (FRT), a hybrid HD/FD transmission mode is designed to increase the transmission probabilities of two hops under the transmission quality constraint. Two parameters are introduced and optimized to minimize the secrecy outage probability. A sub-optimal TBLS (SO-TBLS) scheme is also given. Theoretical analysis of the secrecy throughput and the secrecy outage probability are provided and the closed-form expressions are derived, and verified by numerical results. It is shown that the proposed schemes outperform benchmark schemes in terms of secrecy throughput and secrecy outage probability. |
---|---|
ISSN: | 1687-1499 1687-1472 1687-1499 |
DOI: | 10.1186/s13638-022-02127-1 |