Research Article
BibTex RIS Cite
Year 2019, Volume: 7 Issue: 3, 342 - 354, 30.07.2019
https://doi.org/10.17694/bajece.518904

Abstract

References

  • J. Daemen and V. Rijmen, “AES proposal: Rijndael,” 1999.
  • R. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Commun. of the ACM, vol. 21, pp. 120–126, 1978.
  • A. D.Wyner, “The wire-tap channel,” Bell. Syst. Tech. J., vol. 54, no. 8, p. 13551387, 1975.
  • C. Cai, Y. Cai, R. Wang, W. Yang, and W. Yang, “Resource allocation for physical layer security in cooperative OFDM networks,” in 2015 Intern. Conf. on Wireless Commun. Signal Processing (WCSP), Oct 2015, pp. 1–5.
  • C. Jeong and I. M. Kim, “Optimal power allocation for secure multicarrier relay systems,” IEEE Trans. on Signal Process., vol. 59, no. 11, pp. 5428–5442, Nov 2011.
  • H. Zhang, H. Xing, J. Cheng, A. Nallanathan, and V. C. M. Leung, “Secure resource allocation for OFDMA two-way relay wireless sensor networks without and with cooperative jamming,” IEEE Trans. on Indust. Informatics, vol. 12, no. 5, pp. 1714–1725, Oct 2016.
  • D. W. K. Ng, E. S. Lo, and R. Schober, “Secure resource allocation and scheduling for OFDMA decode-and-forward relay networks,” IEEE Trans. on Wireless Commun., vol. 10, no. 10, pp. 3528–3540, October 2011.
  • W. Aman, G. A. S. Sidhu, T. Jabeen, F. Gao, and S. Jin, “Enhancing physical layer security in dual-hop multiuser transmission,” in 2016 IEEE Wireless Commun. and Networking Conf., April 2016, pp. 1–6.
  • C. Cai, Y. Cai, and W. Yang, “Secrecy rates for relay selection in OFDMA networks,” in 2011 Third Intern. Conf. on Commun. and Mobile Comp., April 2011, pp. 158–160.
  • V. Ozduran, “Physical layer security of multi-user full-duplex one-way wireless relaying network,” in Advances in Wireless and Optical Communications (RTUWO’18), Riga, Latvia, 15- 16 November 2018.
  • E. Soleimani-Nasab, M. Matthaiou, M. Ardebilipour, and G. K. Karagiannidis, “Two-way AF relaying in the presence of co-channel interference,” IEEE Trans. on Commun., vol. 61, no. 8, pp. 3156–3169, August 2013.
  • V. Ozduran, E. Soleimani-Nasab, and B. S. Yarman, “Opportunistic source-pair selection for multi-user two-way amplify-and-forward wireless relaying networks,” IET Commun., vol. 10, no. 16, pp. 2106–2118, 2016.
  • A. Papoulis and U. Pillai, Probability, random variables and stochastic processes, 4th ed. McGraw-Hill, 11 2001.
  • I. S. Gradshteyn and I. M. Ryzhik, Tables of Integrals, Series and Products. Elsevier Inc., 7th edition, 2007.
  • V. S. Adamchik and O. I. Marichev, The algorithm for calculating integrals of hypergeometric type functions and its realization in REDUCE systems. Proc. Conf. ISSAC’90, Tokyo, pp. 212224, 1990.
  • N. H. Mahmood, I. S. Ansari, P. Popovski, P. Mogensen, and K. A. Qaraqe, “Physical-layer security with full-duplex transceivers and multiuser receiver at eve,” IEEE Trans. on Commun., vol. 65, no. 10, pp. 4392–4405, Oct 2017.

Secrecy Analysis of Multi-user Half/Full-Duplex Wireless Bi-directional Relaying Network

Year 2019, Volume: 7 Issue: 3, 342 - 354, 30.07.2019
https://doi.org/10.17694/bajece.518904

Abstract

This paper investigates the physical layer security of orthogonal frequency division multiplexing technique. The investigation considers a multi-user untrustworthy half/full-duplex based two-way wireless relay with a finite number of friendly jammers in the system model. According to Monte-Carlo simulation results, the system model that operates in full-duplex mode achieves slightly better secrecy outage performance than the system model that operates in half-duplex mode. The results also show that friendly jammers, besides minimizing the information leakage, degrade the system performance severely and cause system coding gain losses in high signal-to-noise ratios.

References

  • J. Daemen and V. Rijmen, “AES proposal: Rijndael,” 1999.
  • R. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Commun. of the ACM, vol. 21, pp. 120–126, 1978.
  • A. D.Wyner, “The wire-tap channel,” Bell. Syst. Tech. J., vol. 54, no. 8, p. 13551387, 1975.
  • C. Cai, Y. Cai, R. Wang, W. Yang, and W. Yang, “Resource allocation for physical layer security in cooperative OFDM networks,” in 2015 Intern. Conf. on Wireless Commun. Signal Processing (WCSP), Oct 2015, pp. 1–5.
  • C. Jeong and I. M. Kim, “Optimal power allocation for secure multicarrier relay systems,” IEEE Trans. on Signal Process., vol. 59, no. 11, pp. 5428–5442, Nov 2011.
  • H. Zhang, H. Xing, J. Cheng, A. Nallanathan, and V. C. M. Leung, “Secure resource allocation for OFDMA two-way relay wireless sensor networks without and with cooperative jamming,” IEEE Trans. on Indust. Informatics, vol. 12, no. 5, pp. 1714–1725, Oct 2016.
  • D. W. K. Ng, E. S. Lo, and R. Schober, “Secure resource allocation and scheduling for OFDMA decode-and-forward relay networks,” IEEE Trans. on Wireless Commun., vol. 10, no. 10, pp. 3528–3540, October 2011.
  • W. Aman, G. A. S. Sidhu, T. Jabeen, F. Gao, and S. Jin, “Enhancing physical layer security in dual-hop multiuser transmission,” in 2016 IEEE Wireless Commun. and Networking Conf., April 2016, pp. 1–6.
  • C. Cai, Y. Cai, and W. Yang, “Secrecy rates for relay selection in OFDMA networks,” in 2011 Third Intern. Conf. on Commun. and Mobile Comp., April 2011, pp. 158–160.
  • V. Ozduran, “Physical layer security of multi-user full-duplex one-way wireless relaying network,” in Advances in Wireless and Optical Communications (RTUWO’18), Riga, Latvia, 15- 16 November 2018.
  • E. Soleimani-Nasab, M. Matthaiou, M. Ardebilipour, and G. K. Karagiannidis, “Two-way AF relaying in the presence of co-channel interference,” IEEE Trans. on Commun., vol. 61, no. 8, pp. 3156–3169, August 2013.
  • V. Ozduran, E. Soleimani-Nasab, and B. S. Yarman, “Opportunistic source-pair selection for multi-user two-way amplify-and-forward wireless relaying networks,” IET Commun., vol. 10, no. 16, pp. 2106–2118, 2016.
  • A. Papoulis and U. Pillai, Probability, random variables and stochastic processes, 4th ed. McGraw-Hill, 11 2001.
  • I. S. Gradshteyn and I. M. Ryzhik, Tables of Integrals, Series and Products. Elsevier Inc., 7th edition, 2007.
  • V. S. Adamchik and O. I. Marichev, The algorithm for calculating integrals of hypergeometric type functions and its realization in REDUCE systems. Proc. Conf. ISSAC’90, Tokyo, pp. 212224, 1990.
  • N. H. Mahmood, I. S. Ansari, P. Popovski, P. Mogensen, and K. A. Qaraqe, “Physical-layer security with full-duplex transceivers and multiuser receiver at eve,” IEEE Trans. on Commun., vol. 65, no. 10, pp. 4392–4405, Oct 2017.
There are 16 citations in total.

Details

Primary Language English
Subjects Electrical Engineering
Journal Section Araştırma Articlessi
Authors

Volkan Ozduran 0000-0002-9442-9099

Publication Date July 30, 2019
Published in Issue Year 2019 Volume: 7 Issue: 3

Cite

APA Ozduran, V. (2019). Secrecy Analysis of Multi-user Half/Full-Duplex Wireless Bi-directional Relaying Network. Balkan Journal of Electrical and Computer Engineering, 7(3), 342-354. https://doi.org/10.17694/bajece.518904

All articles published by BAJECE are licensed under the Creative Commons Attribution 4.0 International License. This permits anyone to copy, redistribute, remix, transmit and adapt the work provided the original work and source is appropriately cited.Creative Commons Lisansı