Physical layer security using two-path successive relaying

Relaying is one of the useful techniques to enhance wireless physical-layer security. Existing literature shows that employing full-duplex relay instead of conventional half-duplex relay improves secrecy capacity and secrecy outage probability, but this is at the price of sophisticated implementatio...

詳細記述

保存先:
書誌詳細
主要な著者: Liau, Q. Y., Leow, C. Y., Ding, Z.
フォーマット: 論文
言語:English
出版事項: MDPI AG 2016
主題:
オンライン・アクセス:http://eprints.utm.my/id/eprint/71156/1/LiauQianYu2016_PhysicalLayerSecurityUsingTwoPath.pdf
http://eprints.utm.my/id/eprint/71156/
https://www.scopus.com/inward/record.uri?eid=2-s2.0-84973596241&doi=10.3390%2fs16060846&partnerID=40&md5=1a85cdf95007b41fa34c3048ff42f4f5
タグ: タグ追加
タグなし, このレコードへの初めてのタグを付けませんか!
その他の書誌記述
要約:Relaying is one of the useful techniques to enhance wireless physical-layer security. Existing literature shows that employing full-duplex relay instead of conventional half-duplex relay improves secrecy capacity and secrecy outage probability, but this is at the price of sophisticated implementation. As an alternative, two-path successive relaying has been proposed to emulate operation of full-duplex relay by scheduling a pair of half-duplex relays to assist the source transmission alternately. However, the performance of two-path successive relaying in secrecy communication remains unexplored. This paper proposes a secrecy two-path successive relaying protocol for a scenario with one source, one destination and two half-duplex relays. The relays operate alternately in a time division mode to forward messages continuously from source to destination in the presence of an eavesdropper. Analytical results reveal that the use of two half-duplex relays in the proposed scheme contributes towards a quadratically lower probability of interception compared to full-duplex relaying. Numerical simulations show that the proposed protocol achieves the ergodic achievable secrecy rate of full-duplex relaying while delivering the lowest probability of interception and secrecy outage probability compared to the existing half duplex relaying, full duplex relaying and full duplex jamming schemes.