Physical layer security using two-path successive relaying

Relaying is one of the useful techniques to enhance wireless physical-layer security. Existing literature shows that employing full-duplex relay instead of conventional half-duplex relay improves secrecy capacity and secrecy outage probability, but this is at the price of sophisticated implementatio...

Full description

Saved in:
Bibliographic Details
Main Authors: Liau, Q. Y., Leow, C. Y., Ding, Z.
Format: Article
Language:English
Published: MDPI AG 2016
Subjects:
Online Access:http://eprints.utm.my/id/eprint/71156/1/LiauQianYu2016_PhysicalLayerSecurityUsingTwoPath.pdf
http://eprints.utm.my/id/eprint/71156/
https://www.scopus.com/inward/record.uri?eid=2-s2.0-84973596241&doi=10.3390%2fs16060846&partnerID=40&md5=1a85cdf95007b41fa34c3048ff42f4f5
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.utm.71156
record_format eprints
spelling my.utm.711562017-11-15T01:27:19Z http://eprints.utm.my/id/eprint/71156/ Physical layer security using two-path successive relaying Liau, Q. Y. Leow, C. Y. Ding, Z. TK Electrical engineering. Electronics Nuclear engineering Relaying is one of the useful techniques to enhance wireless physical-layer security. Existing literature shows that employing full-duplex relay instead of conventional half-duplex relay improves secrecy capacity and secrecy outage probability, but this is at the price of sophisticated implementation. As an alternative, two-path successive relaying has been proposed to emulate operation of full-duplex relay by scheduling a pair of half-duplex relays to assist the source transmission alternately. However, the performance of two-path successive relaying in secrecy communication remains unexplored. This paper proposes a secrecy two-path successive relaying protocol for a scenario with one source, one destination and two half-duplex relays. The relays operate alternately in a time division mode to forward messages continuously from source to destination in the presence of an eavesdropper. Analytical results reveal that the use of two half-duplex relays in the proposed scheme contributes towards a quadratically lower probability of interception compared to full-duplex relaying. Numerical simulations show that the proposed protocol achieves the ergodic achievable secrecy rate of full-duplex relaying while delivering the lowest probability of interception and secrecy outage probability compared to the existing half duplex relaying, full duplex relaying and full duplex jamming schemes. MDPI AG 2016 Article PeerReviewed application/pdf en http://eprints.utm.my/id/eprint/71156/1/LiauQianYu2016_PhysicalLayerSecurityUsingTwoPath.pdf Liau, Q. Y. and Leow, C. Y. and Ding, Z. (2016) Physical layer security using two-path successive relaying. Sensors (Switzerland), 16 (6). ISSN 1424-8220 https://www.scopus.com/inward/record.uri?eid=2-s2.0-84973596241&doi=10.3390%2fs16060846&partnerID=40&md5=1a85cdf95007b41fa34c3048ff42f4f5
institution Universiti Teknologi Malaysia
building UTM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Malaysia
content_source UTM Institutional Repository
url_provider http://eprints.utm.my/
language English
topic TK Electrical engineering. Electronics Nuclear engineering
spellingShingle TK Electrical engineering. Electronics Nuclear engineering
Liau, Q. Y.
Leow, C. Y.
Ding, Z.
Physical layer security using two-path successive relaying
description Relaying is one of the useful techniques to enhance wireless physical-layer security. Existing literature shows that employing full-duplex relay instead of conventional half-duplex relay improves secrecy capacity and secrecy outage probability, but this is at the price of sophisticated implementation. As an alternative, two-path successive relaying has been proposed to emulate operation of full-duplex relay by scheduling a pair of half-duplex relays to assist the source transmission alternately. However, the performance of two-path successive relaying in secrecy communication remains unexplored. This paper proposes a secrecy two-path successive relaying protocol for a scenario with one source, one destination and two half-duplex relays. The relays operate alternately in a time division mode to forward messages continuously from source to destination in the presence of an eavesdropper. Analytical results reveal that the use of two half-duplex relays in the proposed scheme contributes towards a quadratically lower probability of interception compared to full-duplex relaying. Numerical simulations show that the proposed protocol achieves the ergodic achievable secrecy rate of full-duplex relaying while delivering the lowest probability of interception and secrecy outage probability compared to the existing half duplex relaying, full duplex relaying and full duplex jamming schemes.
format Article
author Liau, Q. Y.
Leow, C. Y.
Ding, Z.
author_facet Liau, Q. Y.
Leow, C. Y.
Ding, Z.
author_sort Liau, Q. Y.
title Physical layer security using two-path successive relaying
title_short Physical layer security using two-path successive relaying
title_full Physical layer security using two-path successive relaying
title_fullStr Physical layer security using two-path successive relaying
title_full_unstemmed Physical layer security using two-path successive relaying
title_sort physical layer security using two-path successive relaying
publisher MDPI AG
publishDate 2016
url http://eprints.utm.my/id/eprint/71156/1/LiauQianYu2016_PhysicalLayerSecurityUsingTwoPath.pdf
http://eprints.utm.my/id/eprint/71156/
https://www.scopus.com/inward/record.uri?eid=2-s2.0-84973596241&doi=10.3390%2fs16060846&partnerID=40&md5=1a85cdf95007b41fa34c3048ff42f4f5
_version_ 1643656120607178752
score 13.211869