2018
DOI: 10.1109/tcomm.2017.2755654
|View full text |Cite
|
Sign up to set email alerts
|

On the Achievable Secrecy Diversity of Cooperative Networks With Untrusted Relays

Abstract: Cooperative relaying is often deployed to enhance the communication reliability (i.e., diversity order) and consequently the end-to-end achievable rate. However, this raises several security concerns when the relays are untrusted since they may have access to the relayed message. In this paper, we study the achievable secrecy diversity order of cooperative networks with untrusted relays. In particular, we consider a network with an N -antenna transmitter (Alice), K single-antenna relays, and a single-antenna d… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(9 citation statements)
references
References 29 publications
0
9
0
Order By: Relevance
“…Similar to the case of external eavesdropper, the best relaying scheme depends on the physical outline of the system, mainly the distances between the nodes [126]. Another scheme with multiple un‐trusted relays [105] implements multiple antennas at the transmitter relay to attain a secrecy diversity order of (min( N , K )1), where K , the number of single antenna relays, is larger than N , the number of antennas in the transmitter. Chraiti et al [105] utilise pre‐coding signals non‐linearly with the channel gains in a way that only the destination will be capable of separating interfering signals in an efficient manner.…”
Section: Security Analysismentioning
confidence: 99%
See 2 more Smart Citations
“…Similar to the case of external eavesdropper, the best relaying scheme depends on the physical outline of the system, mainly the distances between the nodes [126]. Another scheme with multiple un‐trusted relays [105] implements multiple antennas at the transmitter relay to attain a secrecy diversity order of (min( N , K )1), where K , the number of single antenna relays, is larger than N , the number of antennas in the transmitter. Chraiti et al [105] utilise pre‐coding signals non‐linearly with the channel gains in a way that only the destination will be capable of separating interfering signals in an efficient manner.…”
Section: Security Analysismentioning
confidence: 99%
“…Another scheme with multiple un‐trusted relays [105] implements multiple antennas at the transmitter relay to attain a secrecy diversity order of (min( N , K )1), where K , the number of single antenna relays, is larger than N , the number of antennas in the transmitter. Chraiti et al [105] utilise pre‐coding signals non‐linearly with the channel gains in a way that only the destination will be capable of separating interfering signals in an efficient manner. This scheme does not exploit any type of AN, leading to remarkable power savings compared with those that do [105].…”
Section: Security Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…where and refers to the index of the selected relay, , according to the criterion presented in the next section. In addition, after performing a MRC technique, the instantaneous received end-to-end SINR at D is given by (10) Herein, we consider that the RSI channel is not time varying, as there is no relative movement of the collocated transmit and receive antennas at D, so that the RSI channel is not subject to outdated CSI. Also, in this system, any relay node is considered a potential eavesdropper, thus being untrustworthy.…”
Section: A Preliminariesmentioning
confidence: 99%
“…In particular, in [9], a source-based jamming technique was evaluated in combination with power allocation to improve the security in a network with one untrusted relay and the presence of direct link between source and destination. In [10], the achievable secrecy diversity order was studied for a cooperative network with a multiple-antenna source and multiple untrusted relays. In [11], the secrecy capacity and the secrecy outage probability (SOP) of a two-hop amplify-and-forward (AF) relaying network was evaluated in the presence of multiple untrusted relays and without the presence of direct link.…”
Section: Introductionmentioning
confidence: 99%