Cargando…
Physical Layer Security Using Two-Path Successive Relaying
Relaying is one of the useful techniques to enhance wireless physical-layer security. Existing literature shows that employing full-duplex relay instead of conventional half-duplex relay improves secrecy capacity and secrecy outage probability, but this is at the price of sophisticated implementatio...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2016
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4934272/ https://www.ncbi.nlm.nih.gov/pubmed/27294924 http://dx.doi.org/10.3390/s16060846 |
_version_ | 1782441309805477888 |
---|---|
author | Liau, Qian Yu Leow, Chee Yen Ding, Zhiguo |
author_facet | Liau, Qian Yu Leow, Chee Yen Ding, Zhiguo |
author_sort | Liau, Qian Yu |
collection | PubMed |
description | Relaying is one of the useful techniques to enhance wireless physical-layer security. Existing literature shows that employing full-duplex relay instead of conventional half-duplex relay improves secrecy capacity and secrecy outage probability, but this is at the price of sophisticated implementation. As an alternative, two-path successive relaying has been proposed to emulate operation of full-duplex relay by scheduling a pair of half-duplex relays to assist the source transmission alternately. However, the performance of two-path successive relaying in secrecy communication remains unexplored. This paper proposes a secrecy two-path successive relaying protocol for a scenario with one source, one destination and two half-duplex relays. The relays operate alternately in a time division mode to forward messages continuously from source to destination in the presence of an eavesdropper. Analytical results reveal that the use of two half-duplex relays in the proposed scheme contributes towards a quadratically lower probability of interception compared to full-duplex relaying. Numerical simulations show that the proposed protocol achieves the ergodic achievable secrecy rate of full-duplex relaying while delivering the lowest probability of interception and secrecy outage probability compared to the existing half duplex relaying, full duplex relaying and full duplex jamming schemes. |
format | Online Article Text |
id | pubmed-4934272 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2016 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-49342722016-07-06 Physical Layer Security Using Two-Path Successive Relaying Liau, Qian Yu Leow, Chee Yen Ding, Zhiguo Sensors (Basel) Article Relaying is one of the useful techniques to enhance wireless physical-layer security. Existing literature shows that employing full-duplex relay instead of conventional half-duplex relay improves secrecy capacity and secrecy outage probability, but this is at the price of sophisticated implementation. As an alternative, two-path successive relaying has been proposed to emulate operation of full-duplex relay by scheduling a pair of half-duplex relays to assist the source transmission alternately. However, the performance of two-path successive relaying in secrecy communication remains unexplored. This paper proposes a secrecy two-path successive relaying protocol for a scenario with one source, one destination and two half-duplex relays. The relays operate alternately in a time division mode to forward messages continuously from source to destination in the presence of an eavesdropper. Analytical results reveal that the use of two half-duplex relays in the proposed scheme contributes towards a quadratically lower probability of interception compared to full-duplex relaying. Numerical simulations show that the proposed protocol achieves the ergodic achievable secrecy rate of full-duplex relaying while delivering the lowest probability of interception and secrecy outage probability compared to the existing half duplex relaying, full duplex relaying and full duplex jamming schemes. MDPI 2016-06-09 /pmc/articles/PMC4934272/ /pubmed/27294924 http://dx.doi.org/10.3390/s16060846 Text en © 2016 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC-BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Liau, Qian Yu Leow, Chee Yen Ding, Zhiguo Physical Layer Security Using Two-Path Successive Relaying |
title | Physical Layer Security Using Two-Path Successive Relaying |
title_full | Physical Layer Security Using Two-Path Successive Relaying |
title_fullStr | Physical Layer Security Using Two-Path Successive Relaying |
title_full_unstemmed | Physical Layer Security Using Two-Path Successive Relaying |
title_short | Physical Layer Security Using Two-Path Successive Relaying |
title_sort | physical layer security using two-path successive relaying |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4934272/ https://www.ncbi.nlm.nih.gov/pubmed/27294924 http://dx.doi.org/10.3390/s16060846 |
work_keys_str_mv | AT liauqianyu physicallayersecurityusingtwopathsuccessiverelaying AT leowcheeyen physicallayersecurityusingtwopathsuccessiverelaying AT dingzhiguo physicallayersecurityusingtwopathsuccessiverelaying |