Cargando…

Physical Layer Security Using Two-Path Successive Relaying

Relaying is one of the useful techniques to enhance wireless physical-layer security. Existing literature shows that employing full-duplex relay instead of conventional half-duplex relay improves secrecy capacity and secrecy outage probability, but this is at the price of sophisticated implementatio...

Descripción completa

Detalles Bibliográficos
Autores principales: Liau, Qian Yu, Leow, Chee Yen, Ding, Zhiguo
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2016
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4934272/
https://www.ncbi.nlm.nih.gov/pubmed/27294924
http://dx.doi.org/10.3390/s16060846
_version_ 1782441309805477888
author Liau, Qian Yu
Leow, Chee Yen
Ding, Zhiguo
author_facet Liau, Qian Yu
Leow, Chee Yen
Ding, Zhiguo
author_sort Liau, Qian Yu
collection PubMed
description Relaying is one of the useful techniques to enhance wireless physical-layer security. Existing literature shows that employing full-duplex relay instead of conventional half-duplex relay improves secrecy capacity and secrecy outage probability, but this is at the price of sophisticated implementation. As an alternative, two-path successive relaying has been proposed to emulate operation of full-duplex relay by scheduling a pair of half-duplex relays to assist the source transmission alternately. However, the performance of two-path successive relaying in secrecy communication remains unexplored. This paper proposes a secrecy two-path successive relaying protocol for a scenario with one source, one destination and two half-duplex relays. The relays operate alternately in a time division mode to forward messages continuously from source to destination in the presence of an eavesdropper. Analytical results reveal that the use of two half-duplex relays in the proposed scheme contributes towards a quadratically lower probability of interception compared to full-duplex relaying. Numerical simulations show that the proposed protocol achieves the ergodic achievable secrecy rate of full-duplex relaying while delivering the lowest probability of interception and secrecy outage probability compared to the existing half duplex relaying, full duplex relaying and full duplex jamming schemes.
format Online
Article
Text
id pubmed-4934272
institution National Center for Biotechnology Information
language English
publishDate 2016
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-49342722016-07-06 Physical Layer Security Using Two-Path Successive Relaying Liau, Qian Yu Leow, Chee Yen Ding, Zhiguo Sensors (Basel) Article Relaying is one of the useful techniques to enhance wireless physical-layer security. Existing literature shows that employing full-duplex relay instead of conventional half-duplex relay improves secrecy capacity and secrecy outage probability, but this is at the price of sophisticated implementation. As an alternative, two-path successive relaying has been proposed to emulate operation of full-duplex relay by scheduling a pair of half-duplex relays to assist the source transmission alternately. However, the performance of two-path successive relaying in secrecy communication remains unexplored. This paper proposes a secrecy two-path successive relaying protocol for a scenario with one source, one destination and two half-duplex relays. The relays operate alternately in a time division mode to forward messages continuously from source to destination in the presence of an eavesdropper. Analytical results reveal that the use of two half-duplex relays in the proposed scheme contributes towards a quadratically lower probability of interception compared to full-duplex relaying. Numerical simulations show that the proposed protocol achieves the ergodic achievable secrecy rate of full-duplex relaying while delivering the lowest probability of interception and secrecy outage probability compared to the existing half duplex relaying, full duplex relaying and full duplex jamming schemes. MDPI 2016-06-09 /pmc/articles/PMC4934272/ /pubmed/27294924 http://dx.doi.org/10.3390/s16060846 Text en © 2016 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC-BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Liau, Qian Yu
Leow, Chee Yen
Ding, Zhiguo
Physical Layer Security Using Two-Path Successive Relaying
title Physical Layer Security Using Two-Path Successive Relaying
title_full Physical Layer Security Using Two-Path Successive Relaying
title_fullStr Physical Layer Security Using Two-Path Successive Relaying
title_full_unstemmed Physical Layer Security Using Two-Path Successive Relaying
title_short Physical Layer Security Using Two-Path Successive Relaying
title_sort physical layer security using two-path successive relaying
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4934272/
https://www.ncbi.nlm.nih.gov/pubmed/27294924
http://dx.doi.org/10.3390/s16060846
work_keys_str_mv AT liauqianyu physicallayersecurityusingtwopathsuccessiverelaying
AT leowcheeyen physicallayersecurityusingtwopathsuccessiverelaying
AT dingzhiguo physicallayersecurityusingtwopathsuccessiverelaying