An analyticalexpression for the secrecy outage probability (SOP) is derived and the asymptotic expression for the SOP in the high main-to-eavesdropper ratio regime is derived in order to study the impact of both channel correlation and outdated relay selection on the secrecy performance.
Abstract:
In this paper, we study the impact of correlated fading on the secrecy performance of multiple decode-and-forward (DF) relaying with outdated relay selection. It is assumed that the information transmission, assisted by $N$ DF relays from the source to the destination, can be overheard by an eavesdropper. Particularly, we consider the realistic scenario where the eavesdropper's and the main channels are correlated. In order to enhance the network security, the best relay is selected among $N$ available DF relays to assist the secure transmission. Due to the time-varying channel environments, we note that the selected relay may be outdated. In order to study the impact of both channel correlation and outdated relay selection on the secrecy performance, we first derive an analytical expression for the secrecy outage probability (SOP). Also, we derive the asymptotic expression for the SOP in the high main-to-eavesdropper ratio regime. Numerical results are provided to demonstrate the correctness of our analytical expressions.
TL;DR: This paper compares security issues between IoT and traditional network, and discusses opening security issues of IoT, and analyzes the cross-layer heterogeneous integration issues and security issues in detail.
TL;DR: A comprehensive survey of the recent works on cooperative relaying and jamming techniques for securing wireless transmissions against eavesdropping nodes, which attempt to intercept the transmissions.
TL;DR: A new system for Cloud Computing integrated with Internet of Things as a base scenario for Big Data and an architecture relaying on the security of the network are proposed in order to improve their security issues.
TL;DR: This paper proposes a blind beam tracking approach for Ka-band UAV-satellite communication system, where UAV is equipped with a hybrid large-scale antenna array, where an array structure based simultaneous perturbation algorithm is designed.
TL;DR: The problem of sliding-mode fault-tolerant control is addressed for a class of uncertain nonlinear systems with distributed delays and parameter perturbations by using interval type-2 Takagi–Sugeno (T–S) fuzzy models, of which uncertain parameters and distributed state delays are represented in a unifiedtype-2 fuzzy framework.
TL;DR: This paper finds the trade-off curve between R and d, assuming essentially perfect (“error-free”) transmission, and implies that there exists a Cs > 0, such that reliable transmission at rates up to Cs is possible in approximately perfect secrecy.
TL;DR: This leading book on wireless communications offers a wealth of practical information on the implementation realities of wireless communications, from cellular system design to networking, plus world-wide standards, including ETACS, GSM, and PDC.
TL;DR: A practical secure communication protocol is developed, which uses a four-step procedure to ensure wireless information-theoretic security and is shown that the protocol is effective in secure key renewal-even in the presence of imperfect channel state information.
TL;DR: The positive impact of fading on the secrecy capacity is revealed and the critical role of rate adaptation, based on the main channel CSI, in facilitating secure communications over slow fading channels is established.
TL;DR: This article examines security, a pivotal issue in the 5G network where wireless transmissions are inherently vulnerable to security breaches, and focuses on physical layer security, which safeguards data confidentiality by exploiting the intrinsic randomness of the communications medium.
Q1. What are the contributions mentioned in the paper "Secrecy cooperative networks with outdated relay selection over correlated fading channels" ?
In this paper, the authors study the impact of correlated fading channels on multiple secure decode-and-forward ( DF ) relaying with outdated relay selection, where the information transmission assisted by the N DF relays from the source to the destination can be overheard by the eavesdropper in the network. The impact of both channel correlation and outdated relay selection on the secrecy performance is studied by deriving the analytical expression of the secrecy outage probability ( SOP ). The asymptotic SOP is also provided with high main-to-eavesdropper ratio ( MER ).
Q2. What is the awn of the relay?
If the relay Rn can correctly decode the message from the source, i.e., it can support a target data rate Rt,1 2 log2( 1 + P |hS,Rn |2σ2) ≥ Rt, (2)the relay forwards the message to D in the second phase with the transmit power P .
Q3. What is the current criterion for the selection of a relay?
1The instantaneous channel parameters of eavesdropping links are not involved in the relay selection criterion, since they are generally hard to obtain in practice.
Q4. what is the probability of a relay being decoded?
Pr [ 1 + P̃ vn∗ 1 + P̃wn∗ < γs ] (11)= N∑ K=1 ( N K ) e− Kγt P̃α ( 1− e− γt P̃α )N−K Pr [ 1 + P̃ vn∗ 1 + P̃wn∗ < γs ] ︸ ︷︷ ︸JK,(12)where the PDF of fun(u) = 1 αe − uα is applied and the probability JK denotes the conditional SOP with the given K active relays.
Q5. What is the difference between the two curves?
In particular, the curves are in parallel with each other for different relay numbers when ρo = 0.5, indicating that the system secrecy diversity order is unity for different values of ρc as long as the selection is outdated.
Q6. what is the snr of the relay?
T∑ m=0 m∑ i=0 i∑ j=0 Ckmdm,ij(m+ j)!× (b1γs + b2)−(m+j+1), (23)withdm,ij = m!i!( ij) e−b1(γs−1)/P̃bm−i+11 γjs (γs − 1 P̃ )i−j . (24)By applying the result of JK into (12), the authors can obtain the analytical SOP for the multiple secure relaying with channel correlation and outdated relay selection, as shown in (25) at the top of this page.