Wireless secrecy in cellular systems with infrastructure-aided cooperation
IEEE Transactions on Information Forensics and Security
IEEE Transactions on Wireless Communications
Secrecy capacity of a class of orthogonal relay eavesdropper channels
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless physical layer security
On the throughput of secure hybrid-ARQ protocols for Gaussian block-fading channels
IEEE Transactions on Information Theory
Mutual Information Jammer-Relay Games
IEEE Transactions on Information Forensics and Security
Identity-based key management in mobile ad hoc networks: techniques and applications
IEEE Wireless Communications
Cooperative Communications with Outage-Optimal Opportunistic Relaying
IEEE Transactions on Wireless Communications
Threshold Selection for SNR-based Selective Digital Relaying in Cooperative Wireless Networks
IEEE Transactions on Wireless Communications - Part 1
Cooperative diversity in wireless networks: Efficient protocols and outage behavior
IEEE Transactions on Information Theory
Towards the Optimal Amplify-and-Forward Cooperative Diversity Scheme
IEEE Transactions on Information Theory
Wireless Information-Theoretic Security
IEEE Transactions on Information Theory
IEEE Transactions on Information Theory
IEEE Transactions on Information Theory
The Relay–Eavesdropper Channel: Cooperation for Secrecy
IEEE Transactions on Information Theory
Relay and jammer cooperation as a coalitional game in secure cooperative wireless networks
Proceedings of the 5th International ICST Conference on Performance Evaluation Methodologies and Tools
Wireless Personal Communications: An International Journal
Wireless Personal Communications: An International Journal
A New Relay and Jammer Selection Schemes for Secure One-Way Cooperative Networks
Wireless Personal Communications: An International Journal
Hi-index | 0.01 |
This paper deals with relay selection in cooperative networks with secrecy constraints. The proposed scheme enables an opportunistic selection of two relay nodes to increase security against eavesdroppers. The first relay operates as a conventional mode and assists a source to deliver its data to a destination via a Decode-and-Forward strategy. The second relay is used in order to create intentional interference at the eavesdropper nodes. The proposed selection technique jointly protects the primary destination against interference and eavesdropping and jams the reception of the eavesdropper. The new approach is analyzed for different complexity requirements based on instantaneous and average knowledge of the eavesdropper channels. In addition an investigation of an hybrid security scheme which switches between jamming and non-jamming protection is discussed in the paper. It is proven that an appropriate application of these two modes further improves security. The enhancements of the proposed selection techniques are demonstrated analytically and with simulation results.