ALPHA: an adaptive and lightweight protocol for hop-by-hop authentication
CoNEXT '08 Proceedings of the 2008 ACM CoNEXT Conference
Securing Cooperative Transmission in Wireless Communications
MOBIQUITOUS '07 Proceedings of the 2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking&Services (MobiQuitous)
IEEE Transactions on Wireless Communications
Outage behavior of selective relaying schemes
IEEE Transactions on Wireless Communications
Distributed cooperative MAC for multihop wireless networks
IEEE Communications Magazine
A Hierarchical Identity Based Key Management Scheme in Tactical Mobile Ad Hoc Networks
IEEE Transactions on Network and Service Management
Selection Cooperation in Multi-Source Cooperative Networks
IEEE Transactions on Wireless Communications
Semi-Distributed User Relaying Algorithm for Amplify-and-Forward Wireless Relay Networks
IEEE Transactions on Wireless Communications
Automatic-repeat-request error-control schemes
IEEE Communications Magazine
Cooperative communication in wireless networks
IEEE Communications Magazine
Technologies in Multihop Cellular Networks [Guest Editorial]
IEEE Communications Magazine
Joint optimization of relay strategies and resource allocations in cooperative cellular networks
IEEE Journal on Selected Areas in Communications
Hi-index | 0.24 |
Cooperative communication is considered a promising technique to increase channel capacity and improve reliability in wireless and cellular networks. Although cooperative communication provides significant benefits, it also raises a number of serious security issues as malicious nodes may impersonate and affect the integrity of the communication. In this paper, we propose a prevention-based security technique for cooperative communication taking into consideration authentication protocol, based on hash chains and Merkle trees, along with physical layer parameters which relate to the channel state information. Based on this consideration, we derive the closed-form secured throughput equations for proactive relay selection in cooperative communication that provides both hop-by-hop and end-to-end authentication and integrity protection. The simulation results show that our proposed solution, which provides authentication and protects data integrity, has a higher throughput performance when compared to existing schemes that do not consider security.