Introduction to algorithms
Dynamic power allocation and routing for satellite and wireless networks with time varying channels
Dynamic power allocation and routing for satellite and wireless networks with time varying channels
A quantitative trust establishment framework for reliable data packet delivery in MANETs
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Resource Allocation and Cross Layer Control in Wireless Networks (Foundations and Trends in Networking, V. 1, No. 1)
Game-Based Trust Establishment for Mobile Ad Hoc Networks
CMC '09 Proceedings of the 2009 WRI International Conference on Communications and Mobile Computing - Volume 03
IEEE Transactions on Mobile Computing
Context-Aware Trust Management for Peer-to-Peer Mobile Ad-Hoc Networks
COMPSAC '09 Proceedings of the 2009 33rd Annual IEEE International Computer Software and Applications Conference - Volume 02
Single and multiple relay selection schemes and their achievable diversity orders
IEEE Transactions on Wireless Communications
Distributed cooperative transmission with unreliable and untrustworthy relay channels
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless network security
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Trust Management in Wireless Mobile Networks with Cooperative Communications
EUC '10 Proceedings of the 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing
Selection Cooperation in Multi-Source Cooperative Networks
IEEE Transactions on Wireless Communications
Cooperative communications with relay-selection: when to cooperate and whom to cooperate with?
IEEE Transactions on Wireless Communications
Capacity theorems for the relay channel
IEEE Transactions on Information Theory
Cooperative diversity in wireless networks: Efficient protocols and outage behavior
IEEE Transactions on Information Theory
Cooperative Strategies and Capacity Theorems for Relay Networks
IEEE Transactions on Information Theory
Throughput Optimal Control of Cooperative Relay Networks
IEEE Transactions on Information Theory
Dynamic server allocation to parallel queues with randomly varying connectivity
IEEE Transactions on Information Theory
Towards Energy-Efficiency in Selfish, Cooperative Networks
Mobile Networks and Applications
Hi-index | 0.00 |
In this paper, we investigate the problem of optimal reliable relay selection in multiuser cooperative wireless networks in the presence of malicious relay nodes. A general discrete time queueing model for such networks is introduced which takes into account the dynamic variations of the channel state, the dynamic malicious behaviour of relay nodes as well as stochastic arrival of data packets into the system. The model consists of a set of mobile users, one destination node and a set of relay nodes which may be either mobile or fixed. The system uses the benefit of cooperative diversity by relaying in the decode and forward mode. We assume that each user either transmits its packets directly to the destination (direct mode) or transmits them with the cooperation of a selected relay node (cooperative mode). It is assumed that a centralized network controller manages the relay selection process in the system. At each time slot, a malicious relay node in the system may behave spitefully and refuse to cooperate with a user deliberately when it is selected to cooperate with that user. A malicious relay node usually acts stochastically to hide its malicious behaviour for longer time. In such a system, at each time slot the network controller should decide whether a user has to cooperate with any relay node or not and if so, which relay node must be selected for cooperation. First, we show that the malicious behaviour of relay nodes makes the stable throughput region shrink. Then, we propose a throughput optimal secure relay selection policy that can stabilize the system for all the arrival rate vectors strictly inside the network stability region. We show that the optimal policy is equivalent to finding the maximum weighted matching in a weighted bipartite graph at each time slot. Finally, we use simulations to compare the performance of the proposed policy with that of four other sub-optimal policies in terms of average queue occupancy (or queueing delay).