메뉴 건너뛰기




Volumn 13, Issue 2, 2018, Pages 341-355

Joint Relay Selection and Power Allocation in Large-Scale MIMO Systems with Untrusted Relays and Passive Eavesdroppers

Author keywords

joint relay selection and power allocation; Physical layer security; untrusted relay

Indexed keywords

ANTENNAS; COMMUNICATION CHANNELS (INFORMATION THEORY); DATA COMMUNICATION SYSTEMS; FADING CHANNELS; MIMO SYSTEMS; NETWORK LAYERS; RAYLEIGH FADING; RELIABILITY; SIGNAL TO NOISE RATIO;

EID: 85029158278     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2017.2750102     Document Type: Article
Times cited : (105)

References (40)
  • 1
    • 85032752174 scopus 로고    scopus 로고
    • Scaling up MIMO: Opportunities and challenges with very large arrays
    • Jan.
    • F. Rusek et al., "Scaling up MIMO: Opportunities and challenges with very large arrays, " IEEE Signal Process. Mag., vol. 30, no. 1, pp. 40-46, Jan. 2013.
    • (2013) IEEE Signal Process. Mag. , vol.30 , Issue.1 , pp. 40-46
    • Rusek, F.1
  • 2
    • 84896823919 scopus 로고    scopus 로고
    • Massive MIMO for next generation wireless systems
    • Feb.
    • E. G. Larsson, O. Edfors, F. Tufvesson, and T. L. Marzetta, "Massive MIMO for next generation wireless systems, " IEEE Commun. Mag., vol. 52, no. 2, pp. 186-195, Feb. 2014.
    • (2014) IEEE Commun. Mag. , vol.52 , Issue.2 , pp. 186-195
    • Larsson, E.G.1    Edfors, O.2    Tufvesson, F.3    Marzetta, T.L.4
  • 3
    • 84933037312 scopus 로고    scopus 로고
    • Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks
    • Jun.
    • D. Kapetanovic, G. Zheng, and F. Rusek, "Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks, " IEEE Commun. Mag., vol. 53, no. 6, pp. 21-27, Jun. 2015.
    • (2015) IEEE Commun. Mag. , vol.53 , Issue.6 , pp. 21-27
    • Kapetanovic, D.1    Zheng, G.2    Rusek, F.3
  • 4
    • 84969998525 scopus 로고    scopus 로고
    • Secure massive MIMO transmission with an active eavesdropper
    • Jul.
    • Y. Wu, R. Schober, D. W. K. Ng, C. Xiao, and G. Caire, "Secure massive MIMO transmission with an active eavesdropper, " IEEE Trans. Inf. Theory., vol. 62, no. 7, pp. 3880-3900, Jul. 2016.
    • (2016) IEEE Trans. Inf. Theory. , vol.62 , Issue.7 , pp. 3880-3900
    • Wu, Y.1    Schober, R.2    Ng, D.W.K.3    Xiao, C.4    Caire, G.5
  • 5
    • 85038815092 scopus 로고    scopus 로고
    • Evaluating secrecy outage of physical layer security in large-scale MIMO wireless communications for cyber-physical systems
    • to be published
    • D. B. Rawat, T. White, M. S. Parwez, C. Bajracharya, and M. Song, "Evaluating secrecy outage of physical layer security in large-scale MIMO wireless communications for cyber-physical systems, " IEEE Internet Things J., to be published.
    • IEEE Internet Things J
    • Rawat, D.B.1    White, T.2    Parwez, M.S.3    Bajracharya, C.4    Song, M.5
  • 7
    • 84906698210 scopus 로고    scopus 로고
    • Principles of physical layer security in multiuser wireless networks: A survey
    • 3rd Quart.
    • A. Mukherjee, S. A. A. Fakoorian, J. Huang, and A. L. Swindlehurst, "Principles of physical layer security in multiuser wireless networks: A survey, " IEEE Commun. Surveys Tuts., vol. 16, no. 3, pp. 1550-1573, 3rd Quart., 2014.
    • (2014) IEEE Commun. Surveys Tuts. , vol.16 , Issue.3 , pp. 1550-1573
    • Mukherjee, A.1    Fakoorian, S.A.A.2    Huang, J.3    Swindlehurst, A.L.4
  • 8
    • 85020456786 scopus 로고    scopus 로고
    • A survey on multiple-antenna techniques for physical layer security
    • 2nd Quart.
    • X. Chen, D. W. K. Ng, W. H. Gerstacker, and H.-H. Chen, "A survey on multiple-antenna techniques for physical layer security, " IEEE Commun. Surveys Tuts., vol. 19, no. 2, pp. 1027-1053, 2nd Quart., 2017.
    • (2017) IEEE Commun. Surveys Tuts. , vol.19 , Issue.2 , pp. 1027-1053
    • Chen, X.1    Ng, D.W.K.2    Gerstacker, W.H.3    Chen, H.-H.4
  • 9
    • 84904614329 scopus 로고    scopus 로고
    • Security versus reliability analysis of opportunistic relaying
    • Jul.
    • Y. Zou, X. Wang, W. Shen, and L. Hanzo, "Security versus reliability analysis of opportunistic relaying, " IEEE Trans. Veh. Technol., vol. 63, no. 6, pp. 2653-2661, Jul. 2014.
    • (2014) IEEE Trans. Veh. Technol. , vol.63 , Issue.6 , pp. 2653-2661
    • Zou, Y.1    Wang, X.2    Shen, W.3    Hanzo, L.4
  • 10
    • 84922896499 scopus 로고    scopus 로고
    • Hybrid opportunistic relaying and jamming with power allocation for secure cooperative networks
    • Feb.
    • C. Wang, H.-M. Wang, and X.-G. Xia, "Hybrid opportunistic relaying and jamming with power allocation for secure cooperative networks, " IEEE Trans. Wireless Commun., vol. 14, no. 2, pp. 589-605, Feb. 2015.
    • (2015) IEEE Trans. Wireless Commun. , vol.14 , Issue.2 , pp. 589-605
    • Wang, C.1    Wang, H.-M.2    Xia, X.-G.3
  • 11
    • 84960131664 scopus 로고    scopus 로고
    • Artificial noise assisted secure transmission under training and feedback
    • Dec.
    • H.-M. Wang, C. Wang, and D. W. K. Ng, "Artificial noise assisted secure transmission under training and feedback, " IEEE Trans. Signal Process., vol. 63, no. 23, pp. 6285-6298, Dec. 2015.
    • (2015) IEEE Trans. Signal Process. , vol.63 , Issue.23 , pp. 6285-6298
    • Wang, H.-M.1    Wang, C.2    Ng, D.W.K.3
  • 13
    • 70350583050 scopus 로고    scopus 로고
    • Relay selection for secure cooperative networks with jamming
    • Oct.
    • I. Krikidis, J. S. Thompson, and S. Mclaughlin, "Relay selection for secure cooperative networks with jamming, " IEEE Trans. Wireless Commun., vol. 8, no. 10, pp. 5003-5011, Oct. 2009.
    • (2009) IEEE Trans. Wireless Commun. , vol.8 , Issue.10 , pp. 5003-5011
    • Krikidis, I.1    Thompson, J.S.2    McLaughlin, S.3
  • 14
    • 84982305842 scopus 로고    scopus 로고
    • Joint relay and jammer selection improves the physical layer security in the face of CSI feedback delays
    • Aug.
    • L. Wang, Y. Cai, Y. Zou, W. Yang, and L. Hanzo, "Joint relay and jammer selection improves the physical layer security in the face of CSI feedback delays, " IEEE Trans. Veh. Technol., vol. 65, no. 8, pp. 6259-6274, Aug. 2016.
    • (2016) IEEE Trans. Veh. Technol. , vol.65 , Issue.8 , pp. 6259-6274
    • Wang, L.1    Cai, Y.2    Zou, Y.3    Yang, W.4    Hanzo, L.5
  • 15
    • 76649135514 scopus 로고    scopus 로고
    • Physical layer security game: Interaction between source, eavesdropper and friendly jammer
    • Mar.
    • Z. Han, N. Marina, M. Debbah, and A. Hjorungnes, "Physical layer security game: Interaction between source, eavesdropper and friendly jammer, " EURASIP J. Wireless Commun. Netw., vol. 2009, pp. 452907-1-452907-10, Mar. 2009.
    • (2009) EURASIP J. Wireless Commun. Netw. , vol.2009 , pp. 4529071-45290710
    • Han, Z.1    Marina, N.2    Debbah, M.3    Hjorungnes, A.4
  • 16
    • 84874051560 scopus 로고    scopus 로고
    • Destination assisted cooperative jamming for wireless physical-layer security
    • Apr.
    • Y. Liu, J. Li, and A. P. Petropulu, "Destination assisted cooperative jamming for wireless physical-layer security, " IEEE Trans. Inf. Forensics Security, vol. 8, no. 4, pp. 682-694, Apr. 2013.
    • (2013) IEEE Trans. Inf. Forensics Security , vol.8 , Issue.4 , pp. 682-694
    • Liu, Y.1    Li, J.2    Petropulu, A.P.3
  • 17
    • 78650858776 scopus 로고    scopus 로고
    • On the secure degrees of freedom of relaying with half-duplex feedback
    • Jan.
    • T. T. Kim and H. V. Poor, "On the secure degrees of freedom of relaying with half-duplex feedback, " IEEE Trans. Inf. Theory., vol. 57, no. 1, pp. 291-302, Jan. 2011.
    • (2011) IEEE Trans. Inf. Theory. , vol.57 , Issue.1 , pp. 291-302
    • Kim, T.T.1    Poor, H.V.2
  • 18
    • 84937146871 scopus 로고    scopus 로고
    • Secure transmission for multiuser relay networks
    • Jul.
    • S. I. Kim, I. M. Kim, and J. Heo, "Secure transmission for multiuser relay networks, " IEEE Trans. Wireless Commun., vol. 14, no. 7, pp. 3724-3737, Jul. 2015.
    • (2015) IEEE Trans. Wireless Commun. , vol.14 , Issue.7 , pp. 3724-3737
    • Kim, S.I.1    Kim, I.M.2    Heo, J.3
  • 19
    • 84903317482 scopus 로고    scopus 로고
    • Secure transmission with optimal power allocation in untrusted relay networks
    • Jun.
    • L. Wang, M. Elkashlan, J. Huang, N. H. Tran, and T. Q. Duong, "Secure transmission with optimal power allocation in untrusted relay networks, " IEEE Wireless Commun. Lett., vol. 3, no. 3, pp. 289-292, Jun. 2014.
    • (2014) IEEE Wireless Commun. Lett. , vol.3 , Issue.3 , pp. 289-292
    • Wang, L.1    Elkashlan, M.2    Huang, J.3    Tran, N.H.4    Duong, T.Q.5
  • 20
    • 84956860249 scopus 로고    scopus 로고
    • Destination-based cooperative jamming in untrusted amplify-and-forward relay networks: Resource allocation and performance study
    • A. Kuhestani and A. Mohammadi, "Destination-based cooperative jamming in untrusted amplify-and-forward relay networks: Resource allocation and performance study, " IET Commun., vol. 10, no. 1, pp. 17-23, 2016.
    • (2016) IET Commun. , vol.10 , Issue.1 , pp. 17-23
    • Kuhestani, A.1    Mohammadi, A.2
  • 21
    • 84867800602 scopus 로고    scopus 로고
    • Performance study of two-hop amplify-and-forward systems with untrustworthy relay nodes
    • Oct.
    • L. Sun, T. Zhang, Y. Li, and N. Niu, "Performance study of two-hop amplify-and-forward systems with untrustworthy relay nodes, " IEEE Trans. Veh. Technol., vol. 61, no. 8, pp. 3801-3807, Oct. 2012.
    • (2012) IEEE Trans. Veh. Technol. , vol.61 , Issue.8 , pp. 3801-3807
    • Sun, L.1    Zhang, T.2    Li, Y.3    Niu, N.4
  • 22
    • 84937132656 scopus 로고    scopus 로고
    • Capacity scaling and diversity order for secure cooperative relaying with untrustworthy relays
    • Jul.
    • J.-B. Kim, J. Lim, and J. M. Cioffi, "Capacity scaling and diversity order for secure cooperative relaying with untrustworthy relays, " IEEE Trans. Wireless Commun., vol. 14, no. 7, pp. 3866-3876, Jul. 2015.
    • (2015) IEEE Trans. Wireless Commun. , vol.14 , Issue.7 , pp. 3866-3876
    • Kim, J.-B.1    Lim, J.2    Cioffi, J.M.3
  • 23
    • 84924902824 scopus 로고    scopus 로고
    • Security-aware relaying scheme for cooperative networks with untrusted relay nodes
    • Sep.
    • L. Sun, P. Ren, Q. Du, Y. Wang, and Z. Gao, "Security-aware relaying scheme for cooperative networks with untrusted relay nodes, " IEEE Commun. Lett., vol. 19, no. 3, pp. 463-466, Sep. 2014.
    • (2014) IEEE Commun. Lett. , vol.19 , Issue.3 , pp. 463-466
    • Sun, L.1    Ren, P.2    Du, Q.3    Wang, Y.4    Gao, Z.5
  • 24
    • 84985015755 scopus 로고    scopus 로고
    • Relay selection for secure successive AF relaying networks with untrusted nodes
    • Nov.
    • W. Wang, K. C. Teh, and K. H. Li, "Relay selection for secure successive AF relaying networks with untrusted nodes, " IEEE Trans. Inf. Forensics Security, vol. 11, no. 11, pp. 2466-2476, Nov. 2016.
    • (2016) IEEE Trans. Inf. Forensics Security , vol.11 , Issue.11 , pp. 2466-2476
    • Wang, W.1    Teh, K.C.2    Li, K.H.3
  • 25
    • 84960105777 scopus 로고    scopus 로고
    • Physical-layer security in the Internet of Things: Sensing and communication confidentiality under resource constraints
    • Oct.
    • A. Mukherjee, "Physical-layer security in the Internet of Things: Sensing and communication confidentiality under resource constraints, " Proc. IEEE, vol. 103, no. 10, pp. 1747-1761, Oct. 2015.
    • (2015) Proc. IEEE , vol.103 , Issue.10 , pp. 1747-1761
    • Mukherjee, A.1
  • 26
    • 84991451214 scopus 로고    scopus 로고
    • Spectral-energy efficiency tradeoff in relay-aided massive MIMO cellular networks with pilot contamination
    • Sep.
    • J. Chen, H. Chen, H. Zhang, and F. Zhao, "Spectral-energy efficiency tradeoff in relay-aided massive MIMO cellular networks with pilot contamination, " IEEE Access, vol. 4, pp. 5234-5242, Sep. 2016.
    • (2016) IEEE Access , vol.4 , pp. 5234-5242
    • Chen, J.1    Chen, H.2    Zhang, H.3    Zhao, F.4
  • 27
    • 84970027610 scopus 로고    scopus 로고
    • Spectral and energy efficiency of multipair two-way full-duplex relay systems with massive MIMO
    • Apr.
    • Z. Zhang, Z. Chen, M. Shen, and B. Xia, "Spectral and energy efficiency of multipair two-way full-duplex relay systems with massive MIMO, " IEEE J. Sel. Areas Commun., vol. 34, no. 4, pp. 848-863, Apr. 2016.
    • (2016) IEEE J. Sel. Areas Commun. , vol.34 , Issue.4 , pp. 848-863
    • Zhang, Z.1    Chen, Z.2    Shen, M.3    Xia, B.4
  • 28
    • 79951681560 scopus 로고    scopus 로고
    • Secure wireless network connectivity with multi-antenna transmission
    • Feb.
    • X. Zhou, R. K. Ganti, and J. G. Andrews, "Secure wireless network connectivity with multi-antenna transmission, " IEEE Trans. Wireless Commun., vol. 10, no. 2, pp. 425-430, Feb. 2011.
    • (2011) IEEE Trans. Wireless Commun. , vol.10 , Issue.2 , pp. 425-430
    • Zhou, X.1    Ganti, R.K.2    Andrews, J.G.3
  • 29
    • 84964855005 scopus 로고    scopus 로고
    • Secrecy outage probability of selective relaying wiretap channels with collaborative eavesdropping
    • P. L. Yeoh, N. Yang, and K. J. Kim, "Secrecy outage probability of selective relaying wiretap channels with collaborative eavesdropping, " in Proc. IEEE Global Commun. Conf. (GLOBECOM), Dec. 2015, pp. 1-6.
    • (2015) Proc. IEEE Global Commun. Conf. (GLOBECOM), Dec. , pp. 1-6
    • Yeoh, P.L.1    Yang, N.2    Kim, K.J.3
  • 30
    • 84910151447 scopus 로고    scopus 로고
    • Secure transmission with antenna selection in MIMO Nakagami-m fading channels
    • Nov.
    • L. Wang, M. Elkashlan, J. Huang, R. Schober, and R. K. Mallik, "Secure transmission with antenna selection in MIMO Nakagami-m fading channels, " IEEE Trans. Wireless Commun., vol. 13, no. 11, pp. 6054-6067, Nov. 2014.
    • (2014) IEEE Trans. Wireless Commun. , vol.13 , Issue.11 , pp. 6054-6067
    • Wang, L.1    Elkashlan, M.2    Huang, J.3    Schober, R.4    Mallik, R.K.5
  • 32
    • 84949922478 scopus 로고    scopus 로고
    • Relay authentication by exploiting I/Q imbalance in amplify-and-forward system
    • P. Hao, X. Wang, and A. Behnad, "Relay authentication by exploiting I/Q imbalance in amplify-and-forward system, " in Proc. IEEE Global Commun. Conf. (GLOBECOM), Dec. 2014, pp. 613-618.
    • (2014) Proc. IEEE Global Commun. Conf. (GLOBECOM), Dec. , pp. 613-618
    • Hao, P.1    Wang, X.2    Behnad, A.3
  • 33
    • 84976492192 scopus 로고    scopus 로고
    • Physical-layer authentication for wireless security enhancement: Current challenges and future developments
    • Jun.
    • X. Wang, P. Hao, and L. Hanzo, "Physical-layer authentication for wireless security enhancement: Current challenges and future developments, " IEEE Commun. Mag., vol. 54, no. 6, pp. 152-158, Jun. 2016.
    • (2016) IEEE Commun. Mag. , vol.54 , Issue.6 , pp. 152-158
    • Wang, X.1    Hao, P.2    Hanzo, L.3
  • 35
    • 16544362849 scopus 로고    scopus 로고
    • Outage mutual information of space-time MIMO channels
    • Apr.
    • Z. Wang and G. B. Giannakis, "Outage mutual information of space-time MIMO channels, " IEEE Trans. Inf. Theory, vol. 50, no. 4, pp. 657-662, Apr. 2004.
    • (2004) IEEE Trans. Inf. Theory , vol.50 , Issue.4 , pp. 657-662
    • Wang, Z.1    Giannakis, G.B.2
  • 36
    • 33644986718 scopus 로고    scopus 로고
    • A simple cooperative diversity method based on network path selection
    • Mar.
    • A. Bletsas, A. Khisti, D. P. Reed, and A. Lippman, "A simple cooperative diversity method based on network path selection, " IEEE J. Sel. Areas Commun., vol. 24, no. 3, pp. 659-672, Mar. 2006.
    • (2006) IEEE J. Sel. Areas Commun. , vol.24 , Issue.3 , pp. 659-672
    • Bletsas, A.1    Khisti, A.2    Reed, D.P.3    Lippman, A.4
  • 38
    • 84919781032 scopus 로고    scopus 로고
    • Random matrix theory and wireless communications
    • A. M. Tulino and S. Verdú, "Random matrix theory and wireless communications, " Found. Trends Commun. Inf. Theory, vol. 1, no. 1, pp. 1-182, 2004.
    • (2004) Found. Trends Commun. Inf. Theory , vol.1 , Issue.1 , pp. 1-182
    • Tulino, A.M.1    Verdú, S.2
  • 40
    • 84860014980 scopus 로고    scopus 로고
    • Secure diversity-multiplexing tradeoff of zero-forcing transmit scheme at finite-SNR
    • Apr.
    • Z. Rezki and M. S. Alouini, "Secure diversity-multiplexing tradeoff of zero-forcing transmit scheme at finite-SNR, " IEEE Trans. Commun., vol. 60, no. 4, pp. 1138-1147, Apr. 2012.
    • (2012) IEEE Trans. Commun. , vol.60 , Issue.4 , pp. 1138-1147
    • Rezki, Z.1    Alouini, M.S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.