메뉴 건너뛰기




Volumn 66, Issue 6, 2018, Pages 2671-2684

Optimal Power Allocation and Secrecy Sum Rate in Two-Way Untrusted Relaying Networks with an External Jammer

Author keywords

external jammer; optimal power allocation; Physical layer security; two way untrusted relaying

Indexed keywords

ANTENNAS; COMMUNICATION CHANNELS (INFORMATION THEORY); FADING CHANNELS; GAUSSIAN NOISE (ELECTRONIC); JAMMING; MULTIUSER DETECTION; NETWORK LAYERS; RAYLEIGH FADING;

EID: 85041540715     PISSN: 00906778     EISSN: None     Source Type: Journal    
DOI: 10.1109/TCOMM.2018.2802951     Document Type: Article
Times cited : (58)

References (37)
  • 1
    • 84959499960 scopus 로고    scopus 로고
    • Wireless physical-layer security: Lessons learned from information theory
    • Oct
    • A. Yener and S. Ulukus, "Wireless physical-layer security: Lessons learned from information theory," Proc. IEEE, vol. 103, no. 10, pp. 1814-1825, Oct. 2015.
    • (2015) Proc. IEEE , vol.103 , Issue.10 , pp. 1814-1825
    • Yener, A.1    Ulukus, S.2
  • 2
    • 84922896499 scopus 로고    scopus 로고
    • Hybrid opportunistic relaying and jamming with power allocation for secure cooperative networks
    • Feb
    • C. Wang, H.-M. Wang, and X.-G. Xia, "Hybrid opportunistic relaying and jamming with power allocation for secure cooperative networks," IEEE Trans. Wireless Commun., vol. 14, no. 2, pp. 589-605, Feb. 2015.
    • (2015) IEEE Trans. Wireless Commun. , vol.14 , Issue.2 , pp. 589-605
    • Wang, C.1    Wang, H.-M.2    Xia, X.-G.3
  • 3
    • 84927712570 scopus 로고    scopus 로고
    • Safeguarding 5G wireless communication networks using physical layer security
    • Apr
    • N. Yang, L. Wang, G. Geraci, M. Elkashlan, J. Yuan, and M. Di Renzo, "Safeguarding 5G wireless communication networks using physical layer security," IEEE Commun. Mag., vol. 53, no. 4, pp. 20-27, Apr. 2015.
    • (2015) IEEE Commun. Mag. , vol.53 , Issue.4 , pp. 20-27
    • Yang, N.1    Wang, L.2    Geraci, G.3    Elkashlan, M.4    Yuan, J.5    Di Renzo, M.6
  • 4
    • 84961815117 scopus 로고    scopus 로고
    • Physical layer security in wireless cooperative relay networks: State of the art and beyond
    • Dec
    • L. J. Rodriguez, N. H. Tran, T. Q. Duong, T. Le-Ngoc, M. Elkashlan, and S. Shetty, "Physical layer security in wireless cooperative relay networks: State of the art and beyond," IEEE Commun. Mag., vol. 53, no. 12, pp. 32-39, Dec. 2015.
    • (2015) IEEE Commun. Mag. , vol.53 , Issue.12 , pp. 32-39
    • Rodriguez, L.J.1    Tran, N.H.2    Duong, T.Q.3    Le-Ngoc, T.4    Elkashlan, M.5    Shetty, S.6
  • 5
    • 84938932265 scopus 로고    scopus 로고
    • Coding for relay channels with confidential messages
    • Sep
    • Y. Oohama, "Coding for relay channels with confidential messages," in Proc. Inf. Theory Workshop, Sep. 2001, pp. 87-89.
    • (2001) Proc. Inf. Theory Workshop , pp. 87-89
    • Oohama, Y.1
  • 6
    • 67249087217 scopus 로고    scopus 로고
    • Two-hop secure communication using an untrusted relay: A case for cooperative jamming
    • New Orleans, LA, USA, Dec
    • X. He and A. Yener, "Two-hop secure communication using an untrusted relay: A case for cooperative jamming," in Proc. IEEE Global Telecommun. Conf. (GLOBECOM), New Orleans, LA, USA, Dec. 2008, pp. 1-5.
    • (2008) Proc. IEEE Global Telecommun. Conf. (GLOBECOM) , pp. 1-5
    • He, X.1    Yener, A.2
  • 7
    • 76649135514 scopus 로고    scopus 로고
    • Physical layer security game: Interaction between source, eavesdropper, and friendly jammer
    • Mar
    • Z. Han, N. Marina, M. Debbah, and A. Hjørungnes, "Physical layer security game: Interaction between source, eavesdropper, and friendly jammer," EURASIP J. Wireless Commun. Netw., vol. 2009, pp. 452907-1-452907-10, Mar. 2009.
    • (2009) EURASIP J. Wireless Commun. Netw. , vol.2009 , pp. 4529071-45290710
    • Han, Z.1    Marina, N.2    Debbah, M.3    Hjørungnes, A.4
  • 8
    • 84891350212 scopus 로고    scopus 로고
    • Cooperative jamming protocols in two hop amplify-and-forward wiretap channels
    • Budapest, Hungary, Nov
    • D. Fang, N. Yang, M. Elkashlan, P. L. Yeoh, and J. Yuan, "Cooperative jamming protocols in two hop amplify-and-forward wiretap channels," in Proc. IEEE Int. Conf. Commun. (ICC), Budapest, Hungary, Nov. 2013, pp. 2188-2192.
    • (2013) Proc. IEEE Int. Conf. Commun. (ICC) , pp. 2188-2192
    • Fang, D.1    Yang, N.2    Elkashlan, M.3    Yeoh, P.L.4    Yuan, J.5
  • 9
    • 45249101530 scopus 로고    scopus 로고
    • The general Gaussian multiple-access and twoway wiretap channels: Achievable rates and cooperative jamming
    • Jun
    • E. Tekin and A. Yener, "The general Gaussian multiple-access and twoway wiretap channels: Achievable rates and cooperative jamming," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2735-2751, Jun. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2735-2751
    • Tekin, E.1    Yener, A.2
  • 10
    • 84982305842 scopus 로고    scopus 로고
    • Joint relay and jammer selection improves the physical layer security in the face of CSI feedback delays
    • Aug
    • L. Wang, Y. Cai, Y. Zou, W. Yang, and L. Hanzo, "Joint relay and jammer selection improves the physical layer security in the face of CSI feedback delays," IEEE Trans. Veh. Technol., vol. 65, no. 8, pp. 6259-6274, Aug. 2016.
    • (2016) IEEE Trans. Veh. Technol. , vol.65 , Issue.8 , pp. 6259-6274
    • Wang, L.1    Cai, Y.2    Zou, Y.3    Yang, W.4    Hanzo, L.5
  • 11
    • 85029212593 scopus 로고    scopus 로고
    • Antieavesdropping with selfish jamming in wireless networks: A bertrand game approach
    • Jul
    • K. Wang, L. Yuan, T. Miyazaki, S. Guo, and Y. Sun, "Antieavesdropping with selfish jamming in wireless networks: A bertrand game approach," IEEE Trans. Veh. Technol., vol. 66, no. 7, pp. 6268-6279, Jul. 2017.
    • (2017) IEEE Trans. Veh. Technol. , vol.66 , Issue.7 , pp. 6268-6279
    • Wang, K.1    Yuan, L.2    Miyazaki, T.3    Guo, S.4    Sun, Y.5
  • 12
    • 84877718412 scopus 로고    scopus 로고
    • Secure communication via an untrusted non-regenerative relay in fading channels
    • May
    • J. Huang, A. Mukherjee, and A. L. Swindlehurst, "Secure communication via an untrusted non-regenerative relay in fading channels," IEEE Trans. Signal Process., vol. 61, no. 10, pp. 2536-2550, May 2013.
    • (2013) IEEE Trans. Signal Process. , vol.61 , Issue.10 , pp. 2536-2550
    • Huang, J.1    Mukherjee, A.2    Swindlehurst, A.L.3
  • 13
    • 84903317482 scopus 로고    scopus 로고
    • Secure transmission with optimal power allocation in untrusted relay networks
    • Jun
    • L. Wang, M. Elkashlan, J. Huang, N. H. Tran, and T. Q. Duong, "Secure transmission with optimal power allocation in untrusted relay networks," IEEE Wireless Commun. Lett., vol. 3, no. 3, pp. 289-292, Jun. 2014.
    • (2014) IEEE Wireless Commun. Lett. , vol.3 , Issue.3 , pp. 289-292
    • Wang, L.1    Elkashlan, M.2    Huang, J.3    Tran, N.H.4    Duong, T.Q.5
  • 14
    • 84969546646 scopus 로고    scopus 로고
    • Optimal power allocation to improve secrecy performance of non-regenerative cooperative systems using an untrusted relay
    • May
    • A. Kuhestani, A. Mohammadi, and M. Noori, "Optimal power allocation to improve secrecy performance of non-regenerative cooperative systems using an untrusted relay," IET Commun., vol. 10, no. 8, pp. 962-968, May 2016.
    • (2016) IET Commun. , vol.10 , Issue.8 , pp. 962-968
    • Kuhestani, A.1    Mohammadi, A.2    Noori, M.3
  • 15
    • 84867800602 scopus 로고    scopus 로고
    • Performance study of two-hop amplify-and-forward systems with untrustworthy relay nodes
    • Oct
    • L. Sun, T. Zhang, Y. Li, and N. Niu, "Performance study of two-hop amplify-and-forward systems with untrustworthy relay nodes," IEEE Trans. Veh. Technol., vol. 61, no. 8, pp. 3801-3807, Oct. 2012.
    • (2012) IEEE Trans. Veh. Technol. , vol.61 , Issue.8 , pp. 3801-3807
    • Sun, L.1    Zhang, T.2    Li, Y.3    Niu, N.4
  • 16
    • 84937132656 scopus 로고    scopus 로고
    • Capacity scaling and diversity order for secure cooperative relaying with untrustworthy relays
    • Jul
    • J.-B. Kim, J. Lim, and J. M. Cioffi, "Capacity scaling and diversity order for secure cooperative relaying with untrustworthy relays," IEEE Trans. Wireless Commun., vol. 14, no. 7, pp. 3866-3876, Jul. 2015.
    • (2015) IEEE Trans. Wireless Commun. , vol.14 , Issue.7 , pp. 3866-3876
    • Kim, J.-B.1    Lim, J.2    Cioffi, J.M.3
  • 17
    • 85029158278 scopus 로고    scopus 로고
    • Joint relay selection and power allocation in large-scale MIMO systems with untrusted relays and passive eavesdroppers
    • Feb
    • A. Kuhestani, A. Mohammadi, and M. Mohammadi, "Joint relay selection and power allocation in large-scale MIMO systems with untrusted relays and passive eavesdroppers," IEEE Trans. Inf. Forensics Security, vol. 13, no. 2, pp. 341-355, Feb. 2018.
    • (2018) IEEE Trans. Inf. Forensics Security , vol.13 , Issue.2 , pp. 341-355
    • Kuhestani, A.1    Mohammadi, A.2    Mohammadi, M.3
  • 18
    • 84961675624 scopus 로고    scopus 로고
    • Joint optimal power allocation and relay selection to establish secure transmission in uplink transmission of untrusted relays network
    • Mar
    • A. Kuhestani, A. Mohammadi, and M. Masoudi, "Joint optimal power allocation and relay selection to establish secure transmission in uplink transmission of untrusted relays network," IET Netw., vol. 5, no. 2, pp. 30-36, Mar. 2016.
    • (2016) IET Netw. , vol.5 , Issue.2 , pp. 30-36
    • Kuhestani, A.1    Mohammadi, A.2    Masoudi, M.3
  • 19
    • 84994153133 scopus 로고    scopus 로고
    • EE-RS and PA for untrusted relay network at high signal-to-noise ratio regime
    • Oct
    • H. Zarrabi, A. Kuhestani, and M. Moradikia, "EE-RS and PA for untrusted relay network at high signal-to-noise ratio regime," IET Commun., vol. 10, no. 16, pp. 2143-2148, Oct. 2016.
    • (2016) IET Commun. , vol.10 , Issue.16 , pp. 2143-2148
    • Zarrabi, H.1    Kuhestani, A.2    Moradikia, M.3
  • 20
    • 84937019957 scopus 로고    scopus 로고
    • Resource management based on security satisfaction ratio with fairness-aware in two-way relay networks
    • Jan
    • J. Zhao, Z. Lu, X. Wen, H. Zhang, S. He, and W. Jing, "Resource management based on security satisfaction ratio with fairness-aware in two-way relay networks," Int. J. Distrib. Sensor Netw., vol. 2015, no. 11, pp. 1-11, Jan. 2015.
    • (2015) Int. J. Distrib. Sensor Netw. , vol.2015 , Issue.11 , pp. 1-11
    • Zhao, J.1    Lu, Z.2    Wen, X.3    Zhang, H.4    He, S.5    Jing, W.6
  • 21
    • 84877685502 scopus 로고    scopus 로고
    • Secure resource allocation for OFDMA two-way relay networks
    • Anaheim, CA, USA, Dec
    • H. Zhang, H. Xing, X. Chu, A. Nallanathan, W. Zheng, and X. Wen, "Secure resource allocation for OFDMA two-way relay networks," in Proc. IEEE Globecom, Anaheim, CA, USA, Dec. 2012, pp. 3649-3654.
    • (2012) Proc. IEEE Globecom , pp. 3649-3654
    • Zhang, H.1    Xing, H.2    Chu, X.3    Nallanathan, A.4    Zheng, W.5    Wen, X.6
  • 22
    • 85027732333 scopus 로고    scopus 로고
    • Secure resource allocation for OFDMA two-way relay wireless sensor networks without and with cooperative jamming
    • Oct
    • H. Zhang, H. Xing, J. Cheng, A. Nallanathan, and V. C. M. Leung, "Secure resource allocation for OFDMA two-way relay wireless sensor networks without and with cooperative jamming," IEEE Trans. Ind. Informat., vol. 12, no. 5, pp. 1714-1725, Oct. 2016.
    • (2016) IEEE Trans. Ind. Informat. , vol.12 , Issue.5 , pp. 1714-1725
    • Zhang, H.1    Xing, H.2    Cheng, J.3    Nallanathan, A.4    Leung, V.C.M.5
  • 23
    • 84940732183 scopus 로고    scopus 로고
    • Resource allocation for OFDMA two-way relay networks with the smart grid
    • Sydney, NSW, Australia, Sep
    • D. Zhan, H. Zhang, Z. Lu, X. Wen, and Y. Chen, "Resource allocation for OFDMA two-way relay networks with the smart grid," in Proc. IEEE Wireless Pers. Multimedia Commun. (WPMC), Sydney, NSW, Australia, Sep. 2014, pp. 657-662.
    • (2014) Proc. IEEE Wireless Pers. Multimedia Commun. (WPMC) , pp. 657-662
    • Zhan, D.1    Zhang, H.2    Lu, Z.3    Wen, X.4    Chen, Y.5
  • 24
    • 84867799883 scopus 로고    scopus 로고
    • Physical layer security for two-way untrusted relaying with friendly jammers
    • Oct
    • R. Zhang, L. Song, Z. Han, and B. Jiao, "Physical layer security for two-way untrusted relaying with friendly jammers," IEEE Trans. Veh. Technol., vol. 61, no. 8, pp. 3693-3704, Oct. 2012.
    • (2012) IEEE Trans. Veh. Technol. , vol.61 , Issue.8 , pp. 3693-3704
    • Zhang, R.1    Song, L.2    Han, Z.3    Jiao, B.4
  • 25
    • 84901257838 scopus 로고    scopus 로고
    • Joint transmit design and node selection for one-way and two-way untrusted relay channels
    • Syst. Comput., Nov
    • J. Huang and A. L. Swindlehurst, "Joint transmit design and node selection for one-way and two-way untrusted relay channels," in Proc. Asilomar Conf. Signals, Syst. Comput., Nov. 2013, pp. 1555-1559.
    • (2013) Proc. Asilomar Conf. Signals , pp. 1555-1559
    • Huang, J.1    Swindlehurst, A.L.2
  • 26
    • 84898039745 scopus 로고    scopus 로고
    • Secure beamforming for MIMO two-way communications with an untrusted relay
    • May
    • J. Mo, M. Tao, Y. Liu, and R. Wang, "Secure beamforming for MIMO two-way communications with an untrusted relay," IEEE Trans. Signal Process., vol. 62, no. 9, pp. 2185-2199, May 2014.
    • (2014) IEEE Trans. Signal Process. , vol.62 , Issue.9 , pp. 2185-2199
    • Mo, J.1    Tao, M.2    Liu, Y.3    Wang, R.4
  • 27
    • 85009956145 scopus 로고    scopus 로고
    • Ergodic sum rate analysis and efficient power allocation for a massive MIMO two-way relay network
    • Jan
    • K. P. Roshandeh, A. Kuhestani, M. Ardakani, and C. Tellambura, "Ergodic sum rate analysis and efficient power allocation for a massive MIMO two-way relay network," IET Commun., vol. 11, no. 2, pp. 211-217, Jan. 2017.
    • (2017) IET Commun. , vol.11 , Issue.2 , pp. 211-217
    • Roshandeh, K.P.1    Kuhestani, A.2    Ardakani, M.3    Tellambura, C.4
  • 28
    • 85046342087 scopus 로고    scopus 로고
    • Optimal power allocation and secrecy sum rate in two-way untrusted relaying
    • Singapore, Dec
    • A. Kuhestani, P. L. Yeoh, and A. Mohammadi, "Optimal power allocation and secrecy sum rate in two-way untrusted relaying," in Proc. IEEE Globecom, Singapore, Dec. 2017, pp. 1-5.
    • (2017) Proc. IEEE Globecom , pp. 1-5
    • Kuhestani, A.1    Yeoh, P.L.2    Mohammadi, A.3
  • 29
    • 84928642759 scopus 로고    scopus 로고
    • Secure compute-andforward in a bidirectional relay
    • May
    • S. Vatedka, N. Kashyap, and A. Thangaraj, "Secure compute-andforward in a bidirectional relay," IEEE Trans. Inf. Theory, vol. 61, no. 5, pp. 2531-2556, May 2015.
    • (2015) IEEE Trans. Inf. Theory , vol.61 , Issue.5 , pp. 2531-2556
    • Vatedka, S.1    Kashyap, N.2    Thangaraj, A.3
  • 30
    • 84928974649 scopus 로고    scopus 로고
    • Weak secrecy in the multiway untrusted relay channel with computeand-forward
    • Jun
    • J. Richter, C. Scheunert, S. Engelmann, and E. A. Jorswieck, "Weak secrecy in the multiway untrusted relay channel with computeand-forward," IEEE Trans. Inf. Forensics Security, vol. 10, no. 6, pp. 1262-1273, Jun. 2015.
    • (2015) IEEE Trans. Inf. Forensics Security , vol.10 , Issue.6 , pp. 1262-1273
    • Richter, J.1    Scheunert, C.2    Engelmann, S.3    Jorswieck, E.A.4
  • 31
    • 77958083375 scopus 로고    scopus 로고
    • Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation
    • Oct
    • X. Zhou and M. R. McKay, "Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation," IEEE Trans. Veh. Technol., vol. 59, no. 8, pp. 3831-3842, Oct. 2010.
    • (2010) IEEE Trans. Veh. Technol. , vol.59 , Issue.8 , pp. 3831-3842
    • Zhou, X.1    McKay, M.R.2
  • 32
    • 67651180823 scopus 로고    scopus 로고
    • Performance analysis of beamforming in two hop amplify and forward relay networks with antenna correlation
    • Jun
    • R. H. Y. Louie, Y. Li, H. A. Suraweera, and B. Vucetic, "Performance analysis of beamforming in two hop amplify and forward relay networks with antenna correlation," IEEE Trans. Wireless Commun., vol. 8, no. 6, pp. 3132-3141, Jun. 2009.
    • (2009) IEEE Trans. Wireless Commun. , vol.8 , Issue.6 , pp. 3132-3141
    • Louie, R.H.Y.1    Li, Y.2    Suraweera, H.A.3    Vucetic, B.4
  • 33
    • 84893403880 scopus 로고    scopus 로고
    • Physical layer security of maximal ratio combining in two-wave with diffuse power fading channels
    • Feb
    • L. Wang, N. Yang, M. Elkashlan, P. L. Yeoh, and J. Yuan, "Physical layer security of maximal ratio combining in two-wave with diffuse power fading channels," IEEE Trans. Inf. Forensics Security, vol. 9, no. 2, pp. 247-258, Feb. 2014.
    • (2014) IEEE Trans. Inf. Forensics Security , vol.9 , Issue.2 , pp. 247-258
    • Wang, L.1    Yang, N.2    Elkashlan, M.3    Yeoh, P.L.4    Yuan, J.5
  • 35
    • 84919781032 scopus 로고    scopus 로고
    • Random matrix theory and wireless communications
    • A. M. Tulino and S. Verdú, "Random matrix theory and wireless communications," Found. Trends Commun. Inf. Theory, vol. 1, no. 1, pp. 1-182, 2004.
    • (2004) Found. Trends Commun. Inf. Theory , vol.1 , Issue.1 , pp. 1-182
    • Tulino, A.M.1    Verdú, S.2
  • 36
    • 84881085687 scopus 로고    scopus 로고
    • An accurate approximation of the exponential integral function using a sum of exponentials
    • Jul
    • A. A. Alkheir and M. Ibnkahla, "An accurate approximation of the exponential integral function using a sum of exponentials," IEEE Commun. Lett., vol. 17, no. 7, pp. 1364-1367, Jul. 2013.
    • (2013) IEEE Commun. Lett. , vol.17 , Issue.7 , pp. 1364-1367
    • Alkheir, A.A.1    Ibnkahla, M.2
  • 37
    • 84964855005 scopus 로고    scopus 로고
    • Secrecy outage probability of selective relaying wiretap channels with collaborative eavesdropping
    • San Diego, CA, USA, Dec
    • P. L. Yeoh, N. Yang, and K. J. Kim, "Secrecy outage probability of selective relaying wiretap channels with collaborative eavesdropping," in Proc. IEEE Globecom, San Diego, CA, USA, Dec. 2015, pp. 1-6.
    • (2015) Proc. IEEE Globecom , pp. 1-6
    • Yeoh, P.L.1    Yang, N.2    Kim, K.J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.