Abstract

Opportunistic relaying has the potential to achieve full diversity gain, while random linear network coding (RLNC) can reduce latency and energy consumption. In recent years, there has been a growing interest in the integration of both schemes into wireless networks in order to reap their benefits, while considering security concerns. This paper considers a multi-relay network, where relay nodes employ RLNC to encode confidential data and transmit coded packets to a destination in the presence of an eavesdropper. Four relay selection protocols are studied covering a range of network capabilities, such as the availability of the eavesdropper's channel state information or the possibility to pair the selected relay with a node that intentionally generates interference. For each case, expressions for the probability that a coded packet will not be recovered by a receiver, which can be either the destination or the eavesdropper, are derived. Based on those expressions, a framework is developed that characterizes the probability of the eavesdropper intercepting a sufficient number of coded packets and partially or fully recovering the confidential data. Simulation results confirm the validity and accuracy of the theoretical framework and unveil the security-reliability trade-offs attained by each RLNC-enabled relay selection protocol.

Highlights

  • The dynamic nature of the wireless medium often introduces problems to the operation of wireless networks, which are related to node connectivity, communication reliability and robustness [1]

  • The secrecy performance of the system, which is reflected by the intercept probability at the eavesdropper, and the reliability performance of the system, which is associated with the outage probability of the link between the selected relay and the destination and the decoding probability at the destination, are discussed

  • In order to address the vulnerability of wireless communication networks against eavesdropping attacks, we developed a framework that combines random linear network coding at the application layer and physical-layer security in the form of relay selection with or without cooperative jamming

Read more

Summary

INTRODUCTION

The dynamic nature of the wireless medium often introduces problems to the operation of wireless networks, which are related to node connectivity, communication reliability and robustness [1]. Even though opportunistic relaying and RLNC have the potential to improve energy efficiency and link reliability, the broadcast nature of the wireless medium renders data transmission to an authorized destination vulnerable to eavesdropping. The motivation for this paper is to investigate the potential of relay-aided networks that combine RLNC with opportunistic relaying, with or without cooperative jamming, in securely and reliably delivering confidential messages. To this end, we consider four different relay selection protocols, we analyze their outage behavior and we quantify the proportion of the message that could leak to the eavesdropper with a certain probability by the time the legitimate destination has recovered the entire message with a target probability.

SYSTEM MODEL
RELAY SELECTION AND OUTAGE ANALYSIS
Relay Selection Protocols without Jammer
Relay Selection Protocols with Jammer
Preliminaries
Derivation of the τ -intercept probability
RESULTS AND DISCUSSION
CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.