Abstract

Relay communication is emerging as a promising solution to improving the reliability of long-distance communication systems. However, transmitting data in a secure way is challenging due to the possibility of eavesdroppers wiretapping such systems. To address the challenge, this paper proposes a joint secure transmission and graph mobility model. With the proposed model, the secrecy rate of the resource-constrained two-way wiretap channel mobile relay system is formulated as a mixed integer nonlinear programming (MINLP) problem. Furthermore, efficient algorithms that achieve a local optimal solution are derived. Numerical results are provided to validate the performance of the proposed algorithms.

Highlights

  • Two-way secure relay system needs further investigation, and this paper presents an investigation of the secrecy rate region of a ground mobile vehicle-based relay system, which remains an open problem

  • To quantify the performance gain brought by our scheme, this paper proposes a twoway secure transmission and a graph mobility model, as well as formulating a secrecy rate maximization optimization problem with resource allocations incorporating path planning constraints, which represents a mixed integer nonlinear programming (MINLP) problem

  • The two-way wireless secure transmission mobile relay system shown in Figure 1 was considered, and it consists of two Internet of Things (IoT) users (Alice and Bob), an eavesdropper (Eve), and a relay

Read more

Summary

Introduction

Resource-constrained two-way communication occurs in a four-node network, where two users exchange information through a relay station under the condition of an eavesdropper wiretapping the channels. This four-node relay-eavesdropper network has been widely studied [1,2,3,4,5], and with the help of relay, the network is able to adjust its uplink and downlink channels and improves the system security. With the rapid development of Internet of Things (IoT), huge numbers of long-distance sensors need to interact with each other to jointly complete tasks [6] Resources such as time and energy in this type of cooperative sensor network are important factors that need to be carefully considered. The resource-constrained relay-eavesdropper network is becoming a novel interesting research topic and is attracting considerable attention

Methods
Results
Discussion
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.