Home > Research > Publications & Outputs > Opportunistic relaying and random linear networ...

Electronic data

  • TWC_2017_2764891_CameraReady

    Accepted author manuscript, 442 KB, PDF document

    Available under license: CC BY: Creative Commons Attribution 4.0 International License

Links

Text available via DOI:

View graph of relations

Opportunistic relaying and random linear network coding for secure and reliable communication

Research output: Contribution to journalJournal article

Published

Standard

Opportunistic relaying and random linear network coding for secure and reliable communication. / Khan, Amjad Saeed; Chatzigeorgiou, Ioannis.

In: IEEE Transactions on Wireless Communications, Vol. 17, No. 1, 01.2018, p. 223-234.

Research output: Contribution to journalJournal article

Harvard

APA

Vancouver

Author

Khan, Amjad Saeed ; Chatzigeorgiou, Ioannis. / Opportunistic relaying and random linear network coding for secure and reliable communication. In: IEEE Transactions on Wireless Communications. 2018 ; Vol. 17, No. 1. pp. 223-234.

Bibtex

@article{a83653cf40aa42f2890d5b3d4704f688,
title = "Opportunistic relaying and random linear network coding for secure and reliable communication",
abstract = "Opportunistic relaying has the potential to achieve full diversity gain, while random linear network coding (RLNC) can reduce latency and energy consumption. In recent years, there has been a growing interest in the integration of both schemes into wireless networks in order to reap their benefits, while considering security concerns. This paper considers a multi-relay network, where relay nodes employ RLNC to encode confidential data and transmit coded packets to a destination in the presence of an eavesdropper. Four relay selection protocols are studied covering a range of network capabilities, such as the availability of the eavesdropper's channel state information or the possibility to pair the selected relay with a node that intentionally generates interference. For each case, expressions for the probability that a coded packet will not be recovered by a receiver, which can be either the destination or the eavesdropper, are derived. Based on those expressions, a framework is developed that characterizes the probability of the eavesdropper intercepting a sufficient number of coded packets and partially or fully recovering the confidential data. Simulation results confirm the validity and accuracy of the theoretical framework and unveil the security-reliability trade-offs attained by each RLNC-enabled relay selection protocol.",
keywords = "Relay selection, Network coding, Outage probability, Physical layer security, intercept probability",
author = "Khan, {Amjad Saeed} and Ioannis Chatzigeorgiou",
note = "{\circledC}2017 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.",
year = "2018",
month = "1",
doi = "10.1109/TWC.2017.2764891",
language = "English",
volume = "17",
pages = "223--234",
journal = "IEEE Transactions on Wireless Communications",
issn = "1536-1276",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
number = "1",

}

RIS

TY - JOUR

T1 - Opportunistic relaying and random linear network coding for secure and reliable communication

AU - Khan, Amjad Saeed

AU - Chatzigeorgiou, Ioannis

N1 - ©2017 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.

PY - 2018/1

Y1 - 2018/1

N2 - Opportunistic relaying has the potential to achieve full diversity gain, while random linear network coding (RLNC) can reduce latency and energy consumption. In recent years, there has been a growing interest in the integration of both schemes into wireless networks in order to reap their benefits, while considering security concerns. This paper considers a multi-relay network, where relay nodes employ RLNC to encode confidential data and transmit coded packets to a destination in the presence of an eavesdropper. Four relay selection protocols are studied covering a range of network capabilities, such as the availability of the eavesdropper's channel state information or the possibility to pair the selected relay with a node that intentionally generates interference. For each case, expressions for the probability that a coded packet will not be recovered by a receiver, which can be either the destination or the eavesdropper, are derived. Based on those expressions, a framework is developed that characterizes the probability of the eavesdropper intercepting a sufficient number of coded packets and partially or fully recovering the confidential data. Simulation results confirm the validity and accuracy of the theoretical framework and unveil the security-reliability trade-offs attained by each RLNC-enabled relay selection protocol.

AB - Opportunistic relaying has the potential to achieve full diversity gain, while random linear network coding (RLNC) can reduce latency and energy consumption. In recent years, there has been a growing interest in the integration of both schemes into wireless networks in order to reap their benefits, while considering security concerns. This paper considers a multi-relay network, where relay nodes employ RLNC to encode confidential data and transmit coded packets to a destination in the presence of an eavesdropper. Four relay selection protocols are studied covering a range of network capabilities, such as the availability of the eavesdropper's channel state information or the possibility to pair the selected relay with a node that intentionally generates interference. For each case, expressions for the probability that a coded packet will not be recovered by a receiver, which can be either the destination or the eavesdropper, are derived. Based on those expressions, a framework is developed that characterizes the probability of the eavesdropper intercepting a sufficient number of coded packets and partially or fully recovering the confidential data. Simulation results confirm the validity and accuracy of the theoretical framework and unveil the security-reliability trade-offs attained by each RLNC-enabled relay selection protocol.

KW - Relay selection

KW - Network coding

KW - Outage probability

KW - Physical layer security

KW - intercept probability

U2 - 10.1109/TWC.2017.2764891

DO - 10.1109/TWC.2017.2764891

M3 - Journal article

VL - 17

SP - 223

EP - 234

JO - IEEE Transactions on Wireless Communications

JF - IEEE Transactions on Wireless Communications

SN - 1536-1276

IS - 1

ER -