Home > Research > Publications & Outputs > Physical layer security using two-path successi...

Links

Text available via DOI:

View graph of relations

Physical layer security using two-path successive relaying

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Published

Standard

Physical layer security using two-path successive relaying. / Liau, Qian Yu; Leow, Chee Yen; Ding, Zhiguo.
In: Sensors, Vol. 16, No. 6, 846, 09.06.2016.

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Harvard

APA

Vancouver

Liau QY, Leow CY, Ding Z. Physical layer security using two-path successive relaying. Sensors. 2016 Jun 9;16(6):846. doi: 10.3390/s16060846

Author

Bibtex

@article{673b6b74a1934f1b8071339f945e18a2,
title = "Physical layer security using two-path successive relaying",
abstract = "Relaying is one of the useful techniques to enhance wireless physical-layer security. Existing literature shows that employing full-duplex relay instead of conventional half-duplex relay improves secrecy capacity and secrecy outage probability, but this is at the price of sophisticated implementation. As an alternative, two-path successive relaying has been proposed to emulate operation of full-duplex relay by scheduling a pair of half-duplex relays to assist the source transmission alternately. However, the performance of two-path successive relaying in secrecy communication remains unexplored. This paper proposes a secrecy two-path successive relaying protocol for a scenario with one source, one destination and two half-duplex relays. The relays operate alternately in a time division mode to forward messages continuously from source to destination in the presence of an eavesdropper. Analytical results reveal that the use of two half-duplex relays in the proposed scheme contributes towards a quadratically lower probability of interception compared to full-duplex relaying. Numerical simulations show that the proposed protocol achieves the ergodic achievable secrecy rate of full-duplex relaying while delivering the lowest probability of interception and secrecy outage probability compared to the existing half duplex relaying, full duplex relaying and full duplex jamming schemes.",
keywords = "wireless sensor network, 5G, physical layer secrecy, cooperative relay networks, two-path successive relaying, secrecy capacity, intercept probability , secrecy outage probability",
author = "Liau, {Qian Yu} and Leow, {Chee Yen} and Zhiguo Ding",
year = "2016",
month = jun,
day = "9",
doi = "10.3390/s16060846",
language = "English",
volume = "16",
journal = "Sensors",
issn = "1424-8220",
publisher = "Multidisciplinary Digital Publishing Institute (MDPI)",
number = "6",

}

RIS

TY - JOUR

T1 - Physical layer security using two-path successive relaying

AU - Liau, Qian Yu

AU - Leow, Chee Yen

AU - Ding, Zhiguo

PY - 2016/6/9

Y1 - 2016/6/9

N2 - Relaying is one of the useful techniques to enhance wireless physical-layer security. Existing literature shows that employing full-duplex relay instead of conventional half-duplex relay improves secrecy capacity and secrecy outage probability, but this is at the price of sophisticated implementation. As an alternative, two-path successive relaying has been proposed to emulate operation of full-duplex relay by scheduling a pair of half-duplex relays to assist the source transmission alternately. However, the performance of two-path successive relaying in secrecy communication remains unexplored. This paper proposes a secrecy two-path successive relaying protocol for a scenario with one source, one destination and two half-duplex relays. The relays operate alternately in a time division mode to forward messages continuously from source to destination in the presence of an eavesdropper. Analytical results reveal that the use of two half-duplex relays in the proposed scheme contributes towards a quadratically lower probability of interception compared to full-duplex relaying. Numerical simulations show that the proposed protocol achieves the ergodic achievable secrecy rate of full-duplex relaying while delivering the lowest probability of interception and secrecy outage probability compared to the existing half duplex relaying, full duplex relaying and full duplex jamming schemes.

AB - Relaying is one of the useful techniques to enhance wireless physical-layer security. Existing literature shows that employing full-duplex relay instead of conventional half-duplex relay improves secrecy capacity and secrecy outage probability, but this is at the price of sophisticated implementation. As an alternative, two-path successive relaying has been proposed to emulate operation of full-duplex relay by scheduling a pair of half-duplex relays to assist the source transmission alternately. However, the performance of two-path successive relaying in secrecy communication remains unexplored. This paper proposes a secrecy two-path successive relaying protocol for a scenario with one source, one destination and two half-duplex relays. The relays operate alternately in a time division mode to forward messages continuously from source to destination in the presence of an eavesdropper. Analytical results reveal that the use of two half-duplex relays in the proposed scheme contributes towards a quadratically lower probability of interception compared to full-duplex relaying. Numerical simulations show that the proposed protocol achieves the ergodic achievable secrecy rate of full-duplex relaying while delivering the lowest probability of interception and secrecy outage probability compared to the existing half duplex relaying, full duplex relaying and full duplex jamming schemes.

KW - wireless sensor network

KW - 5G

KW - physical layer secrecy

KW - cooperative relay networks

KW - two-path successive relaying

KW - secrecy capacity

KW - intercept probability

KW - secrecy outage probability

U2 - 10.3390/s16060846

DO - 10.3390/s16060846

M3 - Journal article

VL - 16

JO - Sensors

JF - Sensors

SN - 1424-8220

IS - 6

M1 - 846

ER -