Rights statement: This paper is a postprint of a paper submitted to and accepted for publication in IET Communications and is subject to Institution of Engineering and Technology Copyright. The copy of record is available at the IET Digital Library https://digital-library.theiet.org/content/journals/10.1049/iet-com.2019.0767
Accepted author manuscript, 635 KB, PDF document
Available under license: Other
Final published version
Research output: Contribution to Journal/Magazine › Journal article › peer-review
Research output: Contribution to Journal/Magazine › Journal article › peer-review
}
TY - JOUR
T1 - Random linear network coding based physical layer security for relay-aided device-to-device communication
AU - Saeed Khan, Amjad
AU - Chatzigeorgiou, Ioannis
AU - Zheng, Gan
AU - Basulti, Bokamoso
AU - Chuma, Joseph
AU - Lambotharan, Sangarapillai
N1 - This paper is a postprint of a paper submitted to and accepted for publication in IET Communications and is subject to Institution of Engineering and Technology Copyright. The copy of record is available at the IET Digital Library https://digital-library.theiet.org/content/journals/10.1049/iet-com.2019.0767
PY - 2020/4/22
Y1 - 2020/4/22
N2 - We investigate physical layer security design, which employs random linear network coding with opportunistic relaying and jamming to exploit the secrecy benefit of both source and relay transmissions. The proposed scheme requires the source to transmit artificial noise along with a confidential message. Moreover, in order to further improve the dynamical behaviour of the network against an eavesdropping attack, aggregated power controlled transmissions with optimal power allocation strategy is considered. The network security is accurately characterised by the probability that the eavesdropper will manage to intercept a sufficient number of coded packets to partially or fully recover the confidential message.
AB - We investigate physical layer security design, which employs random linear network coding with opportunistic relaying and jamming to exploit the secrecy benefit of both source and relay transmissions. The proposed scheme requires the source to transmit artificial noise along with a confidential message. Moreover, in order to further improve the dynamical behaviour of the network against an eavesdropping attack, aggregated power controlled transmissions with optimal power allocation strategy is considered. The network security is accurately characterised by the probability that the eavesdropper will manage to intercept a sufficient number of coded packets to partially or fully recover the confidential message.
KW - Network coding
KW - Physical layer security
KW - Relay selection
KW - Jamming
KW - Rayleigh fading channel
U2 - 10.1049/iet-com.2019.0767
DO - 10.1049/iet-com.2019.0767
M3 - Journal article
VL - 14
SP - 1155
EP - 1161
JO - IET Communications
JF - IET Communications
SN - 1751-8628
IS - 7
ER -