Journal of Sensors

Journal of Sensors / 2017 / Article
Special Issue

QoS Based Cooperative Communications and Security Mechanisms for Ad Hoc Sensor Networks

View this Special Issue

Research Article | Open Access

Volume 2017 |Article ID 9270907 | 10 pages | https://doi.org/10.1155/2017/9270907

Robust Relay in Narrow-Band Communications for Ubiquitous IoT Access

Academic Editor: Fanli Meng
Received13 Jan 2017
Revised03 Apr 2017
Accepted06 Apr 2017
Published27 Apr 2017

Abstract

We propose a robust wireless relay scheme in narrow-band communications for IoT access, which matches the typical features of IoT often carrying relatively low data rate with limited bandwidth. This framework is towards offering robustness in QoS guarantees with emphases on security and/or reliability, and we use the security-assured network as the typical scenario. In particular, we consider a dual-hop relay network including a transmitter, a receiver, an amplify-and-forward (AF) untrusted relay, and a jamming node. The jamming node is treated as a helper. Specifically, the jammer broadcasts artificial noise (AN), which in fact pollutes both the untrusted relay and the destination node’s signals. However, we show that such AN can be effectively mitigated after the destination node obtains the forwarded signal from the relay, while the untrusted relay node cannot do so. The core idea for robustness assurance is to exploit higher signal dimensions at the receiver over the untrusted relay node. Simulations and analyses are also conducted to demonstrate that our proposed scheme can make the performance at the untrusted relay an interference-limited manner while completely removing the interferences at the receiver, therefore corroborating our claim in robustness in terms of security and reliability.

1. Introduction

In the Internet of Things (IoT) vision, every physical object plays the role in both providing and consuming diverse service resources, making the wireless networks efficiently connected yet highly heterogonous [1]. In a typical wireless access framework for IoT, heterogeneous wireless networks often coexist, especially when the mobile communications evolve to the 5th generation (5G) era. In 5G network, diverse networks, such as macro/small cellular networks [2, 3], vehicular and transportation networks [4, 5], cognitive radio networks [6, 7], and device-to-device networks [810], all need to be effectively integrated to implement seamless communications in future wireless networks. Such an interconnection will bring unprecedented convenience for users as well as economical opportunities for market, but it will also require robust and sophisticated approaches to ensure quality of service (QoS) requirements for services, especially on the security and reliability. On the one hand, the physical accessibility to the large amount of objects and the openness of wireless channels make security assurance for IoT much more challenging than the traditional network. Consequently, a great deal of research efforts have been dedicated to the security of IoT, which cover all protocol layers [1115]. Among diverse security techniques, physical-layer security (PLS), which can take advantage of wireless channels’ features to protect secrecy, has become a research hotspot [1620]. On the other hand, cooperative communications have been widely recognized as a key component to increase the capacity and enhance the reliability for wireless communication systems [2123]. Thus, security and reliability enhancement via physical-layer technologies over cooperative networks have attracted special interests [10, 1820, 2329] in the research community.

While diverse techniques have been developed for security and reliability enhancement [10, 1820, 2329], applying these existing techniques for IoT access still faces the major challenge. Because IoT access often involves low-cost nodes with limited wireless-connecting capability, too much information exchange and too complicated cooperation protocols are hard to implement. This issue imposes the urgent needs on robust and lightweight approaches in cooperative IoT access scenarios with QoS provisioning on reliability as well as security.

To address this problem, we propose a simple yet robust wireless relay scheme with a coexisting jamming node for the narrow-band communications scenario. The narrow-band communications well fit the features of IoT. As IoT communications typically deal with services having relatively low traffic load, narrower bandwidths are often assigned to users so that more simultaneous accesses can be accommodated. Furthermore, unlike the wide-band communications, the narrow-band assignment is immune to the frequency-selective fading, thus benefiting the implementation of low-cost equipment with low processing complexity. In our framework, there are four nodes in the network where the source can potentially utilize an amplify-and-forward (AF) relay to augment the direct link to the destination. In the meantime, there is another node who broadcasts jamming signals (can be also characterized as interfering signals) and actually degrades the quality of the relay’s and destination’s channels. Because the destination is able to obtain high signal dimensions from both direct link and relay transmissions, the jamming signals can be well suppressed.

Our proposed relay scheme with coexisting interferences can be applied in the following two typical cases towards the robustness of security and reliability provisioning, respectively, for IoT access. Security assurance: the transmitted messages need to be kept confidential to the relay that is also termed untrusted relay [2327], even though it fulfils the source’s request by forwarding signals to the destination. The node who broadcasts jamming signals, often modeled by artificial noise (AN), can be seen as a friendly but noncooperative jammer. The friendliness comes from the fact that the jamming signals prevent the untrusted relay from decoding the confidential data. The noncooperation implies that jamming strategy does not vary with the channel state information (CSI) of the network, thus making the protocol simpler and more practical. Interference suppression: for this case, the node broadcasting interfering signals play the role of transmitter of a coexisting link within the same radio band. The destination node can exploit signal dimensions obtained from both direct link and relay link to remove the interference, such that the system is not interference-limited and can successfully fulfil the reliability requirements. In this sense, our scheme is capable of offering robustness in terms of both reliability and security assurance. For convenience, in this paper we use security assurance as the typical framework to present our design.

The rest of this paper is organized as follows. Section 2 describes the system model for our framework towards robust IoT access, with security assurance as the typical scenario. Section 3 studies three detection approaches for our robust relay framework. Section 4 analyzes the upper and/or lower bounds of ergodic secrecy throughput (EST) under diverse detection approaches. In Section 5, we show some simulation results and meaningful discussions. The paper concludes with Section 6.

Some notations used in this paper are summarized as follows. Bold uppercase and bold lowercase letters denote matrices and vectors, respectively. Transpose operation, conjugate transpose, and inverse operation for matrices are denoted by , , and , respectively. is the element of matrix A, is the th element in vector a, and is the estimation of . is the identity matrix of order and is the zero matrix. The subscript on is neglected when the size is obvious from the context. The notation represents Euclidean norm. is logarithm of base . is the expectation operator, denotes the variance of a random variable, and .

2. System Model

A two-hop wireless relay network is considered in this paper, as depicted in Figure 1(a), where there are four nodes in the network, including one source (), one relay (), one destination (), and one jammer (). Each node has only a single transmit antenna and a single receive antenna and operates in the half-duplex fashion. There exists the direct link between the source and destination. In the meantime, the relay node uses the amplify-and-forward (AF) mechanism to assist the source to deliver the data to the destination. The transmit power of each node is set equal to .

As aforementioned, we concentrate on narrow-band communications, and thus wireless channels can be modeled as flat-fading channels. The channel between node and node is characterized by a multiplicative coefficient , which is a zero-mean circularly symmetric complex Gaussian random variable. Note that for , the subscripts and could be , , , and , representing different nodes, but and cannot be the same node simultaneously. All channel coefficients remain constant within one time frame with a fixed length but vary independently from one frame to another. The additive thermal noise at each receiver is characterized by a zero-mean complex Gaussian random variable with variance . Throughout this paper, we define as channel state information (CSI). We further assume that the CSI of all links illustrated in Figure 1(a) can be accurately estimated and are known to the destination node . This assumption is rational as all four users are neighbours to each other within one network. They can periodically exchange CSI to maintain connections to each other and thus all channel coefficients are known to node . The accuracy of channels can be obtained by applying sophisticated and advanced estimation algorithms such as [30, 31]. However, it is worth noting that, in practical systems, the CSI and the corresponding rate adaptation are usually quantified to simplify implementation. Also, the exchange of CSI often introduces considerable overhead. Therefore, in practical systems, the actual performance will tradeoff with the resolution of system adaptation as well as the amount of introduced overhead.

The relay procedures are illustrated in Figure 1(b) and the physical-layer signal model is described as follows. Each time frame is divided equally into two phases. During the first phase, node transmits signal with power . In the meantime, node functioning as a noncooperative jammer broadcasts the artificial noise (AN) denoted by , which is the zero-mean complex Gaussian white noise with variance . Evidently, the artificial noise will disturb both the relay node and the destination node . The signals received by node and node in the first phase are denoted by and , respectively, which can be written bywhere , , , and thus . Here denotes the circularly symmetric complex Gaussian random variable, where the first parameter denotes the mean and the second is the variance.

In the second phase, node amplifies and forwards the received signal. Meanwhile, it attempts to decode the received signal to retrieve the confidential information. Therefore, node is actually an untrusted relay node. For security requirements, the task of our design is to prevent from successfully decoding while enhancing the destination node ’s QoS, such as secrecy, throughput, and bit error rate (BER). The signal received by node in the second phase is given bywhere is to normalize the transmit power to . For convenience, we define . By substituting and (1) into (3), we haveFrom the above equations, we can readily obtain and .

We assume that node remains idle in the second phase, and thus the received signal is not polluted by the artificial noise. As aforementioned, our framework can be applied to the cases for security and reliability assurance. For the security assurance case, node plays a role of helper but with limited cooperation. This is because the artificial noise can disturb the untrusted relay , such that it cannot successfully decode the data. The limited cooperation comes from the fact the artificial noise does not adapt with the CSI of any links. In the reliability assurance case, node can be treated as the transmitter of another existing link within the same bandwidth. Correspondingly, our target would be how to suppress the interference at the destination by combining the signals received in the two phases. As the two cases share the same model, we in this paper mainly use the security assurance case as the typical case to study and analyze our design.

3. Detection Schemes at the Destination Node

The core idea for security assurance is to exploit higher signal dimensions at the legitimate destination user, that is, node , over the untrusted relay . Specifically, we can see from (2b) and (4c) that the destination node can receive two versions of the signals with independent channel fading in two phases. In contrast, the untrusted relay node has only the signals received in the first phase. This promises that is able to suppress the interferences, that is, the artificial noise broadcast by in the first phase, but cannot do so. Making use of this advantage, we can potentially keep from decoding the signals while assuring the security requirement for the destination node . As mentioned previously, the jamming behaviour of does not vary with the channel state information of the network. Consequently, our concentration will be dedicated to the processing at . Particularly, we study three detection principles, namely, zero forcing (ZF), minimum mean-square error (MMSE), and maximum likelihood (ML), respectively, and derived the corresponding detectors in the following sections.

3.1. Zero Forcing (ZF) Detection

Zero forcing detector is known for complete elimination of the interferences. The detailed ZF detection for our case is derived by the following procedures. By combining (4b) with (2a), we arrive atRewriting (5) in a matrix form, we getwhere , , , and is denoted byIn this section, we apply ZF detector at node to suppress the interference. Node will judge transmitted signal based on the result of received signal vector multiplied with the matrix , where according to the zero forcing criterion. The estimation of transmitted signal is determined byAfter using (6), we haveAccording to the principal of ZF detector which aims to eliminate the interference in , we reach the conclusion that is the sufficient statistics of the transmitted signal . can be written aswhereNoticing that and are independent, we obtain the instantaneous signal-to-interference plus noise ratio (SINR) at node is given byIn order to make it concise, we hereby denote all the SINRs’ subscripts as the index , respectively. After using the following definitions: can be further rewritten as

3.2. Minimum Mean-Square Error (MMSE) Detection

For MMSE, the detector matrix meets By using the Projection Theorem, we obtain the following equation:After a series of simplification, the detector matrix is given bywhere R is defined in (7) and is defined aswhere . Similar to the ZF detection, we focus on the first element of to adjudge . Moreover, is given bywhere , , and . From (21) we have the distribution of , which is omitted due to the lack of space. Finally, we have the SINR of node which can be expressed aswhere and are defined in (13) and (15), respectively.

3.3. Maximum Likelihood (ML) Detection

In this subsection, we have the new simultaneous equations:by combining (2b) with (4c). Transforming (23) into a matrix form, we obtainwhere and ’s definition can be easily get by comparing (23) with (24). Since it is easy to analyze the covariance matrix of the noise vector , we directly give where is defined bywith .

Based on noise-whiting method and ’s unitary decomposition , whitening matrix is given by . Therefore, we havewhere and . Obviously, holds. According to the principle of maximal ratio combining (MRC), the output is a weighted sum of all branches and the weights should be proportional to the branch SINRs. Thus, the SINR of the combiner output is the sum of SINRs on each branch. After using MRC of , the judgment result from naturally meets . Intuitively, the output SINR of ML detection can be expressed as

The analytical expression of can not be obtained, caused by the complexity of unitary decomposition of symbolic expression in (25). But luckily and unexpectedly, we will find that is equal to in Section 4.4. Furthermore, this result will be confirmed through numerical simulations in Section 5.

4. Ergodic Secrecy Throughput of Three Detection Approaches

In this section, we adopt the Rayleigh fading model and derive the closed-form expressions for the lower bound and the upper bound of EST. We assume , , is independent identically distributed (i.i.d) random variable and subject to exponential distribution with the same expectation . In the following parts of this paper, we call the signal-to-noise ratio (SNR) of our system.

The instantaneous secrecy rate [16] of this general scheme can be written asAnd EST is given by .

4.1. Lower Bound of ZF’s EST

For ZF, we havewhere the inequality is due to the simple fact that . The lower bound of EST can be characterized bywhere , , and are defined as before. In (30), can be further lower bounded byIn (31), is obtained from Jensen’s inequality and the convexity of for . Similarly, is obtained from Jensen’s inequality and the convexity of logarithmic function. For Rayleigh fading, obeys exponential distribution with the same rate parameter , where is the average SNR of our system. Recalling ’s definition in (13), probability density function (PDF) of when is given bywhere is modified Bessel function of second kind. According to the definition of given in (15) and the assumptions that all SNRs are independent and identically distributed, it is evident that the distribution of is symmetric for regions and , leading to . Further letting , we can obtain the PDF of byAs shown in (31), . Thus, we haveThe double integral in (34) can not be simplified in closed-form. We can figure out by numerical integration. can be solved asIn (35), holds due to the property of mathematical expectation and holds due to , , being i.i.d random variable and subject to exponential distribution with the expectation . In addition, it is easy to get thatwhere is the Euler constant defined in [32]. On the other hand,By substituting (34), (35), (36), and (37) into (30), we can arrive at the lower bound of EST under ZF strategy:

4.2. Upper Bound of ZF’s EST

The upper bound of EST for the ZF detection approach can be obtained as follows. Because is the secrecy throughput and represents the maximum achievable rate with malicious users (see (29)-(30) for definitions of the two notations), we can readily haveIn (39), obviously holds and holds due to . Letting , ’s PDF is given by . So we haveNow the upper bound of ZF’s EST is obtained as

4.3. Lower Bound of MMSE’s EST

To obtain the lower bound of EST under MMSE approach, we first introduce Theorem 1.

Theorem 1. One has

Proof. LetTo prove Theorem 1, we just need to prove . By substituting (16) and (22) into (43), we immediately obtainwhere . From the definition of , we arrive atIn addition, we have following simple inequalityApplying (45), (46), and the simple fact that the last item in the molecule of is positive into (44), we immediately have . Thus Theorem 1 follows.

On the basis of Theorem 1, which indicates that MMSE has a higher instantaneous SINR, we draw the conclusion that the EST of MMSE is lower bounded by that of ZF.

4.4. Analysis of ML’s EST

Solving the EST under ML detection needs to find the exact value of . In order to analyze this problem, we first introduce the following lemma.

Lemma 2. The result of MMSE for the initial model (6) and the noise whitening model (26) is consistent.

Proof. The proof of Lemma 2 is omitted for the lack of space.

Theorem 3. In our jamming-aided Security provisioning scheme, MMSE and ML are essentially the same. That is to say

Proof. We rewrite (26) aswhere and are fixed real number. (For simplicity, we have such assumption. In fact they are complex numbers. But we can multiply the observed sample by the corresponding opposite phase to transform them into real numbers.) As given in Section 3.3,and (27) holds. On the other hand, by applying the method similar to Section 3.2, which meets is given byThen, we obtainBy comparing (49) with (51), we find that the difference between them is a consistent which will not have any impact on the judgment. Finally, considering Lemma 2, Theorem 3 follows.

Based on Theorem 3, we draw a conclusion that the performance of ML is equal to MMSE, thus offering the potential low computational complexity. Correspondingly, EST of ML is equal to that of MMSE.

5. Simulation Results and Discussions

This section presents some numerical results to verify the previous theoretical analyses. The simulation environment is based on the system model described in Section 2. In Figures 25, we assumed that all channel coefficients are submitted to Rayleigh fading with the same mean, which is so-called average SNR. Without loss of generality, we assumed the power of the transmitting node and the jamming node is equal to 1. In Figure 2, all the nodes use QPSK modulation. In addition, ZF technique is prone to high errors as the channel coefficients cannot be estimated perfectly. The readers can refer to the rich literature to study the impact of channel estimation errors.

Figure 2 shows the simulation results of the receiving node and the relay node ’s bit error rate (BER) with the change of the average SNR, which illustrates the reliability of our proposed network. From Figure 2, we observe that the relay node has a significant error floor, caused by the jamming node ’s artificial noise. In high SNR regime, . We immediately have ’s BER given bywhere is complementary error function defined in [32]. But in our network, node ’s BER rapidly declines with the growth of SNR, which benefits from node having higher signal dimensions to effectively suppress the interference. All the detectors can gather the interfered signal of the two phases and carry out a joint decision. Thus the reliability for data transmissions is assured. Additionally, the slope of the BERs of three detection approaches in high SNR regime relative to the SNR is approximately , which indicates our robustness provisioning scheme achieves a half-order diversity gain.

Figure 3 illustrates the change of the EST with the average SNR, from which it can be seen that, as expected, the ESTs under the three approaches increase with the increase of the average SNR. As the average SNR increases, the difference between the EST of the three detection methods becomes smaller, which is consistent with the fact that MMSE detector degenerate into ZF detector with increase of SNR. The performances of the MMSE detector and the ML detector are close to each other and have the best performances. It can be seen that the exact values and the lower bounds given in (38) agree well for high SINRs, at the same time, the exact values and the upper bound given in (41) agree well for low SNRs. As a result of inequality of and in (39), the difference between upper bound and exact values is large in high SNR regime.

Finally, in Figures 4 and 5 we plot the secrecy outage probability (SOP) curves with respect to the average SNR and secrecy throughput threshold, respectively. In Figure 4 secrecy throughput thresholds corresponding to the solid line and dashed line are 0 nats/s/Hz and 1 nats/s/Hz, respectively. Because solid line corresponds to a smaller threshold, solid line’s SOP is smaller than dashed line’s SOP under the same average SNR. For a fixed secrecy throughput threshold, SOP decreases as the average SINR increases. SOP under ZF detection approach is higher than it is under the other detection approaches. The main reason for this phenomenon is briefly given as follows: ZF criterion only aims to reduce the interference between signal and AN, but MMSE criterion additionally considers the character of noise. Besides, ML detector as the optimal detector certainly has the best performance, and its performance is equal to MMSE in our proposed scheme, which supports our conclusion in Section 4. In Figure 5, the average SNRs corresponding to the solid line and dashed line are 20 dB and 40 dB, respectively. SOP corresponding to each curve increases with the increase of the security throughput threshold.

6. Conclusion

In this paper, we present a comprehensive analysis of the robust relay aided by an uncooperative jamming node in narrow-band communications for ubiquitous IoT access, which is further modeled as a two-hop AF cooperative system. We first focus on the three typical detection approaches to exploit potential security and robustness in our transmission scheme and derive the lower bounds and/or the upper bounds of the ESTs. Then we reveal that, in our framework, ML detection and MMSE detection in fact are equivalent, offering the potential low computational complexity. All the theoretical contributions are validated by numerical and simulation results. While our study concentrates on the simple yet typical model, our future work will extend our idea to other more complicated topologies.

Conflicts of Interest

The authors declare that there are no conflicts of interest regarding the publication of this paper.

Acknowledgments

The research work reported in this paper is supported by the National Natural Science Foundation of China under Grant nos. 61461136001 and 61671371, the National Science and Technology Major Project under Grant no. 2016ZX03001016-005, Science and Technology Program of Shaanxi Province under Grant no. 2016KW-032, ZTE Industry Academic Research Cooperation Funds, and Fundamental Research Funds for the Central Universities.

References

  1. J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, “Internet of Things (IoT): a vision, architectural elements, and future directions,” Future Generation Computer Systems, vol. 29, no. 7, pp. 1645–1660, 2013. View at: Publisher Site | Google Scholar
  2. X. Ge, S. Tu, G. Mao, C.-X. Wang, and T. Han, “5G ultra-dense cellular networks,” IEEE Wireless Communications, vol. 23, no. 1, pp. 72–79, 2016. View at: Publisher Site | Google Scholar
  3. X. Ge, T. Han, Y. Zhang et al., “Spectrum and energy efficiency evaluation of two-tier femtocell networks with partially open channels,” IEEE Transactions on Vehicular Technology, vol. 63, no. 3, pp. 1306–1319, 2014. View at: Publisher Site | Google Scholar
  4. S. H. Bouk, S. H. Ahmed, D. Kim, and H. Song, “Named-data-networking-based its for smart cities,” IEEE Communications Magazine, vol. 55, no. 1, pp. 105–111, 2017. View at: Publisher Site | Google Scholar
  5. W. Li and H. Song, “ART: an attack-resistant trust management scheme for securing vehicular ad hoc networks,” IEEE Transactions on Intelligent Transportation Systems, vol. 17, no. 4, pp. 960–969, 2016. View at: Publisher Site | Google Scholar
  6. Y. Wang, P. Ren, F. Gao, and Z. Su, “A hybrid underlay/overlay transmission mode for cognitive radio networks with statistical quality-of-service provisioning,” IEEE Transactions on Wireless Communications, vol. 13, no. 3, pp. 1482–1498, 2014. View at: Publisher Site | Google Scholar
  7. Y. Wang and W. Xu, “Statistical delay QoS provisioning for energy-efficient spectrum-sharing based wireless ad hoc sensor networks,” Journal of Sensors, vol. 2016, Article ID 2016, 13 pages, 2016. View at: Google Scholar
  8. Q. Du, H. Song, Q. Xu, P. Ren, and L. Sun, “Interference-controlled D2D routing aided by knowledge extraction at cellular infrastructure towards ubiquitous CPS,” Personal and Ubiquitous Computing, vol. 19, no. 7, pp. 1033–1043, 2015. View at: Publisher Site | Google Scholar
  9. Q. Du, M. Liu, Q. Xu, H. Song, L. Sun, and P. Ren, “Interference-constrained routing over P2P-share enabled multi-hop D2D networks,” Peer-to-Peer Networking and Applications, pp. 1–17, 2017. View at: Publisher Site | Google Scholar
  10. L. Sun, Q. Du, P. Ren, and Y. Wang, “Two birds with one stone: towards secure and interference-free D2D transmissions via constellation rotation,” IEEE Transactions on Vehicular Technology, vol. 65, no. 10, pp. 8767–8774, 2016. View at: Publisher Site | Google Scholar
  11. A. Mukherjee, “Physical-layer security in the internet of things: sensing and communication confidentiality under resource constraints,” Proceedings of the IEEE, vol. 103, no. 10, pp. 1747–1761, 2015. View at: Publisher Site | Google Scholar
  12. J. Zhou, Z. Cao, X. Dong, and A. V. Vasilakos, “Security and privacy for cloud-based IoT: challenges,” IEEE Communications Magazine, vol. 55, no. 1, pp. 26–33, 2017. View at: Publisher Site | Google Scholar
  13. I. Butun, M. Erol-Kantarci, B. Kantarci, and H. Song, “Cloud-centric multi-level authentication as a service for secure public safety device networks,” IEEE Communications Magazine, vol. 54, no. 4, pp. 47–53, 2016. View at: Publisher Site | Google Scholar
  14. S. Rahman, S. A. Mamun, M. U. Ahmed, and M. S. Kaiser, “PHY/MAC layer attack detection system using neuro-fuzzy algorithm for IoT network,” in Proceedings of the 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT '16), pp. 2531–2536, Chennai, India, 2016. View at: Publisher Site | Google Scholar
  15. M. Hussain, Q. Du, L. Sun, and P. Ren, “Security enhancement for video transmission via noise aggregation in immersive systems,” Multimedia Tools and Applications, vol. 75, no. 9, pp. 5345–5357, 2016. View at: Publisher Site | Google Scholar
  16. M. Bloch, J. Barros, M. R. Rodrigues, and S. W. McLaughlin, “Wireless information-theoretic security,” Institute of Electrical and Electronics Engineers. Transactions on Information Theory, vol. 54, no. 6, pp. 2515–2534, 2008. View at: Publisher Site | Google Scholar | MathSciNet
  17. Y.-S. Shiu, S. Y. Chang, H.-C. Wu, S. C.-H. Huang, and H.-H. Chen, “Physical layer security in wireless networks: a tutorial,” IEEE Wireless Communications, vol. 18, no. 2, pp. 66–74, 2011. View at: Publisher Site | Google Scholar
  18. L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, “Improving wireless physical layer security via cooperating relays,” IEEE Transactions on Signal Processing, vol. 58, no. 3, part 2, pp. 1875–1888, 2010. View at: Publisher Site | Google Scholar | MathSciNet
  19. R. Bassily, E. Ekrem, X. He et al., “Cooperative security at the physical layer: a summary of recent advances,” IEEE Signal Processing Magazine, vol. 30, no. 5, pp. 16–28, 2013. View at: Publisher Site | Google Scholar
  20. Y. Zou, X. Wang, and W. Shen, “Optimal relay selection for physical-layer security in cooperative wireless networks,” IEEE Journal on Selected Areas in Communications, vol. 31, no. 10, pp. 2099–2111, 2013. View at: Publisher Site | Google Scholar
  21. A. Sendonaris, E. Erkip, and B. Aazhang, “User cooperation diversity-part I: system description,” IEEE Transactions on Communications, vol. 51, no. 11, pp. 1927–1938, 2003. View at: Publisher Site | Google Scholar
  22. A. Sendonaris, E. Erkip, and B. Aazhang, “User cooperation diversity. Part II. Implementation aspects and performance analysis,” IEEE Transactions on Communications, vol. 51, no. 11, pp. 1939–1948, 2003. View at: Publisher Site | Google Scholar
  23. L. Sun, T. Zhang, Y. Li, and H. Niu, “Performance study of two-hop amplify-and-forward systems with untrustworthy relay nodes,” IEEE Transactions on Vehicular Technology, vol. 61, no. 8, pp. 3801–3807, 2012. View at: Publisher Site | Google Scholar
  24. H. Xu, L. Sun, P. Ren, and Q. Du, “Securing two-way cooperative systems with an untrusted relay: a constellation-rotation aided approach,” IEEE Communications Letters, vol. 19, no. 12, pp. 2270–2273, 2015. View at: Publisher Site | Google Scholar
  25. L. Sun, P. Ren, Q. Du, Y. Wang, and Z. Gao, “Security-aware relaying scheme for cooperative networks with untrusted relay nodes,” IEEE Communications Letters, vol. 19, no. 3, pp. 463–466, 2015. View at: Publisher Site | Google Scholar
  26. J. Huang and A. L. Swindlehurst, “Cooperative jamming for secure communications in {MIMO} relay networks,” IEEE Transactions on Signal Processing, vol. 59, no. 10, pp. 4871–4884, 2011. View at: Publisher Site | Google Scholar | MathSciNet
  27. X. He and A. Yener, “Two-hop secure communication using an untrusted relay,” EURASIP Journal on Wireless Communications and Networking, vol. 2009, Article ID 305146, 13 pages, 2009. View at: Publisher Site | Google Scholar
  28. R. Zhang, L. Song, Z. Han, and B. Jiao, “Physical layer security for two-way untrusted relaying with friendly jammers,” IEEE Transactions on Vehicular Technology, vol. 61, no. 8, pp. 3693–3704, 2012. View at: Publisher Site | Google Scholar
  29. H. Long and W. X. Ge, “Cooperative jamming and power allocation in three-phase two-way relaying system with untrusted relay node,” IEEE Communications Letters, vol. 3, no. 14, pp. 56–59, 2014. View at: Google Scholar
  30. F. Gao, T. Cui, and A. Nallanathan, “On channel estimation and optimal training design for amplify and forward relay networks,” IEEE Transactions on Wireless Communications, vol. 7, no. 5, pp. 1907–1916, 2008. View at: Publisher Site | Google Scholar
  31. F. Gao, R. Zhang, and Y.-C. Liang, “Optimal channel estimation and training design for two-way relay networks,” IEEE Transactions on Communications, vol. 57, no. 10, pp. 3024–3033, 2009. View at: Publisher Site | Google Scholar
  32. M. Abramowitz and I. A. Stegun, Handbook of Mathematical Functions, Dover, NY, USA, 1972.

Copyright © 2017 Qinghe Du et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.


More related articles

741 Views | 295 Downloads | 1 Citation
 PDF  Download Citation  Citation
 Download other formatsMore
 Order printed copiesOrder

Related articles

We are committed to sharing findings related to COVID-19 as quickly and safely as possible. Any author submitting a COVID-19 paper should notify us at help@hindawi.com to ensure their research is fast-tracked and made available on a preprint server as soon as possible. We will be providing unlimited waivers of publication charges for accepted articles related to COVID-19. Sign up here as a reviewer to help fast-track new submissions.