Table of Contents Author Guidelines Submit a Manuscript
Wireless Communications and Mobile Computing
Volume 2017, Article ID 9580639, 11 pages
https://doi.org/10.1155/2017/9580639
Research Article

Secrecy Analysis of Multiuser Untrusted Amplify-and-Forward Relay Networks

1School of Information Engineering, Guangzhou Panyu Polytechnic, Guangzhou 511483, China
2Department of Electronic Engineering, Shantou University, Shantou 515063, China
3School of Computer Science and Educational Software, Guangzhou University, Guangzhou 510006, China
4College of Information Science and Technology, Nanjing Forestry University, Nanjing 210037, China
5Department of Electrical and Computer Engineering, Utah State University, Logan, UT 84322-4120, USA
6Jiangsu Engineering Centre of Network Monitoring and School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing 210044, China

Correspondence should be addressed to Lisheng Fan; nc.ude.uhzg@nafsl

Received 16 July 2016; Revised 18 September 2016; Accepted 13 October 2016; Published 15 January 2017

Academic Editor: Gonzalo Vazquez-Vilar

Copyright © 2017 Dan Deng et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. Z. Zhou, Y. Wang, Q. J. Wu, C. N. Yang, and X. Sun, “Effective and effcient global context verifcation for image copy detection,” IEEE Transactions on Information Forensicsand Security, vol. 12, no. 1, pp. 48–63, 2016. View at Publisher · View at Google Scholar
  2. J. Li, X. Li, B. Yang, and X. Sun, “Segmentation-based image copy-move forgery detection scheme,” IEEE Transactions on Information Forensics and Security, vol. 10, no. 3, pp. 507–518, 2015. View at Publisher · View at Google Scholar · View at Scopus
  3. B. Gu, V. S. Sheng, K. Y. Tay, W. Romano, and S. Li, “Incremental support vector learning for ordinal regression,” IEEE Transactions on Neural Networks and Learning Systems, vol. 26, no. 7, pp. 1403–1416, 2015. View at Publisher · View at Google Scholar · View at Scopus
  4. C. Yuan, X. Sun, and R. Lv, “Fingerprint liveness detection based on multi-scale LPQ and PCA,” China Communications, vol. 13, no. 7, pp. 60–65, 2016. View at Publisher · View at Google Scholar
  5. Y. Zhang, X. Sun, and W. Baowei, “Efficient algorithm for k-barrier coverage based on integer linear programming,” China Communications, vol. 13, no. 7, pp. 16–23, 2016. View at Publisher · View at Google Scholar
  6. Z. Xia, X. Wang, X. Sun, and B. Wang, “Steganalysis of least significant bit matching using multi-order differences,” Security and Communication Networks, vol. 7, no. 8, pp. 1283–1291, 2014. View at Publisher · View at Google Scholar · View at Scopus
  7. Y. Ren, J. Shen, J. Wang, J. Han, and S. Lee, “Mutual verifiable provable data auditing in public cloud storage,” Journal of Internet Technology, vol. 16, no. 2, pp. 317–323, 2015. View at Publisher · View at Google Scholar · View at Scopus
  8. S. Xie and Y. Wang, “Construction of tree network with limited delivery latency in homogeneous wireless sensor networks,” Wireless Personal Communications, vol. 78, no. 1, pp. 231–246, 2014. View at Publisher · View at Google Scholar · View at Scopus
  9. Z. Xia, X. Wang, X. Sun, and Q. Wang, “A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data,” IEEE Transactions on Parallel and Distributed Systems, vol. 27, no. 2, pp. 340–352, 2016. View at Publisher · View at Google Scholar
  10. J. Shen, H. Tan, J. Wang, J. Wang, and S. Lee, “A novel routing protocol providing good transmission reliability in underwater sensor networks,” Journal of Internet Technology, vol. 16, no. 1, pp. 171–178, 2015. View at Publisher · View at Google Scholar · View at Scopus
  11. Z. Fu, X. Sun, Q. Liu, L. Zhou, and J. Shu, “Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing,” IEICE Transactions on Communications, vol. 98, no. 1, pp. 190–200, 2015. View at Publisher · View at Google Scholar · View at Scopus
  12. Y. Zheng, B. Jeon, D. Xu, Q. M. J. Wu, and H. Zhang, “Image segmentation by generalized hierarchical fuzzy C-means algorithm,” Journal of Intelligent and Fuzzy Systems, vol. 28, no. 2, pp. 961–973, 2015. View at Publisher · View at Google Scholar · View at Scopus
  13. A. Khisti and G. W. Wornell, “Secure transmission with multiple antennas Part I: the MISOME wiretap channel,” IEEE Transactions on Information Theory, vol. 56, no. 7, pp. 3088–3104, 2010. View at Publisher · View at Google Scholar
  14. A. Khisti and G. W. Wornell, “Secure transmission with multiple antennas—part II: the MIMOME wiretap channel,” IEEE Transactions on Information Theory, vol. 56, no. 11, pp. 5515–5532, 2010. View at Google Scholar
  15. A. D. Wyner, “The wire-tap channel,” The Bell System Technical Journal, vol. 54, no. 8, pp. 1355–1387, 1975. View at Publisher · View at Google Scholar · View at Scopus
  16. S. Goel and R. Negi, “Guaranteeing secrecy using artificial noise,” IEEE Transactions on Wireless Communications, vol. 7, no. 6, pp. 2180–2189, 2008. View at Publisher · View at Google Scholar · View at Scopus
  17. H.-M. Wang, T. Zheng, and X.-G. Xia, “Secure MISO wiretap channels with multiantenna passive eavesdropper: artificial noise vs. artificial fast fading,” IEEE Transactions on Wireless Communications, vol. 14, no. 1, pp. 94–106, 2015. View at Publisher · View at Google Scholar · View at Scopus
  18. N. Romero-Zurita, D. McLernon, and M. Ghogho, “Physical layer security by robust masked beamforming and protected zone optimisation,” IET Communications, vol. 8, no. 8, pp. 1248–1257, 2014. View at Publisher · View at Google Scholar · View at Scopus
  19. Z. Ding, Z. Ma, and P. Fan, “Asymptotic studies for the impact of antenna selection on secure two-way relaying communications with artificial noise,” IEEE Transactions on Wireless Communications, vol. 13, no. 4, pp. 2189–2203, 2014. View at Publisher · View at Google Scholar · View at Scopus
  20. L. Fan, S. Zhang, T. Q. Duong, and G. K. Karagiannidis, “Secure switch-and-stay combining (SSSC) for cognitive relay networks,” IEEE Transactions on Communications, vol. 64, no. 1, pp. 70–82, 2016. View at Publisher · View at Google Scholar · View at Scopus
  21. X. Wang, K. Wang, and X.-D. Zhang, “Secure relay beamforming with imperfect channel side information,” IEEE Transactions on Vehicular Technology, vol. 62, no. 5, pp. 2140–2155, 2013. View at Publisher · View at Google Scholar · View at Scopus
  22. X. Wang, Z. Zhang, and K. Long, “Secure beamforming for multiple-antenna amplify-and-forward relay networks,” IEEE Transactions on Signal Processing, vol. 64, no. 6, pp. 1477–1492, 2016. View at Publisher · View at Google Scholar · View at MathSciNet
  23. T.-X. Zheng, H.-M. Wang, J. Yuan, D. Towsley, and M. H. Lee, “Multi-antenna transmission with artificial noise against randomly distributed eavesdroppers,” IEEE Transactions on Communications, vol. 63, no. 11, pp. 4347–4362, 2015. View at Publisher · View at Google Scholar
  24. L. Fan, X. Lei, P. Fan, and R. Q. Hu, “Outage probability analysis and power allocation for two-way relay networks with user selection and outdated channel state information,” IEEE Communications Letters, vol. 16, no. 5, pp. 638–641, 2012. View at Publisher · View at Google Scholar · View at Scopus
  25. D. S. Michalopoulos, H. A. Suraweera, G. K. Karagiannidis, and R. Schober, “Amplify-and-forward relay selection with outdated channel estimates,” IEEE Transactions on Communications, vol. 60, no. 5, pp. 1278–1290, 2012. View at Publisher · View at Google Scholar · View at Scopus
  26. H. Cui, R. Zhang, L. Song, and B. Jiao, “Relay selection for bidirectional AF relay network with outdated CSI,” IEEE Transactions on Vehicular Technology, vol. 62, no. 9, pp. 4357–4365, 2013. View at Publisher · View at Google Scholar · View at Scopus
  27. D. Deng, L. Fan, R. Zhao, and R. Q. Hu, “Secure communications in multiple amplify-and-forward relay networks with outdated channel state information,” Transactions on Emerging Telecommunications Technologies, vol. 27, no. 4, pp. 494–503, 2016. View at Publisher · View at Google Scholar · View at Scopus
  28. L. Fan, X. Lei, T. Q. Duong, M. Elkashlan, and G. K. Karagiannidis, “Secure multiuser communications in multiple amplify-and-forward relay networks,” IEEE Transactions on Communications, vol. 62, no. 9, pp. 3299–3310, 2014. View at Publisher · View at Google Scholar · View at Scopus
  29. S.-I. Kim, I.-M. Kim, and J. Heo, “Secure transmission for multiuser relay networks,” IEEE Transactions on Wireless Communications, vol. 14, no. 7, pp. 3724–3737, 2015. View at Publisher · View at Google Scholar · View at Scopus
  30. H. Hui, A. L. Swindlehurst, G. Li, and J. Liang, “Secure relay and jammer selection for physical layer security,” IEEE Signal Processing Letters, vol. 22, no. 8, pp. 1147–1151, 2015. View at Publisher · View at Google Scholar · View at Scopus
  31. L. Fan, X. Lei, T. Q. Duong, R. Q. Hu, and M. Elkashlan, “Multiuser cognitive relay networks: joint impact of direct and relay communications,” IEEE Transactions on Wireless Communications, vol. 13, no. 9, pp. 5043–5055, 2014. View at Publisher · View at Google Scholar · View at Scopus
  32. F. Zhu, F. Gao, M. Yao, and H. Zou, “Joint information- and jamming-beamforming for physical layer security with full duplex base station,” IEEE Transactions on Signal Processing, vol. 62, no. 24, pp. 6391–6401, 2014. View at Publisher · View at Google Scholar · View at Scopus
  33. F. Zhu, F. Gao, T. Zhang, K. Sun, and M. Yao, “Physicallayer security for full duplex communications with self-interference mitigation,” IEEE Transactions on Wireless Communications, vol. 15, no. 1, pp. 329–340, 2016. View at Publisher · View at Google Scholar
  34. S. Jin, M. R. McKay, C. Zhong, and K.-K. Wong, “Ergodic capacity analysis of amplify-and-forward MIMO dual-hop systems,” IEEE Transactions on Information Theory, vol. 56, no. 5, pp. 2204–2224, 2010. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  35. J. Zhang, C. Yuen, C.-K. Wen, S. Jin, K.-K. Wong, and H. Zhu, “Large system secrecy rate analysis for SWIPT MIMO wiretap channels,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 1, pp. 74–85, 2016. View at Publisher · View at Google Scholar · View at Scopus
  36. S. Zhang, L. Fan, M. Peng, and H. V. Poor, “Near-optimal modulo-and-forward scheme for the untrusted relay channel,” IEEE Transactions on Information Theory, vol. 62, no. 5, pp. 2545–2556, 2016. View at Publisher · View at Google Scholar
  37. X. He and A. Yener, “Cooperation with an untrusted relay: a secrecy perspective,” Institute of Electrical and Electronics Engineers. Transactions on Information Theory, vol. 56, no. 8, pp. 3807–3827, 2010. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  38. J. Mo, M. Tao, Y. Liu, and R. Wang, “Secure beamforming for MIMO two-way communications with an untrusted relay,” IEEE Transactions on Signal Processing, vol. 62, no. 9, pp. 2185–2199, 2014. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  39. L. Sun, P. Ren, Q. Du, Y. Wang, and Z. Gao, “Security-aware relaying scheme for cooperative networks with untrusted relay nodes,” IEEE Communications Letters, vol. 19, no. 3, pp. 463–466, 2015. View at Publisher · View at Google Scholar · View at Scopus
  40. L. Wang, M. Elkashlan, J. Huang, N. H. Tran, and T. Q. Duong, “Secure transmission with optimal power allocation in untrusted relay networks,” IEEE Wireless Communications Letters, vol. 3, no. 3, pp. 289–292, 2014. View at Publisher · View at Google Scholar · View at Scopus
  41. C. Jeong, I.-M. Kim, and D. I. Kim, “Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system,” IEEE Transactions on Signal Processing, vol. 60, no. 1, pp. 310–325, 2012. View at Publisher · View at Google Scholar · View at Scopus
  42. A. Mukherjee, “Imbalanced beamforming by a multi-antenna source for secure utilization of an untrusted relay,” IEEE Communications Letters, vol. 17, no. 7, pp. 1309–1312, 2013. View at Publisher · View at Google Scholar · View at Scopus
  43. M. Ju, D.-H. Kim, and K.-S. Hwang, “Opportunistic transmission of nonregenerative network with untrusted relay,” IEEE Transactions on Vehicular Technology, vol. 64, no. 6, pp. 2703–2709, 2015. View at Publisher · View at Google Scholar · View at Scopus
  44. I. Csiszár and J. Korner, “Broadcast channels with confidential messages,” IEEE Transactions on Information Theory, vol. 24, no. 3, pp. 339–348, 1978. View at Publisher · View at Google Scholar
  45. I. Krikidis, J. Thompson, S. Mclaughlin, and N. Goertz, “Amplify-and-forward with partial relay selection,” IEEE Communications Letters, vol. 12, no. 4, pp. 235–237, 2008. View at Publisher · View at Google Scholar
  46. B. V. Nguyen and K. Kim, “Secrecy outage probability of optimal relay selection for secure AnF cooperative networks,” IEEE Communications Letters, vol. 19, no. 12, pp. 2086–2089, 2015. View at Publisher · View at Google Scholar
  47. G. Amarasuriya, M. Ardakani, and C. Tellambura, “Output-threshold multiple-relay-selection scheme for cooperative wireless networks,” IEEE Transactions on Vehicular Technology, vol. 59, no. 6, pp. 3091–3097, 2010. View at Publisher · View at Google Scholar · View at Scopus
  48. S. Ikki and M. H. Ahmed, “Performance analysis of cooperative diversity wireless networks over Nakagami-m fading channel,” IEEE Communications Letters, vol. 11, no. 4, pp. 334–336, 2007. View at Publisher · View at Google Scholar · View at Scopus
  49. H. A. David and H. N. Nagaraja, Order Statistics, John Wiley & Sons, New York, NY, USA, 3rd edition, 2003.
  50. H. Jeon, N. Kim, J. Choit, H. Lee, and J. Ha, “On multiuser secrecy rate in flat fading channel,” in Proceedings of the IEEE Military Communications Conference (MILCOM '09), pp. 1–7, Boston, Mass, USA, October 2009. View at Publisher · View at Google Scholar · View at Scopus
  51. I. Gradshteyn and I. Ryzhik, Table of Integrals, Series, and Products, Academic Press, Elsevier, San Diego, Calif, USA, 7th edition, 2007.