Abstract
In this paper, we investigate the secured transmission in cluster-based multi-hop networks. In particular, we evaluate the secrecy performance of three various protocols over Rayleigh fading channel. In the first protocol, at each cluster, a relay is randomly selected to forward the source message to the next cluster. In the second and third ones, relay selection methods are applied to enhance secrecy performance. We derive closed-form expressions of secrecy outage probability and capacity, and then perform Monte Carlo simulations to verify the derivations.
Similar content being viewed by others
References
Hasna, M. O., & Alouini, M. S. (2003). Outage probability of multihop transmission over nakagami fading channels. IEEE Communication Letters, 7, 216–218.
Karagiannidis, G. K. (2006). Performance bounds of multihop wireless communications with blind relays over generalized fading channels. IEEE Transactions on Wireless Communications, 5, 498–503.
Laneman, J. N., & Wornell, G. W. (2003). Distributed space-time coded protocols for exploiting cooperative diversity in wireless networks. IEEE Transactions on Information Theory, 49, 2415–2425.
Laneman, J. N., Tse, D. N. C., & Wornell, G. W. (2004). Cooperative diversity in wireless networks: Efficient protocols and outage behavior. IEEE Transactions on Information Theory, 50, 3062–3080.
Lin, I.-T., & Sasase, I. (2009). Distributed ad hoc cooperative routing in cluster-based multihop networks. In Proceedings of 2009 IEEE 20th international symposium on personal, indoor and mobile radio communications, (PIMRC’09) (pp. 2643–2647).
Deng, Q., & Klein, A. G. (2012). Diversity of multi-hop cluster-based routing with arbitrary relay selection. IET Communications, 6, 1054–1060.
Krikidis, I. (2010). Opportunistic relay selection for cooperative networks with secrecy constraints. IET Communications, 4, 1787–1791.
Son, P. N., & Kong, H. Y. (2014). Exact outage probability of a decode-and-forward scheme with best relay selection under physical layer security. Wireless Personal Communications, 74, 325–342.
Sun, L., Zhang, T., Li, Y., & Niu, H. (2012). Performance study of two-hop amplify-and-forward systems with untrustworthy relay nodes. IEEE Transactions on Vehicular Technology, 61, 3801–3807.
Liu, Y., Li, J., & Petropulu, A. P. (2013). Destination assisted cooperative jamming for wireless physical layer security. IEEE Transactions on Information Forensics and Security, 8, 682–694.
Ibrahim, D. H., Hassan, E. S., & El-Dolil, S. A. (2014). A new relay and jammer selection schemes for secure one-way cooperative networks. Wireless Personal Communications, 75, 665–685.
Chen, J., Zhang, R., Song, L., Han, Z., & Jiao, B. (2012). Joint relay and jammer selection for secure two-way relay networks. IEEE Transactions on Information Forensics and Security, 7, 310–320.
Son, P. N., & Kong, H. Y. (2014). Exact outage probability of two-way decode-and-forward scheme with opportunistic relay selection under physical layer security. Wireless Personal Communications, 77, 2889–2917.
Bao, V. N. Q., & Trung, N. L. (2012). Multihop decode-and-forward relay networks: Secrecy analysis and relay position optimization. Journal on Electronics and Communication (JEC), 2, 33–42.
Mo, J., Tao, M., & Liu, Y. (2012). Relay placement for physical layer security: A secure connection perspective. IEEE Communications Letters, 16, 878–881.
Duy, T. T., & Kong, H. Y. (2013). Performance analysis of two-way hybrid decode-and-amplify relaying scheme with relay selection for secondary spectrum access. Wireless Personal Communications, 69, 857–878.
Acknowledgments
This research is funded by Vietnam National Foundation for Science and Technology Development (NAFOSTED) under grant number 102.01-2014.33.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Duy, T.T., Kong, H.Y. Secrecy Performance Analysis of Multihop Transmission Protocols in Cluster Networks. Wireless Pers Commun 82, 2505–2518 (2015). https://doi.org/10.1007/s11277-015-2361-y
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-015-2361-y