Skip to main content
Log in

Secrecy Performance Analysis of Multihop Transmission Protocols in Cluster Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

In this paper, we investigate the secured transmission in cluster-based multi-hop networks. In particular, we evaluate the secrecy performance of three various protocols over Rayleigh fading channel. In the first protocol, at each cluster, a relay is randomly selected to forward the source message to the next cluster. In the second and third ones, relay selection methods are applied to enhance secrecy performance. We derive closed-form expressions of secrecy outage probability and capacity, and then perform Monte Carlo simulations to verify the derivations.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Hasna, M. O., & Alouini, M. S. (2003). Outage probability of multihop transmission over nakagami fading channels. IEEE Communication Letters, 7, 216–218.

    Article  Google Scholar 

  2. Karagiannidis, G. K. (2006). Performance bounds of multihop wireless communications with blind relays over generalized fading channels. IEEE Transactions on Wireless Communications, 5, 498–503.

    Google Scholar 

  3. Laneman, J. N., & Wornell, G. W. (2003). Distributed space-time coded protocols for exploiting cooperative diversity in wireless networks. IEEE Transactions on Information Theory, 49, 2415–2425.

    Article  MATH  MathSciNet  Google Scholar 

  4. Laneman, J. N., Tse, D. N. C., & Wornell, G. W. (2004). Cooperative diversity in wireless networks: Efficient protocols and outage behavior. IEEE Transactions on Information Theory, 50, 3062–3080.

    Article  MATH  MathSciNet  Google Scholar 

  5. Lin, I.-T., & Sasase, I. (2009). Distributed ad hoc cooperative routing in cluster-based multihop networks. In Proceedings of 2009 IEEE 20th international symposium on personal, indoor and mobile radio communications, (PIMRC’09) (pp. 2643–2647).

  6. Deng, Q., & Klein, A. G. (2012). Diversity of multi-hop cluster-based routing with arbitrary relay selection. IET Communications, 6, 1054–1060.

    Article  MathSciNet  Google Scholar 

  7. Krikidis, I. (2010). Opportunistic relay selection for cooperative networks with secrecy constraints. IET Communications, 4, 1787–1791.

    Article  Google Scholar 

  8. Son, P. N., & Kong, H. Y. (2014). Exact outage probability of a decode-and-forward scheme with best relay selection under physical layer security. Wireless Personal Communications, 74, 325–342.

    Article  Google Scholar 

  9. Sun, L., Zhang, T., Li, Y., & Niu, H. (2012). Performance study of two-hop amplify-and-forward systems with untrustworthy relay nodes. IEEE Transactions on Vehicular Technology, 61, 3801–3807.

    Article  Google Scholar 

  10. Liu, Y., Li, J., & Petropulu, A. P. (2013). Destination assisted cooperative jamming for wireless physical layer security. IEEE Transactions on Information Forensics and Security, 8, 682–694.

    Article  Google Scholar 

  11. Ibrahim, D. H., Hassan, E. S., & El-Dolil, S. A. (2014). A new relay and jammer selection schemes for secure one-way cooperative networks. Wireless Personal Communications, 75, 665–685.

    Article  Google Scholar 

  12. Chen, J., Zhang, R., Song, L., Han, Z., & Jiao, B. (2012). Joint relay and jammer selection for secure two-way relay networks. IEEE Transactions on Information Forensics and Security, 7, 310–320.

    Article  Google Scholar 

  13. Son, P. N., & Kong, H. Y. (2014). Exact outage probability of two-way decode-and-forward scheme with opportunistic relay selection under physical layer security. Wireless Personal Communications, 77, 2889–2917.

  14. Bao, V. N. Q., & Trung, N. L. (2012). Multihop decode-and-forward relay networks: Secrecy analysis and relay position optimization. Journal on Electronics and Communication (JEC), 2, 33–42.

    Google Scholar 

  15. Mo, J., Tao, M., & Liu, Y. (2012). Relay placement for physical layer security: A secure connection perspective. IEEE Communications Letters, 16, 878–881.

    Article  Google Scholar 

  16. Duy, T. T., & Kong, H. Y. (2013). Performance analysis of two-way hybrid decode-and-amplify relaying scheme with relay selection for secondary spectrum access. Wireless Personal Communications, 69, 857–878.

    Article  Google Scholar 

Download references

Acknowledgments

This research is funded by Vietnam National Foundation for Science and Technology Development (NAFOSTED) under grant number 102.01-2014.33.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hyung Yun Kong.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Duy, T.T., Kong, H.Y. Secrecy Performance Analysis of Multihop Transmission Protocols in Cluster Networks. Wireless Pers Commun 82, 2505–2518 (2015). https://doi.org/10.1007/s11277-015-2361-y

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-015-2361-y

Keywords

Navigation