Distributed Matching Algorithms: Maximizing Secrecy in the Presence of Untrusted Relay
dc.contributor.author | Ali, Bakhtiar | |
dc.contributor.author | Zamir, Nida | |
dc.contributor.author | Ng, Soon Xin | |
dc.contributor.author | Butt, Muhammad Fasih Uddin | |
dc.coverage.issue | 2 | cs |
dc.coverage.volume | 26 | cs |
dc.date.accessioned | 2017-07-25T08:20:37Z | |
dc.date.available | 2017-07-25T08:20:37Z | |
dc.date.issued | 2017-06 | cs |
dc.description.abstract | In this paper, we propose a secrecy sum-rate maximization based matching algorithm between primary transmitters and secondary cooperative jammers in the presence of an eavesdropper. More explicitly, we consider an untrusted relay scenario, where the relay is a potential eavesdropper. We first show the achievable secrecy regions employing a friendly jammer in a cooperative scenario with employing an untrusted relay. Then, we provide results for the secrecy regions for two scenarios, where in the first case we consider no direct transmission between the source and the destination, while in the second case we include a source to destination direct link in our communication system. Furthermore, a friendly jammer helps to send a noise signal during the first phase of the cooperative transmission, for securing the information transmitted from the source. In our matching algorithm, the selected cooperative jammer or the secondary user, is rewarded with the spectrum allocation for a fraction of time slot from the source which is the primary user. The Conventional Distributed Algorithm (CDA) and the Pragmatic Distributed Algorithm (PDA), which were originally designed for maximising the user’s sum rate, are modified and adapted for maximizing the secrecy sum-rate for the primary user. Instead of assuming perfect modulation and/or perfect channel coding, we have also investigated our proposed schemes when practical channel coding and modulation schemes are invoked. | en |
dc.format | text | cs |
dc.format.extent | 601-610 | cs |
dc.format.mimetype | application/pdf | en |
dc.identifier.citation | Radioengineering. 2017 vol. 26, č. 2, s. 601-610. ISSN 1210-2512 | cs |
dc.identifier.doi | 10.13164/re.2017.0601 | en |
dc.identifier.issn | 1210-2512 | |
dc.identifier.uri | http://hdl.handle.net/11012/69277 | |
dc.language.iso | en | cs |
dc.publisher | Společnost pro radioelektronické inženýrství | cs |
dc.relation.ispartof | Radioengineering | cs |
dc.relation.uri | https://www.radioeng.cz/fulltexts/2017/17_02_0601_0610.pdf | cs |
dc.rights | Creative Commons Attribution 4.0 International License | en |
dc.rights.access | openAccess | en |
dc.rights.uri | http://creativecommons.org/licenses/by/4.0/ | en |
dc.subject | Physical Layer Security | en |
dc.subject | Spectrum Matching | en |
dc.subject | Game Theory | en |
dc.subject | Spectrum Sharing | en |
dc.subject | Cognitive Radio Networks. | en |
dc.title | Distributed Matching Algorithms: Maximizing Secrecy in the Presence of Untrusted Relay | en |
dc.type.driver | article | en |
dc.type.status | Peer-reviewed | en |
dc.type.version | publishedVersion | en |
eprints.affiliatedInstitution.faculty | Fakulta eletrotechniky a komunikačních technologií | cs |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- 17_02_0601_0610.pdf
- Size:
- 1.62 MB
- Format:
- Adobe Portable Document Format
- Description: