• DocumentCode
    1786663
  • Title

    Secrecy transmission with a helper: To relay or not to relay

  • Author

    Hao Deng ; Hui-Ming Wang ; Wenjie Wang ; Qinye Yin

  • Author_Institution
    Sch. of Electron. & Inf. Eng., Xi´an Jiaotong Univ., Xi´an, China
  • fYear
    2014
  • fDate
    10-14 June 2014
  • Firstpage
    825
  • Lastpage
    830
  • Abstract
    In this paper, we consider secure communications between a source and a destination helped by a relay, in the presence of an eavesdropper. We consider both path-loss and fading in our channel models. We investigate such a question that whether the relay operates as a tradition relay or a jammer. A one time slot cooperative jamming and two time slots cooperative relaying transmission scheme are proposed. For fairness, we consider the total power constraint and assume that the two proposed schemes are with the same power budget. Optimal power allocation among the information signal and jamming signal are derived. For the proposed schemes, we give the performance comparison in the high and low transmitted power regimes, which gives some insight into the choice of transmission schemes to achieve a better performance. Furthermore, We analyze the impact of eavesdropper´s position on security in our simulation.
  • Keywords
    cooperative communication; jamming; relay networks (telecommunication); information signal; jamming signal; optimal power allocation; secrecy transmission; total power constraint; two time slots cooperative relaying transmission scheme; Communication system security; Equations; Jamming; Relays; Resource management; Security; Wireless communication;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Communications Workshops (ICC), 2014 IEEE International Conference on
  • Conference_Location
    Sydney, NSW
  • Type

    conf

  • DOI
    10.1109/ICCW.2014.6881302
  • Filename
    6881302