On the secrecy performance and power allocation in relaying networks with untrusted relay in the partial secrecy regime |
|
Author: | Osorio, Diana Pamela Moya1,2; Alves, Hirley1; Olivo, Edgar Eduardo Benitez3 |
Organizations: |
1Centre for Wireless Communications (CWC), University of Oulu, Finland 2Department of Electrical Engineering, Center of Exact Sciences and Technology, Federal University of São Carlos, 13565-905 São Carlos, Brazil 3São Paulo State University (UNESP), Campus of São João da Boa Vista, 13876-750 São João da Boa Vista, Brazil |
Format: | article |
Version: | accepted version |
Access: | open |
Online Access: | PDF Full Text (PDF, 0.5 MB) |
Persistent link: | http://urn.fi/urn:nbn:fi-fe202001071312 |
Language: | English |
Published: |
Institute of Electrical and Electronics Engineers,
2020
|
Publish Date: | 2020-01-07 |
Description: |
AbstractRecently, three useful secrecy metrics based on the partial secrecy regime were proposed to analyze secure transmissions on wireless systems over quasi-static fading channels, namely: generalized secrecy outage probability, average fractional equivocation, and average information leakage. These metrics were devised from the concept of fractional equivocation, which is related to the decoding error probability at the eavesdropper, so as to provide a comprehensive insight on the practical implementation of wireless systems with different levels of secrecy requirements. Considering the partial secrecy regime, in this paper we examine the secrecy performance of an amplify-and-forward relaying network with an untrusted relay node, where a destination-based jamming is employed to enable secure transmissions. In this regard, a closed-form approximation is derived for the generalized secrecy outage probability, and integral-form expressions are obtained for the average fractional equivocation and the average information leakage rate. Additionally, equal and optimal power allocation schemes are investigated and compared for the three metrics. From this analysis, we show that different power allocation approaches lead to different system design criteria. The obtained expressions are validated via Monte Carlo simulations. see all
|
Series: |
IEEE transactions on information forensics and security |
ISSN: | 1556-6013 |
ISSN-E: | 1556-6021 |
ISSN-L: | 1556-6013 |
Volume: | 15 |
Pages: | 2268 - 2281 |
DOI: | 10.1109/TIFS.2019.2959920 |
OADOI: | https://oadoi.org/10.1109/TIFS.2019.2959920 |
Type of Publication: |
A1 Journal article – refereed |
Field of Science: |
213 Electronic, automation and communications engineering, electronics |
Subjects: | |
Funding: |
This work was supported in part by São Paulo Research Foundation (FAPESP) under Grant 2017/20990-6, in part by the Academy of Finland 6Genesis Flagship under Grant 318927, in part by the EE-IoT project under Grant 319008, and in part by the Brazilian National Council for Scientific and Technological Development (CNPq) under Grants 428649/2016-5 and 421850/2018-3. |
Academy of Finland Grant Number: |
318927 319008 |
Detailed Information: |
318927 (Academy of Finland Funding decision) 319008 (Academy of Finland Funding decision) |
Copyright information: |
© 2019 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. |