D. P. Moya Osorio, H. Alves and E. E. Benitez Olivo, "On the Secrecy Performance and Power Allocation in Relaying Networks With Untrusted Relay in the Partial Secrecy Regime," in IEEE Transactions on Information Forensics and Security, vol. 15, pp. 2268-2281, 2020. doi: 10.1109/TIFS.2019.2959920
On the secrecy performance and power allocation in relaying networks with untrusted relay in the partial secrecy regime
|Author:||Osorio, Diana Pamela Moya1,2; Alves, Hirley1; Olivo, Edgar Eduardo Benitez3|
1Centre for Wireless Communications (CWC), University of Oulu, Finland
2Department of Electrical Engineering, Center of Exact Sciences and Technology, Federal University of São Carlos, 13565-905 São Carlos, Brazil
3São Paulo State University (UNESP), Campus of São João da Boa Vista, 13876-750 São João da Boa Vista, Brazil
|Online Access:||PDF Full Text (PDF, 0.5 MB)|
|Persistent link:|| http://urn.fi/urn:nbn:fi-fe202001071312
Institute of Electrical and Electronics Engineers,
|Publish Date:|| 2020-01-07
Recently, three useful secrecy metrics based on the partial secrecy regime were proposed to analyze secure transmissions on wireless systems over quasi-static fading channels, namely: generalized secrecy outage probability, average fractional equivocation, and average information leakage. These metrics were devised from the concept of fractional equivocation, which is related to the decoding error probability at the eavesdropper, so as to provide a comprehensive insight on the practical implementation of wireless systems with different levels of secrecy requirements. Considering the partial secrecy regime, in this paper we examine the secrecy performance of an amplify-and-forward relaying network with an untrusted relay node, where a destination-based jamming is employed to enable secure transmissions. In this regard, a closed-form approximation is derived for the generalized secrecy outage probability, and integral-form expressions are obtained for the average fractional equivocation and the average information leakage rate. Additionally, equal and optimal power allocation schemes are investigated and compared for the three metrics. From this analysis, we show that different power allocation approaches lead to different system design criteria. The obtained expressions are validated via Monte Carlo simulations.
IEEE transactions on information forensics and security
|Pages:||2268 - 2281|
|Type of Publication:||
A1 Journal article – refereed
|Field of Science:||
213 Electronic, automation and communications engineering, electronics
This work was supported in part by São Paulo Research Foundation (FAPESP) under Grant 2017/20990-6, in part by the Academy of Finland 6Genesis Flagship under Grant 318927, in part by the EE-IoT project under Grant 319008, and in part by the Brazilian National Council for Scientific and Technological Development (CNPq) under Grants 428649/2016-5 and 421850/2018-3.
|Academy of Finland Grant Number:||
318927 (Academy of Finland Funding decision)
© 2019 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.