2018
DOI: 10.1002/ett.3534
|View full text |Cite
|
Sign up to set email alerts
|

Performance evaluation of amplify‐and‐forward relaying cooperative vehicular networks under physical layer security

Abstract: In this paper, we address the physical layer security of a cooperative vehicular network in the presence of a passive eavesdropper vehicle, where the communication from a fixed source node to a fixed destination node is assisted by an amplify‐and‐forward relay vehicle and by direct link, in two transmission phases. Based on the security of the first transmission phase, we consider two scenarios for the cooperative vehicular networks. In Scenario I, the first phase is secure (ie, the direct link between source … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
11
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 21 publications
(11 citation statements)
references
References 38 publications
(93 reference statements)
0
11
0
Order By: Relevance
“…In Table 1, we show the SOP difference between the selection criteria using (14) and the selection criteria using (15) and (16), for various values of N a , M when̄e = −10 dB, N E = 1, and  s = 0.2 bps/Hz. It can be seen from Table 1 that the difference between the SOP using criteria given in (14) and the SOP using our proposed criteria presented in (15) and (16) is very small, irrespective of N a and M. This indicates the effectiveness of our proposed antenna and user selection strategies.…”
Section: Numerical and Simulation Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…In Table 1, we show the SOP difference between the selection criteria using (14) and the selection criteria using (15) and (16), for various values of N a , M when̄e = −10 dB, N E = 1, and  s = 0.2 bps/Hz. It can be seen from Table 1 that the difference between the SOP using criteria given in (14) and the SOP using our proposed criteria presented in (15) and (16) is very small, irrespective of N a and M. This indicates the effectiveness of our proposed antenna and user selection strategies.…”
Section: Numerical and Simulation Resultsmentioning
confidence: 99%
“…Moreover, physical-layer security in cooperative relaying communications has gained tremendous attention because of the fact that the relay systems can enhance the throughput, reliability, and coverage of the emerging and future generation wireless networks. [10][11][12][13][14][15][16][17][18] Specifically, two-way relaying (TWR) communications has envisioned as a potential candidate to combat wireless fading and shadowing and to offer high spectral efficiency. [19][20][21][22] However, due to open wireless environment, such networks are vulnerable to potential eavesdropping attacks, and hence secrecy is the major concern.…”
Section: Introductionmentioning
confidence: 99%
“…Xu et al [24] evaluated the secrecy performance of a non-cooperative relaying networks with mobile nodes under N*Nakagami-m fading channels. However, the literature investigating the PHY-security aspects in cooperative networks with mobile nodes are limited [25][26][27][28][29]. Specifically, Ren et al [25] evaluated the secrecy performance of an amplify-and-forward (AF)-based cooperative relaying network, but they have considered Rayleigh fading for V2V channels.…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, Zhang and Pan [27] investigated the secrecy performance of a decode-and-forward (DF)-based cooperative vehicular relaying network under double-Rayleigh fading channels. Recently, Pandey and Yadav [28,29] investigated the secrecy performance of the cooperative relaying networks under mixed Rayleigh and double-Rayleigh fading channels. To the best of authors' knowledge, PHY-security for the cooperative relaying networks by employing AF relaying protocol and using double Nakagami-m fading for V2V channels has not been investigated so far.…”
Section: Introductionmentioning
confidence: 99%
“…The two types of nodes in the network is normal and abnormal nodes 15 . A normal type of nodes in the network actively participates in the network and show its cooperation with its neighbor nodes 16 . Abnormal nodes are those nodes which are not taking part in the network activities and can degrade the performance of the network.…”
Section: Introductionmentioning
confidence: 99%