Abstract:Incorporating the physical layer characteristics to secure communications has received considerable attention in recent years. Moreover, cooperation with some nodes of network can give benefits of multiple-antenna systems, increasing the secrecy capacity of such channels. In this paper, we consider cooperative wiretap channel with the help of an Amplify and Forward (AF) relay to transmit confidential messages from source to legitimate receiver in the presence of an eavesdropper. In this regard, the secrecy cap… Show more
“…In Figure , ESR in terms of ρ in WJ scenario is evaluated for OPA and non‐OPA modes in the first phase for topologies T1 and T2, and for untrusted relays and trusted relays. In this figure, the untrusted relay scenario in this paper is compared with the trusted relay mentioned in other works . It is assumed that in the second phase, OPA has been done for ξ = ξ * .…”
Section: Numerical Resultsmentioning
confidence: 99%
“…In this figure, the untrusted relay scenario in this paper is compared with the trusted relay mentioned in other works. [4][5][6][7][8][9][10][11][12][13] It is assumed that in the second phase, OPA has been done for ξ = ξ * . Simulation results show that ESR in T1 for OPA mode is totally consistent with trusted relay mode since in this mode, the relay plays no role in providing a D2D connection and acts only as an eavesdropper.…”
Section: Figurementioning
confidence: 99%
“…A long this line, we proceed to the OPA problem and secrecy rate analysis for the mentioned scenarios under two topologies T1 and T2. So far, the relays assisted cellular communications, [3][4][5][6][7][8][9][10][11][12][13] D2D communication using trusted relays, 22,26,27 and the security in cellular and D2D communications [14][15][16][17][18]23,28 are investigated. Here, we consider an overlay D2D pair that communicates with each other through an untrusted AF relay, where in addition to helping data transmission also plays the role of the eavesdropper.…”
Section: Introductionmentioning
confidence: 99%
“…This method requires double coding of the transmitted signal. Mirzaee and Akhlaghi and Fang et al examine secure transmission between a transmitter and a receiver through an amplify‐and‐forward (AF) relay in the presence of an eavesdropper. In the work of Mirzaee and Akhlaghi, by using power assignment among the relays, some results for the optimal power allocation (OPA) have been obtained and it is shown that OPA will improve the secrecy rate.…”
Section: Introductionmentioning
confidence: 99%
“…Mirzaee and Akhlaghi and Fang et al examine secure transmission between a transmitter and a receiver through an amplify‐and‐forward (AF) relay in the presence of an eavesdropper. In the work of Mirzaee and Akhlaghi, by using power assignment among the relays, some results for the optimal power allocation (OPA) have been obtained and it is shown that OPA will improve the secrecy rate. Two cooperative jamming protocols have been proposed in the work of Fang et al, where the confidentially of communication is supported by sending the jamming signal either by the transmitter or the relay.…”
In this paper, the physical layer security is studied in device‐to‐device (D2D) communications overlaying cellular network where a D2D pair communicates with each other through an untrusted amplify‐and‐forward (AF) relay. Meanwhile, an untrusted relay acts as an eavesdropper in the network. In addition, a jammer is used to create secure communications between D2D pairs. To obtain ergodic secrecy rate (ESR), two scenarios of without jammer (WoJ) and with jammer (WJ) are investigated. In both scenarios, first, the optimal power allocation (OPA) problem is formulated and solved, and then, new closed‐form solutions are presented by calculating the ESR. Moreover, for the WJ scenario, the slope and power offset of the ESR in high signal‐to‐noise ratio are evaluated. Simulation results are presented to determine the importance of OPA and using a jammer to improve the ESR. In addition, the effects of increasing the distance between D2D pairs with each other and with untrusted relays are investigated. The simulation results validate our closed‐form expressions and show that the ESR improves with OPA, and the ESR of the WJ scenario is higher than the WoJ scenario.
“…In Figure , ESR in terms of ρ in WJ scenario is evaluated for OPA and non‐OPA modes in the first phase for topologies T1 and T2, and for untrusted relays and trusted relays. In this figure, the untrusted relay scenario in this paper is compared with the trusted relay mentioned in other works . It is assumed that in the second phase, OPA has been done for ξ = ξ * .…”
Section: Numerical Resultsmentioning
confidence: 99%
“…In this figure, the untrusted relay scenario in this paper is compared with the trusted relay mentioned in other works. [4][5][6][7][8][9][10][11][12][13] It is assumed that in the second phase, OPA has been done for ξ = ξ * . Simulation results show that ESR in T1 for OPA mode is totally consistent with trusted relay mode since in this mode, the relay plays no role in providing a D2D connection and acts only as an eavesdropper.…”
Section: Figurementioning
confidence: 99%
“…A long this line, we proceed to the OPA problem and secrecy rate analysis for the mentioned scenarios under two topologies T1 and T2. So far, the relays assisted cellular communications, [3][4][5][6][7][8][9][10][11][12][13] D2D communication using trusted relays, 22,26,27 and the security in cellular and D2D communications [14][15][16][17][18]23,28 are investigated. Here, we consider an overlay D2D pair that communicates with each other through an untrusted AF relay, where in addition to helping data transmission also plays the role of the eavesdropper.…”
Section: Introductionmentioning
confidence: 99%
“…This method requires double coding of the transmitted signal. Mirzaee and Akhlaghi and Fang et al examine secure transmission between a transmitter and a receiver through an amplify‐and‐forward (AF) relay in the presence of an eavesdropper. In the work of Mirzaee and Akhlaghi, by using power assignment among the relays, some results for the optimal power allocation (OPA) have been obtained and it is shown that OPA will improve the secrecy rate.…”
Section: Introductionmentioning
confidence: 99%
“…Mirzaee and Akhlaghi and Fang et al examine secure transmission between a transmitter and a receiver through an amplify‐and‐forward (AF) relay in the presence of an eavesdropper. In the work of Mirzaee and Akhlaghi, by using power assignment among the relays, some results for the optimal power allocation (OPA) have been obtained and it is shown that OPA will improve the secrecy rate. Two cooperative jamming protocols have been proposed in the work of Fang et al, where the confidentially of communication is supported by sending the jamming signal either by the transmitter or the relay.…”
In this paper, the physical layer security is studied in device‐to‐device (D2D) communications overlaying cellular network where a D2D pair communicates with each other through an untrusted amplify‐and‐forward (AF) relay. Meanwhile, an untrusted relay acts as an eavesdropper in the network. In addition, a jammer is used to create secure communications between D2D pairs. To obtain ergodic secrecy rate (ESR), two scenarios of without jammer (WoJ) and with jammer (WJ) are investigated. In both scenarios, first, the optimal power allocation (OPA) problem is formulated and solved, and then, new closed‐form solutions are presented by calculating the ESR. Moreover, for the WJ scenario, the slope and power offset of the ESR in high signal‐to‐noise ratio are evaluated. Simulation results are presented to determine the importance of OPA and using a jammer to improve the ESR. In addition, the effects of increasing the distance between D2D pairs with each other and with untrusted relays are investigated. The simulation results validate our closed‐form expressions and show that the ESR improves with OPA, and the ESR of the WJ scenario is higher than the WoJ scenario.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.