Cooperative Transmission for Physical Layer Security by Exploring Social Awareness

12/26/2017
by   Yiming Xu, et al.
0

Social awareness and social ties are becoming increasingly fashionable with emerging mobile and handheld devices. Social trust degree describing the strength of the social ties has drawn lots of research interests in many fields including secure cooperative communications. Such trust degree reflects the users' willingness for cooperation, which impacts the selection of the cooperative users in the practical networks. In this paper, we propose a cooperative relay and jamming selection scheme to secure communication based on the social trust degree under a stochastic geometry framework. We aim to analyze the involved secrecy outage probability (SOP) of the system's performance. To achieve this target, we propose a double Gamma ratio (DGR) approach through Gamma approximation. Based on this, the SOP is tractably obtained in closed form. The simulation results verify our theoretical findings, and validate that the social trust degree has dramatic influences on the network's secrecy performance.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/23/2018

Cooperative Secure Transmission by Exploiting Social Ties in Random Networks

Social awareness and social ties are becoming increasingly popular with ...
research
10/21/2021

Physical Layer Security in Relay Networks with Outdated Relay Selection

In this paper, the secrecy performance of a cooperative relay network wi...
research
02/03/2019

Outage Performance in Secure Cooperative NOMA

Enabling cooperation in a NOMA system is a promising approach to improve...
research
05/17/2019

A new secure multi-hop untrusted relaying scheme

Cooperative relaying is utilized as an efficient method for data communi...
research
08/09/2020

A Survey on Human-centric Communications in Non-cooperative Wireless Relay Networks

The performance of data delivery in wireless relay networks (WRNs), such...
research
01/10/2023

Improving unlinkability in C-ITS: a methodology for optimal obfuscation

In this paper, we develop a new methodology to provide high assurance ab...

Please sign up or login with your details

Forgot password? Click here to reset