Security-oriented cooperation scheme in wireless cooperative networks

被引:7
|
作者
Wang, Li [1 ]
Yang, Lie-Liang [2 ]
Ma, Jacob Xin [1 ]
Song, Mei [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Elect Engn, Beijing 100088, Peoples R China
[2] Univ Southampton, Sch Elect & Comp Sci, Southampton SO17 1BJ, Hants, England
基金
中国国家自然科学基金;
关键词
cooperative communication; telecommunication security; Markov processes; relay networks (telecommunication); jamming; optimisation; security-oriented cooperation scheme; SOC scheme; cooperation scenarios; jammer only; relay only; relayaEuro"jammer pair; security requirement; operational conditions; security performance; energy consumption; finite-state Markov channels; generalised cooperative security scheme; communication environments; wireless cooperative networks; RELAY SELECTION; CHANNEL;
D O I
10.1049/iet-com.2013.0365
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This study proposes a security-oriented cooperation (SOC) scheme, which first determines one of the three possible cooperation scenarios, namely the jammer only, relay only and the relay-jammer pair, according to the security requirement and network's operational conditions. After determining a cooperation scenario, then, the selection of a relay or/and a jammer as well as their transmit power are jointly optimised with the objective to attain a good trade-off between security performance and energy consumption. The performance of the networks employing the proposed SOC is investigated here over finite-state Markov channels. The studies and results explain that the proposed SOC scheme constitutes one of the promising SOC schemes. It belongs to a generalised cooperative security scheme, which adapts according to the specific security requirement and communication environments.
引用
收藏
页码:1265 / 1273
页数:9
相关论文
共 50 条
  • [1] A Novel Security-Oriented Cooperative Scheme for Wireless Relay Networks in Presence of Eavesdroppers
    Wang, Li
    Zhang, Xi
    Song, Mei
    Ke, Tenghui
    [J]. 2012 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2012, : 4344 - 4349
  • [2] Security-Oriented Transmission Based on Cooperative Relays in Cognitive Radio
    Wang Li
    Ma Xin
    Ma Yue
    Teng Yinglei
    Zhang Yong
    [J]. CHINA COMMUNICATIONS, 2013, 10 (08) : 27 - 35
  • [3] A Security-Oriented Data-Sharing Scheme Based on Blockchain
    Ma, Wei
    Wei, Xibei
    Wang, Longlong
    [J]. APPLIED SCIENCES-BASEL, 2024, 14 (16):
  • [4] Security-Oriented Network Architecture
    Jiang, Weiyu
    Liu, Bingyang
    Wang, Chuang
    Yang, Xue
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [5] Security and cooperation in wireless networks
    Hubaux, Jean-Pierre
    [J]. Security and Privacy in Ad-hoc and Sensor Networks, 2006, 4357 : 1 - 2
  • [6] Security-oriented opportunistic data forwarding in Mobile Social Networks
    Wu, Dapeng
    Zhang, Feng
    Wang, Honggang
    Wang, Ruyan
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 87 : 803 - 815
  • [7] A physical layer security scheme based on cooperative jamming in energy cooperation networks
    Chongqing Key Laboratory of Mobile Communication Technology, Chongqing University of Posts and Telecommunications, Chongqing
    400065, China
    [J]. Beijing Youdian Daxue Xuebao, 6 (65-68 and 80):
  • [8] Security-oriented service composition and evolution
    Han, Jun
    Kowalczyk, Ryszard
    Khan, Khaled M.
    [J]. ASPEC 2006: 13TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE, PROCEEDINGS, 2006, : 71 - 78
  • [9] On some directions in security-oriented research
    Sekanina, Lukas
    Hruska, Tomas
    Vojnar, Tomas
    Kolar, Dusan
    Cernocky, Jan
    [J]. 2007 ECSIS SYMPOSIUM ON BIO-INSPIRED, LEARNING, AND INTELLIGENT SYSTEMS FOR SECURITY, PROCEEDINGS, 2007, : 141 - +
  • [10] Improving Perimeter Security with Security-oriented Program Transformations
    Hafiz, Munawar
    Johnson, Ralph E.
    [J]. 2009 ICSE WORKSHOP ON SOFTWARE ENGINEERING FOR SECURE SYSTEMS, 2009, : 61 - 67