期刊文献+

Distributed Secure Relay Selection Approach over Wireless Cooperative Networks 被引量:1

无限协作网络中一种高效的分布式安全中继选择方法(英文)
下载PDF
导出
摘要 Cloud computing is always adopted to enhance the computing capability of mobile systems, especially when the mobile users prefer to use some computation intensive applications. Consequently, the distributed wireless relay infrastructure should be deployed to aid the traffic transmission. To further enhance the QoS provisioning goals of wireless cooperative network, this paper puts forward a multi-objective approach for distributed optimal relay selection, which takes Bit Error Rate (BER) and Secrecy Capacity (SC) into account simultaneously. Firstly, our proposal partitions the channel state into several levels according to the received signal-to-noise ratio (SNR) and describes the time-varying Rayleigh fading channel characteristics by using first order finite-state Markov model. Secondly, we model the relay selection as Restless Multi-armed Bandit optimal solution problem with respect to the channel state and the state transition probability. Finally, simulation results demonstrate the efficiency of the proposed approach which outperforms the existing ones. Cloud computing is always adopted to enhance the computing capability of mobile systems, especially when the mobile users prefer to use some computation intensive applications. Consequently, the distributed wireless relay infrastructure should be deployed to aid the traffic transmission. To further enhance the QoS provisioning goals of wireless cooperative network, this paper puts forward a multi-objective approach for distributed optimal relay selection, which takes Bit Error Rate (BER) and Secrecy Capacity (SC) into account simultaneously. Firstly, our proposal partitions the channel state into several levels according to the received signal-to-noise ratio (SNR) and describes the time-varying Rayleigh fading channel characteristics by using first order finite-state Markov model. Secondly, we model the relay selection as Restless Multi-armed Bandit optimal solution problem with respect to the channel state and the state transition probability. Finally, simulation results demonstrate the efficiency of the proposed approach which outperforms the existing ones.
出处 《China Communications》 SCIE CSCD 2011年第6期76-85,共10页 中国通信(英文版)
基金 supported by National Natural Science Foundation of China under Grant No.60971083 Science Technology Innovation Foundationfor Young Teachers in BUPT under Grant No.2011RC0306 State Major Science and Technology Special Projects under Grant No.2011ZX03005-002-02 National International Science and Technology Cooperation Project of China under Grant No.2010DFA11320
关键词 cloud computing distributed relay selection secrecy capacity cloud computing distributed relay selection secrecy capacity
  • 相关文献

参考文献20

  • 1王莉,王景尧,魏翼飞,马跃,满毅.Energy-efficient Scheme for Multiple Access Network Selection Using Principal Component Analysis[J].China Communications,2011,8(3):133-144. 被引量:2
  • 2陆路希,蒋伟,项海格,罗武.采用模拟网络编码的认知中继网络双向通信的最优功率分配(英文)[J]中国通信,2010(04).
  • 3Song Meil Teng Yinglei Niu Fang Zhang Yong Wang Li.Broadband & Digital Content-Couple Subscriber Cooperative Relaying Networks for Uplink Transmission using Hierarchical Game Approach[J].China Communications,2010,7(2):16-31. 被引量:3
  • 4PALLIS G.Cloud Computing: The New Frontier of Internet Computing. IEEE Internet Computing . 2010
  • 5Kumar K,Yung-Hsiang Lu.Cloud Computing For Mobile Users: Can offloading computation save energy?. Comput- er . 2010
  • 6GROBAUER B,WALLOSCHEK T,STCKER E.Under- standing Cloud Computing Vulnerabilities. IEEE Security and Privacy . 2011
  • 7WU N,HUANG W,LI H.A Novel Relay Selection Algo- rithm for Relaying Networks. Proceedings of 2009 IEEE 70th Vehicular Technology Conference Fall (VTC 2009-Fall) . 2009
  • 8ZHANG X,GONG Y.Jointly optimizing power allocationand relay positions for multi-relay regenerative relaying with relay selection. 2010 4th International Conference on Sig- nal Processing and Communication Systems (ICSPCS 2010) . 2010
  • 9WYNER A.The Wire-Tap Channel. The Bell System Technical Journal . 1975
  • 10CSISZAR I,KORNER J.Broadcast Channels with Confiden- tial Messages. IEEE Transactions on Information Theory . 1978

二级参考文献37

  • 1Guopeng Zhang, Hailin Zhang, Liqiang Zhao, Wei Wang, Li Cong, "Fair Resource Sharing for Cooperative Relay Networks Using Nash Bargaining Solutions," IEEE Communications Letters, Vol. 13, no, 6, pp.381 - 383, Jun. 2009.
  • 2Saad W., Han, Z., Debbah, M., Hjorungnes, "A Distributed Coalition Formation Framework for Fair User Cooperation in Wireless Networks," IEEE Transactions on wireless communications, Vol. 8, no. 9, pp.4580 - 4593, Sep. 2009.
  • 3Lei You, Mei Song, Junde Song, Qingyu Miao, Yong Zhang, "Adaptive Resource Allocation in OFDMA Relay- Aided Cooperative Cellular Networks," VTC-2008.,pp. 1925 1929, May 2008.
  • 4Yingda Chen, Kishore. S, "A Game-Theoretic Analysis of Decode-and-Forward Cooperation in Rayleigh Fading Channels," CISS-2007, pp.306 - 311, Mar. 2007.
  • 5Zhaoyang Zhang, Jing Shi, Hsiao-Hwa Chen, Guizani, M, Peiliang Qiu, "A Cooperation Strategy Based on Nash Bargaining Solution in Cooperative Relay Networks," IEEE Transasitions on Vehicular Technology, Vol. 57, pp.2570 2577,July 2008.
  • 6Ji, J, Adve. R.S, "Evaluation of Game Theoretic Approaches to Cooperative Wireless Network Design," 23rd Biennial Symposium on Communications, pp.75 - 79, 2006.
  • 7Lei Huang, Mengtian Rong, Lan Wang, Yisheng Xue, Schulz, E., "Resource Allocation for OFDMA Based Relay Enhanced Cellular Networks,"VYC-2009, pp.3160 - 3164, Apr. 2007.
  • 8Zhu Han, Poor, H.V, "Coalition Games with Cooperative Transmission: A Cure for the Curse of Boundary Nodes in Selfish Packet-Forwarding Wireless Networks," IEEE Transations on Communicaitons, Vol. 57, pp.203 - 213, Jan.2009.
  • 9Marina, N., "Game Theoretic Analysis of a Cooperative Communication System," Wireless Conference, EW 2008, 14th European, pp. 1 - 6, Jun. 2008.
  • 10Beibei Wang, Zhu Han, Liu. K.J.R., "Distributed Relay Selection and Power Control for Multiuser Cooperative Communication Networks Using Buyer/Seller Game," IEEE INFOCOM, pp. 544 - 552, May 2007.

共引文献3

同被引文献16

  • 1LLrN Dong ZHU Hart, PETROPULU A, et al. Improving Wireless Physical Layer Security via Cooperating Relays[J]. IEEE Transactions on Signal Processing 2010, 58(3): 1875-1888.
  • 2YUKSEL M, XI Liu, ERKIP E. A Secure Communication Game With a Relay Helping the Eavesdropper[J]. IEEE Transactions on Information Forensics and Security, 2011, 6(3): 818-830.
  • 3OGGIER F, HASSIBI B. The Secrecy Capacity of the MIMO Wiretap Channel[J]. IEEE Transactions on Information Theory, 2011, 57(8): 4961-4972.
  • 4WANG Li, SONGMei, MA Yue, et al. An Efficient Scheme for Access Selection over a Novel Green Heterogeneous Network Architecture[C]// Proceedings of the 2011 IEEE Vehicular Technology Conference: September 5-8, 2011, San Francisco, CA, USA. IEEE Press, 2011: 1-5.
  • 5NEGI R, GOEL S. Secret Communication Using Artificial Noise[C]//Proceedings of the IEEE 62nd Vehicular Technology Conference: September 25-28, 2005, Dallas, USA. IEEE Press, 2005: 1906-1910.
  • 6JING Huang, SWINDLEHURST A. Secure Communications via Cooperative Jamming in Two-Hop Relay Systems[C]// Proceedings of the 2010 IEEE Global Telecommunications Conference: December 6-10 2010, Miami, Florida, USA. IEEE Press, 2010: 1-5.
  • 7VILELA J, BLOCH M, BARROS J, et al. Wireless Secrecy Regions with Friendly Jamming[J]. IEEE Transactions on Information Forensics and Security, 2011, 6(2): 256-266.
  • 8ZHENG G, CHOO L, WONG K. Optimal Cooperative Jamming to Enhance Physical Layer Security Using Relays [J]. IEEE Transactions on Signal Processing, 2011, 59(3): 1317-1322.
  • 9FAKOORIAN A, SWINDLEHURST A. Solutions for the MIMO Gaussian Wiretap Channel with a Cooperative Jammer[J] IEEE Transactions on Signal Processing, 2011, 59(10): 5013-5022.
  • 10CHANG M, LEE S, CHIEN C, et al. Performance Analysis and Modelling of Single-Step Power Control in Finite State Markov Channel Under Different Feedback Channels [J]. IEEE Transactions on Communications, 2010, 58(4): 1280-1290.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部