• KSII Transactions on Internet and Information Systems
    Monthly Online Journal (eISSN: 1976-7277)

Security Performance Analysis of DF Cooperative Relay Networks over Nakagami-m Fading Channels


Abstract

In this paper, we investigate the security performance for cooperative networks over Nakagami-m fading channels. Based on whether the channel state information (CSI) of wiretap link is available or not, optimal relay selection (ORS) and suboptimal relay selection (SRS) schemes are considered. Also, multiple relays combining (MRC) scheme is considered for comparison purpose. The exact and asymptotic closed-form expressions for secrecy outage probability (SOP) are derived and simulations are presented to validate the accuracy of our proposed analytical results. The numerical results illustrate that the ORS is the best scheme and SRS scheme is better than MRC scheme in some special scenarios such as when the destination is far away from the relays. Furthermore, through asymptotic analysis, we obtain the closed-form expressions for the secrecy diversity order and secrecy array gain for the three different selection schemes. The secrecy diversity order is closely related to the number of relays and fading parameter between relay and destination.


Statistics

Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2015)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article

[IEEE Style]
Huan Zhang, Hongjiang Lei, Imran Shafique Ansari, Gaofeng Pan and Khalid A. Qaraqe, "Security Performance Analysis of DF Cooperative Relay Networks over Nakagami-m Fading Channels," KSII Transactions on Internet and Information Systems, vol. 11, no. 5, pp. 2416-2432, 2017. DOI: 10.3837/tiis.2017.05.006

[ACM Style]
Zhang, H., Lei, H., Ansari, I. S., Pan, G., and Qaraqe, K. A. 2017. Security Performance Analysis of DF Cooperative Relay Networks over Nakagami-m Fading Channels. KSII Transactions on Internet and Information Systems, 11, 5, (2017), 2416-2432. DOI: 10.3837/tiis.2017.05.006