Secrecy transmission with a helper: To relay or not to relay

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

8 Scopus citations

Abstract

In this paper, we consider secure communications between a source and a destination helped by a relay, in the presence of an eavesdropper. We consider both path-loss and fading in our channel models. We investigate such a question that whether the relay operates as a tradition relay or a jammer. A one time slot cooperative jamming and two time slots cooperative relaying transmission scheme are proposed. For fairness, we consider the total power constraint and assume that the two proposed schemes are with the same power budget. Optimal power allocation among the information signal and jamming signal are derived. For the proposed schemes, we give the performance comparison in the high and low transmitted power regimes, which gives some insight into the choice of transmission schemes to achieve a better performance. Furthermore, We analyze the impact of eavesdropper's position on security in our simulation.

Original languageEnglish
Title of host publication2014 IEEE International Conference on Communications Workshops, ICC 2014
PublisherIEEE Computer Society
Pages825-830
Number of pages6
ISBN (Print)9781479946402
DOIs
StatePublished - 2014
Event2014 IEEE International Conference on Communications Workshops, ICC 2014 - Sydney, NSW, Australia
Duration: 10 Jun 201414 Jun 2014

Publication series

Name2014 IEEE International Conference on Communications Workshops, ICC 2014

Conference

Conference2014 IEEE International Conference on Communications Workshops, ICC 2014
Country/TerritoryAustralia
CitySydney, NSW
Period10/06/1414/06/14

Fingerprint

Dive into the research topics of 'Secrecy transmission with a helper: To relay or not to relay'. Together they form a unique fingerprint.

Cite this