Next Article in Journal
Quality Detection of Litchi Stored in Different Environments Using an Electronic Nose
Previous Article in Journal
Rotation Matrix Method Based on Ambiguity Function for GNSS Attitude Determination
Article Menu

Export Article

Open AccessArticle
Sensors 2016, 16(6), 846; doi:10.3390/s16060846

Physical Layer Security Using Two-Path Successive Relaying

1,†
,
1,†,* and 2,†
1
Wireless Communication Centre, Faculty of Electrical Engineering, Universiti Teknologi Malaysia, Skudai 81310, Johor, Malaysia
2
School of Computing and Communications, Lancaster University, Lancaster, LA1 4YW, UK
These authors contributed equally to this work.
*
Author to whom correspondence should be addressed.
Academic Editor: Leonhard M. Reindl
Received: 4 February 2016 / Revised: 25 March 2016 / Accepted: 7 April 2016 / Published: 9 June 2016
(This article belongs to the Section Sensor Networks)
View Full-Text   |   Download PDF [319 KB, uploaded 9 June 2016]   |  

Abstract

Relaying is one of the useful techniques to enhance wireless physical-layer security. Existing literature shows that employing full-duplex relay instead of conventional half-duplex relay improves secrecy capacity and secrecy outage probability, but this is at the price of sophisticated implementation. As an alternative, two-path successive relaying has been proposed to emulate operation of full-duplex relay by scheduling a pair of half-duplex relays to assist the source transmission alternately. However, the performance of two-path successive relaying in secrecy communication remains unexplored. This paper proposes a secrecy two-path successive relaying protocol for a scenario with one source, one destination and two half-duplex relays. The relays operate alternately in a time division mode to forward messages continuously from source to destination in the presence of an eavesdropper. Analytical results reveal that the use of two half-duplex relays in the proposed scheme contributes towards a quadratically lower probability of interception compared to full-duplex relaying. Numerical simulations show that the proposed protocol achieves the ergodic achievable secrecy rate of full-duplex relaying while delivering the lowest probability of interception and secrecy outage probability compared to the existing half duplex relaying, full duplex relaying and full duplex jamming schemes. View Full-Text
Keywords: wireless sensor network; 5G; physical layer secrecy; cooperative relay networks; two-path successive relaying; secrecy capacity; intercept probability; secrecy outage probability wireless sensor network; 5G; physical layer secrecy; cooperative relay networks; two-path successive relaying; secrecy capacity; intercept probability; secrecy outage probability
Figures

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. (CC BY 4.0).

Scifeed alert for new publications

Never miss any articles matching your research from any publisher
  • Get alerts for new papers matching your research
  • Find out the new papers from selected authors
  • Updated daily for 49'000+ journals and 6000+ publishers
  • Define your Scifeed now

SciFeed Share & Cite This Article

MDPI and ACS Style

Liau, Q.Y.; Leow, C.Y.; Ding, Z. Physical Layer Security Using Two-Path Successive Relaying. Sensors 2016, 16, 846.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Sensors EISSN 1424-8220 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top