Effect of Co-channel Interference on Two-Way Untrustworthy Relay Selection

  • PDF / 1,789,389 Bytes
  • 27 Pages / 439.37 x 666.142 pts Page_size
  • 82 Downloads / 149 Views

DOWNLOAD

REPORT


Effect of Co‑channel Interference on Two‑Way Untrustworthy Relay Selection Parvaneh Shams1 

© Springer Science+Business Media, LLC, part of Springer Nature 2020

Abstract This study investigates the impact of co-channel interference on two-way untrustworthy relay selection over Rayleigh fading environment. The investigation considers that two source terminals make information exchange over J number of full-duplex based amplifyand-forward bi-directional untrustworthy relay in the presence of co-channel interference. In addition, limited number of friendly jammers generate artificial interference/noise signals to mitigate information leakage. So as to minimize the system overhead and also enhancing secrecy performance, the relay selection is made by means of max–min criteria, which is based on maximizing the minimum secrecy rate over the relay terminals. The system model fundamental performance limits are measured by means of secrecy outage probability, secrecy achievable sum rate, intercept probability, and secrecy throughput analysis metrics. According to Monte-Carlo based simulations and numerical results, the max–min based selection strategy achieves cooperative diversity order, which is equal to total number of possible paths, in high signal-to-noise ratio regimes. Results also reveal that the co-channel interference dominates the process of the information exchange and degrades the achievable cooperative diversity order from J to 0 and leads system coding gain losses on free-interference cases in high signal-to-noise ratio regimes. Keywords  Co-channel interference · Two-way full-duplex relay · Secrecy outage probability · Secrecy achievable sum rate · Intercept probability · Throughput analysis

1 Introduction Since mobile terminals use an open wireless medium to exchange information, the communication process is vulnerable to cyber-attacks. In order to secure the communication connection between two nodes against eavesdroppers’ access, physical layer protection is proposed [1]. Until Wyner’s [2] wire-tap channels, the cyber attacks are eliminated with the help of higher layer encryption techniques, which are advances encryption standards (AES) [3] and Rivest–Shamir–Adleman (RSA) [3]. Wyner showed that physical layer security (PLS) * Parvaneh Shams [email protected] 1



Department of Computer Engineering, Istanbul Aydin University, 34295 Istanbul, Turkey

13

Vol.:(0123456789)

P. Shams

could be an alternative solution to prevent the aforementioned attacks by using artificial noise/interference to mitigate the overhearing process. Liu et al. [4] shows that the secrecy rate is the difference between the rate of the legitimate terminals and the eavesdropper. In addition, Liu et al. [4] also mainly focuses on a model of powered-friendly jammer for secure communication without relying on an external energy supply. Reference [5] proves that because of the wireless fading channels, the intercept of transmission information is increased when the secrecy rate is extremely limited. Friendly jammer assist