Improving security in two-way relay networks by optimal relay and jammer selection

S. Suganya, P. Shanmugapriya, T. R. Priyadharshini
{"title":"Improving security in two-way relay networks by optimal relay and jammer selection","authors":"S. Suganya, P. Shanmugapriya, T. R. Priyadharshini","doi":"10.1109/ICE-CCN.2013.6528508","DOIUrl":null,"url":null,"abstract":"The feasibility of physical layer security approach for communication in the presence of one or more eavesdroppers. In the previous scheme, the one-way cooperative networks can be used for transferring information from source to destination. At present this technique is implemented without the eavesdroppers and it becomes ineffective due to sometimes attackers can hack the file. In future this work is carried out in two-way cooperative networks using two-stage cooperative protocol and the objective is to design the system for secrecy capacity maximization or transmit power minimization. The information can be divided into two halves then transferred into intermediate nodes and then merge the files to the destination. By implementing two-stage cooperative protocol will maximize the secrecy capacity in the presence of eavesdroppers by selecting relay and jamming nodes.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"199 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICE-CCN.2013.6528508","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

The feasibility of physical layer security approach for communication in the presence of one or more eavesdroppers. In the previous scheme, the one-way cooperative networks can be used for transferring information from source to destination. At present this technique is implemented without the eavesdroppers and it becomes ineffective due to sometimes attackers can hack the file. In future this work is carried out in two-way cooperative networks using two-stage cooperative protocol and the objective is to design the system for secrecy capacity maximization or transmit power minimization. The information can be divided into two halves then transferred into intermediate nodes and then merge the files to the destination. By implementing two-stage cooperative protocol will maximize the secrecy capacity in the presence of eavesdroppers by selecting relay and jamming nodes.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
通过优化中继和干扰机的选择,提高双向中继网络的安全性
在存在一个或多个窃听者的情况下,物理层安全通信方法的可行性。在之前的方案中,可以使用单向协作网络来实现从源到目的的信息传递。目前该技术的实现没有窃听器,由于有时攻击者可以对文件进行黑客攻击,使得该技术变得无效。未来的工作将在采用两阶段合作协议的双向合作网络中进行,目标是设计保密容量最大化或传输功率最小化的系统。信息可以分成两半,然后传输到中间节点,然后将文件合并到目的地。通过对中继节点和干扰节点的选择,实现两阶段协作协议,使窃听者存在时的保密能力最大化。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Removing snow from an image via image decomposition Maximum a posteriori adaptation method for video semantic indexing Low power 8×8 Sum of Absolute Difference engine for Motion Estimation in video compression A modified preamble structure based carrier frequency offset (CFO) and phase noise compensation in an OFDM system Multiple learning based classifiers using layered approach and Feature Selection for attack detection
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1