Analyzing Secrecy of Delay-Constrained System in Cooperative Relay Environment Using Rateless Codes

被引:0
|
作者
Jain, Sonam [1 ]
Ghose, Sarbani [1 ]
Bose, Ranjan [1 ]
机构
[1] Indian Inst Technol Delhi, Dept Elect Engn, New Delhi 110016, India
关键词
FOUNTAIN CODES; PERFORMANCE; SELECTION; DIVERSITY;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We analyze secrecy of a dual-hop cooperative system consisting of multiple decode-and-forward relays in delay-constrained environment using rateless code, where there exists a separate time limit for both the hops. During the first hop, source carries out rateless coded transmission in the allotted time. Relay nodes which have successfully acquired target entropy forwards the information to the destination in the given time limit, using same rateless code at each node. Simultaneous transmissions by these relay nodes leads to faster accumulation of energy at the destination thereby reducing the decoding time. We have derived a closed-form expression of the average time for the first phase which allows fixed number of relays to decode the information. Analysis for achieving the time limit by these relays in the second phase has also been evaluated. Simulation results show that there exist an optimal number of decoding relays that leads to the lowest expenditure of the total time. Further, a closed-form expression for secrecy outage probability of this delay-constrained dual hop system has been derived.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] Optimization for Multi-relay Selection with Rateless Code in Cooperative Communication System
    Jin Yuchao
    Li Yonghua
    Lin Jiaru
    Lu Yueming
    2013 16TH INTERNATIONAL SYMPOSIUM ON WIRELESS PERSONAL MULTIMEDIA COMMUNICATIONS (WPMC), 2013,
  • [32] Multicast Scheduling for Relay-Based Heterogeneous Networks Using Rateless Codes
    Chen, Chao
    Baek, Seung Jun
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2017, 16 (11) : 3142 - 3155
  • [33] Energy Efficient Relay Selection Scheme for Cooperative Transmission Aided Rateless Codes in Wireless Sensor Networks
    Zhu, Kaiyan
    Wang, Fei
    Li, Songsong
    Niu, Fanglin
    Jiang, Fengjiao
    2016 INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING AND COMMUNICATIONS TECHNOLOGY (IECT 2016), 2016, : 258 - 262
  • [34] NOMA Combined With RC for Reliable and Secure Transmission in a Delay-Constrained System
    Jain, Sonam
    Bose, Ranjan
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2021, 10 (12) : 2639 - 2643
  • [35] On a Game Between a Delay-constrained Communication System and a Finite State Jammer
    Jose, Sharu Theresa
    Kulkarni, Ankur A.
    2018 IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2018, : 5063 - 5068
  • [36] Secrecy Enhancement of Dual-Hop Cooperative Relay System Using Signal Space Diversity
    Khan, Muhammad Ajmal
    2019 16TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2019,
  • [37] A non-cooperative power control game in delay-constrained multiple-access networks
    Meshkati, F
    Poor, HV
    Schwartz, SC
    2005 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), VOLS 1 AND 2, 2005, : 700 - 704
  • [38] Delay-Constrained Multicast Routing Using the Noisy Chaotic Neural Networks
    Wang, Lipo
    Liu, Wen
    Shi, Haixiang
    IEEE TRANSACTIONS ON COMPUTERS, 2009, 58 (01) : 82 - 89
  • [39] Outage constrained secrecy rate maximization using cooperative jamming
    Rutgers University, Piscataway, NJ 08854, United States
    IEEE Stat. Signal Process. Workshop, SSP, 2012, (389-392):
  • [40] Reliable and Efficient Message Delivery in Delay Tolerant Networks Using Rateless Codes
    Vellambi, Badri N.
    Subramanian, Ramanan
    Fekri, Faramarz
    Ammar, Mostafa
    MOBIOPP'07 - PROCEEDINGS OF THE FIRST INTERNATIONAL MOBISYS WORKSHOP ON MOBILE OPPORTUNISTIC NETWORKING, 2007, : 91 - +