Opportunistic Relaying and Random Linear Network Coding for Secure and Reliable Communication
Opportunistic relaying has the potential to achieve full diversity gain, while random linear network coding (RLNC) can reduce latency and energy consumption. In recent years, there has been a growing interest in the integration of both schemes into wireless networks in order to reap their benefits,...
Gespeichert in:
| Veröffentlicht in: | IEEE transactions on wireless communications Jg. 17; H. 1; S. 223 - 234 |
|---|---|
| Hauptverfasser: | , |
| Format: | Journal Article |
| Sprache: | Englisch |
| Veröffentlicht: |
IEEE
01.01.2018
|
| Schlagworte: | |
| ISSN: | 1536-1276, 1558-2248 |
| Online-Zugang: | Volltext |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
| Abstract | Opportunistic relaying has the potential to achieve full diversity gain, while random linear network coding (RLNC) can reduce latency and energy consumption. In recent years, there has been a growing interest in the integration of both schemes into wireless networks in order to reap their benefits, while considering security concerns. This paper considers a multi-relay network, where relay nodes employ RLNC to encode confidential data and transmit coded packets to a destination in the presence of an eavesdropper. Four relay selection protocols are studied covering a range of network capabilities, such as the availability of the eavesdropper's channel state information or the possibility to pair the selected relay with a node that intentionally generates interference. For each case, expressions for the probability that a coded packet will not be recovered by a receiver, which can be either the destination or the eavesdropper, are derived. Based on those expressions, a framework is developed that characterizes the probability of the eavesdropper intercepting a sufficient number of coded packets and partially or fully recovering the confidential data. Simulation results confirm the validity and accuracy of the theoretical framework and unveil the security-reliability trade-offs attained by each RLNC-enabled relay selection protocol. |
|---|---|
| AbstractList | Opportunistic relaying has the potential to achieve full diversity gain, while random linear network coding (RLNC) can reduce latency and energy consumption. In recent years, there has been a growing interest in the integration of both schemes into wireless networks in order to reap their benefits, while considering security concerns. This paper considers a multi-relay network, where relay nodes employ RLNC to encode confidential data and transmit coded packets to a destination in the presence of an eavesdropper. Four relay selection protocols are studied covering a range of network capabilities, such as the availability of the eavesdropper's channel state information or the possibility to pair the selected relay with a node that intentionally generates interference. For each case, expressions for the probability that a coded packet will not be recovered by a receiver, which can be either the destination or the eavesdropper, are derived. Based on those expressions, a framework is developed that characterizes the probability of the eavesdropper intercepting a sufficient number of coded packets and partially or fully recovering the confidential data. Simulation results confirm the validity and accuracy of the theoretical framework and unveil the security-reliability trade-offs attained by each RLNC-enabled relay selection protocol. |
| Author | Khan, Amjad Saeed Chatzigeorgiou, Ioannis |
| Author_xml | – sequence: 1 givenname: Amjad Saeed surname: Khan fullname: Khan, Amjad Saeed email: a.khan9@lancaster.ac.uk organization: Sch. of Comput. & Commun., Lancaster Univ., Lancaster, UK – sequence: 2 givenname: Ioannis surname: Chatzigeorgiou fullname: Chatzigeorgiou, Ioannis email: i.chatzigeorgiou@lancaster.ac.uk organization: Sch. of Comput. & Commun., Lancaster Univ., Lancaster, UK |
| BookMark | eNp9kE9Lw0AQxRepYFu9C17yBVJ3sslucpTgPygWasWThM1mIqvJbtlskX57N7Z48OBlZuC938zwZmRirEFCLoEuAGhxvXktFwkFsUgET_MCTsgUsiyPkyTNJ-PMeAxBOyOzYfigwcmzbEreVtutdX5n9OC1itbYyb0275E0TbQOxfbRUhuULnpC_2XdZ1TaZjS01kXPqHYOD17stKw7DHLfh21Kem3NOTltZTfgxbHPycvd7aZ8iJer-8fyZhkrRjMf50glr1kjihwaQdskQUwzBMUz0WAta0ypqAuhGGt4qgBYU6RIU2BcFEVN2ZzQw17l7DA4bKut0710-wpoNcZThXiqMZ7qGE9A-B9Eaf_ztHdSd_-BVwdQI-LvnZzmCTBg3wJEdR0 |
| CODEN | ITWCAX |
| CitedBy_id | crossref_primary_10_1109_JIOT_2020_2969955 crossref_primary_10_1108_IJIUS_08_2021_0091 crossref_primary_10_1007_s10878_023_01065_y crossref_primary_10_1109_TCOMM_2020_2971680 crossref_primary_10_3390_electronics12183764 crossref_primary_10_1109_ACCESS_2018_2877219 crossref_primary_10_1109_TCOMM_2019_2911578 crossref_primary_10_1016_j_adhoc_2021_102580 crossref_primary_10_1049_iet_com_2019_0767 crossref_primary_10_1109_TVT_2020_2992619 crossref_primary_10_1002_cpe_4635 crossref_primary_10_1109_TWC_2019_2891769 crossref_primary_10_1109_LWC_2022_3147601 crossref_primary_10_1109_TWC_2018_2869089 crossref_primary_10_1109_JIOT_2019_2902376 crossref_primary_10_1109_TVT_2020_3001871 crossref_primary_10_1109_ACCESS_2021_3114343 crossref_primary_10_1109_TVT_2018_2885869 crossref_primary_10_3390_e20100730 crossref_primary_10_1109_TCOMM_2022_3194074 crossref_primary_10_3390_e21100982 crossref_primary_10_1016_j_jisa_2019_102409 crossref_primary_10_1109_ACCESS_2019_2899507 crossref_primary_10_1109_ACCESS_2019_2929136 crossref_primary_10_1109_LWC_2018_2828420 |
| Cites_doi | 10.1109/TII.2013.2261082 10.1016/j.cose.2015.02.002 10.1109/TII.2014.2327915 10.1109/TIE.2009.2015754 10.1109/TVT.2017.2703305 10.1109/ISIT.2007.4557282 10.1109/TII.2016.2613504 10.1109/TWC.2016.2593445 10.1109/JPROC.2015.2463678 10.1109/TWC.2010.01.081128 10.1049/iet-com.2011.0003 10.1049/iet-com.2009.0634 10.1109/TVT.2015.2453364 10.1109/LCOMM.2015.2470662 10.1109/icc.2011.5963013 10.1109/JSAC.2005.862417 10.1109/TWC.2015.2506574 10.1109/CISS.2008.4558591 10.1109/TII.2015.2509442 10.1109/TCOMM.2010.100510.090258 10.1109/TCOMM.2013.111213.130235 10.1109/TWC.2013.110813.121671 10.1109/LWC.2017.2650224 10.1109/TIT.2006.881746 10.1109/TVT.2015.2478029 10.1109/LCOMM.2010.110310.101480 10.1109/TCOMM.2014.2350985 10.1109/TWC.2008.06090 10.1109/TCOMM.2012.011312.110015 10.1109/ISITA.2008.4895420 10.1109/TII.2014.2374071 10.1017/CBO9780511841224 10.1109/LCOMM.2017.2704110 10.1109/JPROC.2009.2015716 10.1109/TWC.2011.012411.100787 10.1109/LCOMM.2014.030914.140030 10.1109/TWC.2009.090323 10.1109/ICASSP.2012.6288501 10.1109/JPROC.2010.2094592 |
| ContentType | Journal Article |
| DBID | 97E ESBDL RIA RIE AAYXX CITATION |
| DOI | 10.1109/TWC.2017.2764891 |
| DatabaseName | IEEE Xplore (IEEE) IEEE Xplore Open Access Journals IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 1558-2248 |
| EndPage | 234 |
| ExternalDocumentID | 10_1109_TWC_2017_2764891 8082131 |
| Genre | orig-research |
| GrantInformation_xml | – fundername: Royal Society International Exchanges Scheme grantid: IE140855 funderid: 10.13039/501100000288 |
| GroupedDBID | -~X 0R~ 29I 4.4 5GY 5VS 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABQJQ ABVLG ACGFO ACGFS ACIWK AENEX AETIX AGQYO AGSQL AHBIQ AIBXA AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 EBS EJD ESBDL HZ~ H~9 IES IFIPE IPLJI JAVBF LAI M43 O9- OCL P2P RIA RIE RNS AAYXX CITATION |
| ID | FETCH-LOGICAL-c305t-8e0a6b3d7981d70f22ee45e1c657debabe407b97c33d64c113d94e04136799b03 |
| IEDL.DBID | RIE |
| ISICitedReferencesCount | 33 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000422945400017&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1536-1276 |
| IngestDate | Sat Nov 29 06:23:44 EST 2025 Tue Nov 18 22:08:50 EST 2025 Wed Aug 27 02:47:14 EDT 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 1 |
| Language | English |
| License | https://creativecommons.org/licenses/by/3.0/legalcode |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c305t-8e0a6b3d7981d70f22ee45e1c657debabe407b97c33d64c113d94e04136799b03 |
| ORCID | 0000-0002-8255-3834 0000-0001-6802-3434 |
| OpenAccessLink | https://ieeexplore.ieee.org/document/8082131 |
| PageCount | 12 |
| ParticipantIDs | crossref_primary_10_1109_TWC_2017_2764891 ieee_primary_8082131 crossref_citationtrail_10_1109_TWC_2017_2764891 |
| PublicationCentury | 2000 |
| PublicationDate | 2018-Jan. 2018-1-00 |
| PublicationDateYYYYMMDD | 2018-01-01 |
| PublicationDate_xml | – month: 01 year: 2018 text: 2018-Jan. |
| PublicationDecade | 2010 |
| PublicationTitle | IEEE transactions on wireless communications |
| PublicationTitleAbbrev | TWC |
| PublicationYear | 2018 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| References | ref13 ref12 ref15 ref14 cameron (ref47) 1994 cai (ref20) 2002 bhattad (ref43) 2005 ref17 ref16 ref19 ref18 liu (ref23) 2009 jeffrey (ref37) 2007 ref46 ref45 deb (ref10) 2005 ref42 ref41 ref44 ref49 ref8 ref7 ref9 ref4 ref3 ref6 ref5 ref40 ref34 ref36 szabo (ref11) 2015 geller (ref38) 1969; 71 ref31 ref30 ref33 ref32 ref2 ref1 ref39 papoulis (ref35) 2002 ref24 ref26 ref25 ref22 ref21 gabidulin (ref48) 1985; 21 ref28 ref27 ref29 |
| References_xml | – ident: ref6 doi: 10.1109/TII.2013.2261082 – ident: ref27 doi: 10.1016/j.cose.2015.02.002 – start-page: 323 year: 2002 ident: ref20 article-title: Secure network coding publication-title: Proc IEEE Int Symp Inf Theory (ISIT) – volume: 71 start-page: 120 year: 1969 ident: ref38 article-title: A table of integrals of the exponential integral publication-title: J Res Nat Bureau Standards – ident: ref8 doi: 10.1109/TII.2014.2327915 – ident: ref1 doi: 10.1109/TIE.2009.2015754 – ident: ref25 doi: 10.1109/TVT.2017.2703305 – ident: ref44 doi: 10.1109/ISIT.2007.4557282 – ident: ref7 doi: 10.1109/TII.2016.2613504 – ident: ref40 doi: 10.1109/TWC.2016.2593445 – ident: ref39 doi: 10.1109/JPROC.2015.2463678 – start-page: 1 year: 2005 ident: ref10 article-title: Network coding for wireless applications: A brief tutorial publication-title: Proc Int Wireless Ad Hoc Networks Workshop – year: 1994 ident: ref47 publication-title: Combinatorics Topics Techniques Algorithms – ident: ref36 doi: 10.1109/TWC.2010.01.081128 – ident: ref13 doi: 10.1049/iet-com.2011.0003 – ident: ref15 doi: 10.1049/iet-com.2009.0634 – ident: ref17 doi: 10.1109/TVT.2015.2453364 – ident: ref21 doi: 10.1109/LCOMM.2015.2470662 – ident: ref49 doi: 10.1109/icc.2011.5963013 – year: 2007 ident: ref37 publication-title: Table of Integrals Series and Products – ident: ref3 doi: 10.1109/JSAC.2005.862417 – start-page: 104 year: 2005 ident: ref43 article-title: Weakly secure network coding publication-title: Proc 1st Workshop Netw Coding Theory Appl (NetCod) – ident: ref2 doi: 10.1109/TWC.2015.2506574 – ident: ref30 doi: 10.1109/CISS.2008.4558591 – ident: ref22 doi: 10.1109/TII.2015.2509442 – ident: ref12 doi: 10.1109/TCOMM.2010.100510.090258 – ident: ref28 doi: 10.1109/TCOMM.2013.111213.130235 – ident: ref16 doi: 10.1109/TWC.2013.110813.121671 – start-page: 1 year: 2015 ident: ref11 article-title: Towards the tactile Internet: Decreasing communication latency with network coding and software defined networking publication-title: Proc 21st Eur Wireless Conf – ident: ref26 doi: 10.1109/LWC.2017.2650224 – ident: ref9 doi: 10.1109/TIT.2006.881746 – ident: ref19 doi: 10.1109/TVT.2015.2478029 – ident: ref45 doi: 10.1109/LCOMM.2010.110310.101480 – ident: ref14 doi: 10.1109/TCOMM.2014.2350985 – ident: ref5 doi: 10.1109/TWC.2008.06090 – ident: ref32 doi: 10.1109/TCOMM.2012.011312.110015 – ident: ref42 doi: 10.1109/ISITA.2008.4895420 – ident: ref4 doi: 10.1109/TII.2014.2374071 – volume: 21 start-page: 1 year: 1985 ident: ref48 article-title: Theory of codes with maximum rank distance publication-title: Problems Inf Transmiss – ident: ref33 doi: 10.1017/CBO9780511841224 – ident: ref46 doi: 10.1109/LCOMM.2017.2704110 – ident: ref24 doi: 10.1109/JPROC.2009.2015716 – ident: ref31 doi: 10.1109/TWC.2011.012411.100787 – year: 2002 ident: ref35 publication-title: Probability random variables and stochastic processes – ident: ref34 doi: 10.1109/LCOMM.2014.030914.140030 – ident: ref18 doi: 10.1109/TWC.2009.090323 – year: 2009 ident: ref23 publication-title: Cooperative Communications and Networking – ident: ref29 doi: 10.1109/ICASSP.2012.6288501 – ident: ref41 doi: 10.1109/JPROC.2010.2094592 |
| SSID | ssj0017655 |
| Score | 2.424836 |
| Snippet | Opportunistic relaying has the potential to achieve full diversity gain, while random linear network coding (RLNC) can reduce latency and energy consumption.... |
| SourceID | crossref ieee |
| SourceType | Enrichment Source Index Database Publisher |
| StartPage | 223 |
| SubjectTerms | intercept probability Jamming outage probability physical-layer security Power system reliability Probability Protocols random linear network coding Relay selection Relays Reliability Security |
| Title | Opportunistic Relaying and Random Linear Network Coding for Secure and Reliable Communication |
| URI | https://ieeexplore.ieee.org/document/8082131 |
| Volume | 17 |
| WOSCitedRecordID | wos000422945400017&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVIEE databaseName: IEEE Electronic Library (IEL) customDbUrl: eissn: 1558-2248 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0017655 issn: 1536-1276 databaseCode: RIE dateStart: 20020101 isFulltext: true titleUrlDefault: https://ieeexplore.ieee.org/ providerName: IEEE |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LSwMxEA61eNCDryrWFzl4Edw22002yVGKxYNUkaq9yJLHFIS6W2rr7zfJrksLInhZQpjAkkmYmcx88yF0yUgCTDMZKc1dgJJMbCQU9TCuiZFWORsXWBRe7vlwKMZj-dhA1zUWBgBC8Rl0_DDk8m1hlv6prCucvYo9aHqD87TEatUZA54GhlN3gT2vDK9TkkR2R699X8PFO26aChmvmaAVTpVgUga7__uZPbRTuY74ptT1PmpAfoC2VxoKttDbw8z70z5F7YSwr3TzMCascouf3Kf4wC74dIcbD8vyb9wvvPHCznXF4ekdSlmYvntMFV7Djxyi58HtqH8XVQQKkXHXeBEJICrVieXSeaWcTHo9AMogNinjFrTS4MI5LblJEptSE8eJlRQI9W3cpNQkOULNvMjhGGFmmBaWGwGW0AkXSjhXUZqUaqIJU2kbdX_2NDNVd3FPcjHNQpRBZOa0kHktZJUW2uiqXjErO2v8IdvyCqjlqr0_-X36FG25xaJ8KDlDzcV8Cedo03wt3j_nF-HYfAOhEL_S |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3dS8MwEA9jCuqDX1Ocn3nwRbBbuiZN8ijDMXFWkal7kdIkNxjMdczNv9-krWUDEXwpJVxKySXcXe5-90PokpEAmGLSSxS3AUowNJ5IqINxDbU0ibVxGYvCa49HkRgM5FMFXZdYGADIis-g4V6zXL5J9cJdlTWFtVe-A02vMUpbJEdrlTkDHmYcp_YIO2YZXiYliWz239quios37DAV0l8xQkusKplR6ez873d20XbhPOKbXNt7qAKTfbS11FKwht4fp86jdklqK4RdrZsDMuFkYvCzfaQf2IafdnvjKC8Ax-3UmS9snVecXb5DLgvjkUNV4RUEyQF66dz2212voFDwtD3Ic08ASUIVGC6tX8rJsNUCoAx8HTJuQCUKbECnJNdBYEKqfT8wkgKhrpGblIoEh6g6SSdwhDDTTAnDtQBD6JCLRFhnUeqQKqIIS8I6av6saayL_uKO5mIcZ3EGkbHVQuy0EBdaqKOrcsY0763xh2zNKaCUK9b--PfhC7TR7T_04t5ddH-CNu2HRH5tcoqq89kCztC6_pqPPmfn2Rb6BsdHwxk |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Opportunistic+Relaying+and+Random+Linear+Network+Coding+for+Secure+and+Reliable+Communication&rft.jtitle=IEEE+transactions+on+wireless+communications&rft.au=Khan%2C+Amjad+Saeed&rft.au=Chatzigeorgiou%2C+Ioannis&rft.date=2018-01-01&rft.issn=1536-1276&rft.eissn=1558-2248&rft.volume=17&rft.issue=1&rft.spage=223&rft.epage=234&rft_id=info:doi/10.1109%2FTWC.2017.2764891&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_TWC_2017_2764891 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1536-1276&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1536-1276&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1536-1276&client=summon |