Welcome to Journal of Beijing Institute of Technology
Volume 22Issue 1
.
Turn off MathJax
Article Contents
FU Xiao-mei, ZHAO Yan-ling. Selfish behavior detection of cooperative relay[J]. JOURNAL OF BEIJING INSTITUTE OF TECHNOLOGY, 2013, 22(1): 55-59.
Citation: FU Xiao-mei, ZHAO Yan-ling. Selfish behavior detection of cooperative relay[J].JOURNAL OF BEIJING INSTITUTE OF TECHNOLOGY, 2013, 22(1): 55-59.

Selfish behavior detection of cooperative relay

  • Received Date:2012-03-22
  • A selfish behavior detection technique is investigated to assist secure cooperative transmission at the physical layer. The detection technique calculates the correlation ratio between signals received from the diversity branches to determine the relay's behavior in amplify and forward cooperation strategy. The correlation ratio is considerably reduced because the relay's selfish behavior makes the correlation between the received signals in the diversity branch degraded. Simulation results show that the proposed mechanism can effectively detect selfish nodes and performance will be improved significantly with the destination's detection technique.
  • loading
  • [1]
    Tun Huo, Yi Beng, Li Jianhua. Security issues and solutions in wireless communications at physical layer[J]. China Communications, 2011, 8(5): 11-19.
    [2]
    Balakrishnan K, Deng Jing, Varshney P K. TWOACK: preventing selfishness in mobile Ad Hoc networks[C]//Wireless Connunications and Networking Conference. McLean,VA,USA: IEEE, 2005:2137-2142.
    [3]
    Refaei M T, DaSilva L A, Eltoweissy M, et al. Adaptation of reputation management systems to dynamic network conditions in ad hoc networks[J]. Computers, IEEE Transactions on, 2010, 59(5):707-719.
    [4]
    Janzadeh H, Fayazbakhsh K, Dehghan M, et al. A secure credit-based cooperation stimulating mechanism for MANETs using hash Chains[J]. In Elservier FGCS, 2009, 25(8):926-934.
    [5]
    Dehnie S, Memon N. Detection of misbehavior in cooperative diversity[C]//Proceedings of IEEE Military Communications Conference. San Diego, Calif, USA: IEEE, 2008:1-5.
    [6]
    Zhu Han, Sun Y L. Securing cooperative transmission in wireless communications[C]//Proceedings of the Fourth Annual International Conference on Mobile and Ubiquitous Systems. Philadelphia, PA: IEEE, 2007:1-6.
    [7]
    Xiang He, Yener A. Cooperation with an untrusted relay: a secrecy perspective [J]. IEEE Trans Inf Theory, 2010, 56(8):3807-3827.
    [8]
    Dehnie S, Memon N. Cooperative diversity with selfish users[C]//42 ndAnnual Conference on Information Sciences and Systems. Princeton, NJ: IEEE, 2008:1184-1188.
    [9]
    Dehnie S, Sencar H T, Memon N. Cooperative amplify and forward in the presence of a selfish partner[EB/OL].[2011-11-01]. http://isis.poly.edu/~seccoopcomm/pubs/globecom2007.
  • 加载中

Catalog

    通讯作者:陈斌, bchen63@163.com
    • 1.

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (797) PDF downloads(635) Cited by()
    Proportional views
    Related

    /

      Return
      Return
        Baidu
        map