UM
Residential Collegefalse
Status已發表Published
Secure Relay Selection for UAV-empowered Two Way Untrusted Relaying Networks
Yu, Kan1,2; Feng, Zhiyong3; Yang, Lin4; Chen, Dianxia5; Li, Dong6; Ma, Xiaoshan7
2024
Conference Name2nd International Conference on Mobile Internet, Cloud Computing and Information Security, MICCIS 2024
Source PublicationProceedings - 2024 2nd International Conference on Mobile Internet, Cloud Computing and Information Security, MICCIS 2024
Pages68-74
Conference Date19 April 2024through 21 April 2024
Conference PlaceChangsha City
PublisherInstitute of Electrical and Electronics Engineers Inc.
Abstract

In this paper, we examine the security aspects of two-way untrusted relaying networks (TWURNs) through the lens of physical layer security (PLS). These networks involve the exchange of confidential information between two multiple-antenna base stations (BSs) with the aid of unmanned aerial vehicle (UAV)-enabled untrusted relays equipped with a single antenna. Given the shortcomings observed in existing single untrusted relay selection methods, we introduce an enhanced approach grounded in the min-min criterion (MMC) based on received signal strength. Additionally, we present a novel closed-form expression for the secrecy outage probability (SOP), a fundamental metric within the domain of PLS, derived from the cumulative distribution function (CDF) and probability density function (PDF) of received signal strengths. Through simulations, we substantiate the validity of our analytical findings, demonstrating the superior efficacy of the proposed MMC compared to prevailing schemes.

KeywordClosed-form Of Secrecy Outage Probability Physical Layer Security Two-way Untrusted Relaying Networks
DOI10.1109/MICCIS63508.2024.00020
URLView the original
Indexed ByCPCI-S
Language英語English
WOS Research AreaComputer Science ; Telecommunications
WOS SubjectComputer Science, Information Systems ; Computer Science, Interdisciplinary Applications ; Telecommunications
WOS IDWOS:001304428700014
Scopus ID2-s2.0-85202636748
Fulltext Access
Citation statistics
Document TypeConference paper
CollectionUniversity of Macau
Corresponding AuthorFeng, Zhiyong
Affiliation1.Macau University of Science and Technology, The School of Computer Science and Engineering, Taipa, 999078, Macao
2.Beijing University of Posts and Telecommunications, The Key Laboratory of Universal Wireless Communications Ministry of Education, Beijing, 100876, China
3.Macau University of Science and Technolog, School of Computer Science and Engineering, China
4.AMS, PLA, The Natl. Key Lab. of Sci. and Technol, Information System Security Systems Engineering Institute, Beijing, 100876, China
5.Tianjin ren'Ai College, The Education, Tianjin, 301636, China
6.Macau University of Science and Technology, The School of Computer Science and Engineering, 999078, Macao
7.The Academy of Military Sciences of PLA, Beijing, 100091, China
First Author AffilicationUniversity of Macau
Corresponding Author AffilicationUniversity of Macau
Recommended Citation
GB/T 7714
Yu, Kan,Feng, Zhiyong,Yang, Lin,et al. Secure Relay Selection for UAV-empowered Two Way Untrusted Relaying Networks[C]:Institute of Electrical and Electronics Engineers Inc., 2024, 68-74.
APA Yu, Kan., Feng, Zhiyong., Yang, Lin., Chen, Dianxia., Li, Dong., & Ma, Xiaoshan (2024). Secure Relay Selection for UAV-empowered Two Way Untrusted Relaying Networks. Proceedings - 2024 2nd International Conference on Mobile Internet, Cloud Computing and Information Security, MICCIS 2024, 68-74.
Files in This Item:
There are no files associated with this item.
Related Services
Recommend this item
Bookmark
Usage statistics
Export to Endnote
Google Scholar
Similar articles in Google Scholar
[Yu, Kan]'s Articles
[Feng, Zhiyong]'s Articles
[Yang, Lin]'s Articles
Baidu academic
Similar articles in Baidu academic
[Yu, Kan]'s Articles
[Feng, Zhiyong]'s Articles
[Yang, Lin]'s Articles
Bing Scholar
Similar articles in Bing Scholar
[Yu, Kan]'s Articles
[Feng, Zhiyong]'s Articles
[Yang, Lin]'s Articles
Terms of Use
No data!
Social Bookmark/Share
All comments (0)
No comment.
 

Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.