TY - JOUR
T1 - Physical-Layer Security of a Buffer-Aided Full-Duplex Relaying System
AU - El Shafie, Ahmed
AU - Salem, Ahmed Sultan
AU - Al-Dhahir, Naofal
N1 - KAUST Repository Item: Exported on 2020-10-01
Acknowledgements: This paper was made possible by NPRP grant number 6-149-2-058 from
the Qatar National Research Fund (a member of Qatar Foundation). The
statements made herein are solely the responsibility of the authors.
PY - 2016/7/7
Y1 - 2016/7/7
N2 - This letter proposes a novel hybrid half-/full-duplex relaying scheme to enhance the relay channel security. A source node (Alice) communicates with her destination node (Bob) in the presence of a buffer-aided full-duplex relay node (Rooney) and a potential eavesdropper (Eve). Rooney adopts two different relaying, namely randomize-and-forward and decode-andforward relaying strategies, to improve the security of the legitimate system. In the first relaying strategy, Rooney uses a codebook different from that used at Alice. In the second relaying strategy, Rooney and Alice use the same codebooks. In addition, Rooney switches between half-duplex and full-duplex modes to further enhance the security of the legitimate system. The numerical results demonstrate that our proposed scheme achieves a significant average secrecy end-to-end throughput improvement relative to the conventional bufferless full-duplex relaying scheme.
AB - This letter proposes a novel hybrid half-/full-duplex relaying scheme to enhance the relay channel security. A source node (Alice) communicates with her destination node (Bob) in the presence of a buffer-aided full-duplex relay node (Rooney) and a potential eavesdropper (Eve). Rooney adopts two different relaying, namely randomize-and-forward and decode-andforward relaying strategies, to improve the security of the legitimate system. In the first relaying strategy, Rooney uses a codebook different from that used at Alice. In the second relaying strategy, Rooney and Alice use the same codebooks. In addition, Rooney switches between half-duplex and full-duplex modes to further enhance the security of the legitimate system. The numerical results demonstrate that our proposed scheme achieves a significant average secrecy end-to-end throughput improvement relative to the conventional bufferless full-duplex relaying scheme.
UR - http://hdl.handle.net/10754/617282
UR - http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=7506333
UR - http://www.scopus.com/inward/record.url?scp=84987942247&partnerID=8YFLogxK
U2 - 10.1109/LCOMM.2016.2588492
DO - 10.1109/LCOMM.2016.2588492
M3 - Article
SN - 1089-7798
VL - 20
SP - 1856
EP - 1859
JO - IEEE Communications Letters
JF - IEEE Communications Letters
IS - 9
ER -