Contact at or 8097636691
Responsive Ads Here

Tuesday, 13 February 2018

Joint Relay and Jammer Selection for Secure Two-Way Relay Networks(2012)

Joint Relay and Jammer Selection for Secure 

Two-Way Relay Networks(2012)

In this paper, we investigate joint relay and jammer selection in two-way cooperative networks, consisting of two sources, one eavesdropper, and a number of intermediate nodes, with secrecy constraints. Specifically, the proposed schemes select two or three intermediate nodes to enhance security against the malicious eavesdropper. The first selected node operates in the conventional relay mode and assists the two sources to exchange data with each other in the amplify-and-forward protocol. The second and third selected nodes are used in different communication phases as jammers in order to create intentional interference upon the eavesdropper. We find that in a scenario where the relay and jamming nodes are randomly and sparsely distributed, the proposed schemes with cooperative jamming outperform the conventional non-jamming schemes within a certain transmitted power range. We also find that, in a scenario where the intermediate nodes gather as a close cluster, the cooperative jamming schemes may be less effective than their non-jamming counterparts. Therefore, we introduce a hybrid scheme to switch between jamming and non-jamming modes. Simulation results validate our theoretical analysis that the hybrid switching scheme further improves the secrecy rate.
Existing System
In Existing System, we use one way co-operative network transmission. The nodes to be operate in the conventional relay mode and a number of intermediate nodes to be transmitted the signal, sometimes eavesdropper could be crash the transmission to hack the file.
1.      Low Network Capacity.
2.      Malicious Eaves Dropper
Proposed System
In proposed system, we use two-way cooperative network transmission. A number of intermediate nodes with secrecy constraints transfer the files with enhance security against the malicious eavesdropper and to exchange the data with the amplify-and-forward protocol.
In cellular network, and peer-to-peer network efficiency performance of the whole system. In a relay selection scheme was proposed for two-way networks with multiple relays, which maximized the worse receive signal-to-noise ratio (SNR) of the two sources.
Modules Description
1.      Two Ways Co-Operative network
2.      Conventional selection without jamming
3.      Optimal Switching
4.      Optimal Switching with jamming
5.      Simulation Results
Two ways Co-Operative Network
In this module, we can implement information exchange against eavesdroppers in two-way cooperative networks, consisting of two sources, one eavesdropper, and a number of intermediate nodes, with secrecy constraints.
Specifically, an intermediate node is selected to operate in the conventional amplify-and-forward (AF) relay mode and assists the sources to deliver data to the corresponding destinations.
Meanwhile, another two intermediate nodes that perform as jamming nodes are selected and transmit artificial interference in order to degrade the eavesdropper links in the first and second phase of data transmission, respectively
Conventional selection without jamming
In this module, in a conventional cooperative network, the relay scheme does not have a jamming process. The conventional selection does not take the eavesdropper channels into account and the relay node is selected according to the instantaneous    signal – to- noise ratio (SNR) of the links between Source 1 to Source 2.
Optimal Switching
In this module, the original idea of using jamming nodes is to introduce interference on the eavesdropper links. However, it simultaneously degrades the links between the relay and the destinations. In some specific situation is close to one destination, continuous jamming may decreases secrecy seriously, and acts as a bottleneck for the system. In order to overcome this problem, we introduce the idea of intelligent switching between
Optimal Switching with jamming
In this module, the optimal selection with jamming assumes knowledge set and ensures a maximization of the sum of instantaneous to defined as the overall signal -to- interference-and-noise-ratio (SINR) of the channel The overall secrecy performance of the system is characterized by the ergodic secrecy rate that is the expectation of the sum of the two sources’ secrecy rate for different types of channel feedback.
Simulation Results
The intermediate nodes spread randomly within the square space. It is clear that selection with jamming outperform their non-jamming counterparts within a certain transmitted power range. Outside this range the secrecy rate of OSJ converges to a power-independent value. Whereas the ergodic secrecy rate of OS continues to grow with a slope. This validates the analysis the suboptimal scheme SSJ performs almost the same as the optimal scheme OSJ. Furthermore, it can be seen from that OW provides better performance than any other selection techniques with or without continuous jamming. Within this configuration, we also compare the performance of different selection techniques measured by secrecy outage probability.
System Requirements:
Hardware Requirements:
System                                    :           Pentium IV 2.4 GHz.
Hard Disk                   :           40 GB.
Floppy Drive               :           1.44 Mb.
Monitor                       :           15 VGA Color
Mouse                         :           Logitech.
Ram                             :           512 Mb.
Software Requirements:
Operating system        :           Windows 7 Ultimate.
Coding Language       :           C#.Net

No comments:

Post a Comment