On the Performance of the DNPS-Based Relay Networks under Masquerading Attack

In the relay networks, two typical issues of physical layer security are selfishness and garbling. As a matter of fact, a certain nontypical but severely harmful misbehavior can also remove the cooperative diversity gain. Here, we coin the masquerading attack to indicate this kind of misbehavior. A...

Full description

Bibliographic Details
Main Author: Wenson Chang
Format: Article
Language:English
Published: Hindawi-Wiley 2018-01-01
Series:Wireless Communications and Mobile Computing
Online Access:http://dx.doi.org/10.1155/2018/4602146
id doaj-0c341d4fec274544a7de0739602750b4
record_format Article
spelling doaj-0c341d4fec274544a7de0739602750b42020-11-25T02:27:42ZengHindawi-WileyWireless Communications and Mobile Computing1530-86691530-86772018-01-01201810.1155/2018/46021464602146On the Performance of the DNPS-Based Relay Networks under Masquerading AttackWenson Chang0Department of Electrical Engineering, National Cheng Kung University, Tainan 701, TaiwanIn the relay networks, two typical issues of physical layer security are selfishness and garbling. As a matter of fact, a certain nontypical but severely harmful misbehavior can also remove the cooperative diversity gain. Here, we coin the masquerading attack to indicate this kind of misbehavior. A masquerade relay can always pretend to be the best one to forward signals and, in consequence, deprive the others of the opportunities to cooperate. To the best of our knowledge, the impact of the masquerading attack has not yet been fully investigated. In this paper, multiple masquerade relays with random masquerading behavior are taken into account. Also, the complete channel effects, including the effects of the flat Rayleigh fading, log-normal shadowing, and path loss, are considered such that the geographical effects of the network topology can be completely captured. At last, the impact of the masquerade relays are evaluated in terms of the outage probability and end-to-end capacity.http://dx.doi.org/10.1155/2018/4602146
collection DOAJ
language English
format Article
sources DOAJ
author Wenson Chang
spellingShingle Wenson Chang
On the Performance of the DNPS-Based Relay Networks under Masquerading Attack
Wireless Communications and Mobile Computing
author_facet Wenson Chang
author_sort Wenson Chang
title On the Performance of the DNPS-Based Relay Networks under Masquerading Attack
title_short On the Performance of the DNPS-Based Relay Networks under Masquerading Attack
title_full On the Performance of the DNPS-Based Relay Networks under Masquerading Attack
title_fullStr On the Performance of the DNPS-Based Relay Networks under Masquerading Attack
title_full_unstemmed On the Performance of the DNPS-Based Relay Networks under Masquerading Attack
title_sort on the performance of the dnps-based relay networks under masquerading attack
publisher Hindawi-Wiley
series Wireless Communications and Mobile Computing
issn 1530-8669
1530-8677
publishDate 2018-01-01
description In the relay networks, two typical issues of physical layer security are selfishness and garbling. As a matter of fact, a certain nontypical but severely harmful misbehavior can also remove the cooperative diversity gain. Here, we coin the masquerading attack to indicate this kind of misbehavior. A masquerade relay can always pretend to be the best one to forward signals and, in consequence, deprive the others of the opportunities to cooperate. To the best of our knowledge, the impact of the masquerading attack has not yet been fully investigated. In this paper, multiple masquerade relays with random masquerading behavior are taken into account. Also, the complete channel effects, including the effects of the flat Rayleigh fading, log-normal shadowing, and path loss, are considered such that the geographical effects of the network topology can be completely captured. At last, the impact of the masquerade relays are evaluated in terms of the outage probability and end-to-end capacity.
url http://dx.doi.org/10.1155/2018/4602146
work_keys_str_mv AT wensonchang ontheperformanceofthednpsbasedrelaynetworksundermasqueradingattack
_version_ 1724841269404893184