Analyzing secrecy of delay-constrained system in cooperative relay environment using rateless codes

Sonam Jain, Sarbani Ghose, Ranjan Bose

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

We analyze secrecy of a dual-hop cooperative system consisting of multiple decode-and-forward relays in delay-constrained environment using rateless code, where there exists a separate time limit for both the hops. During the first hop, source carries out rateless coded transmission in the allotted time. Relay nodes which have successfully acquired target entropy forwards the information to the destination in the given time limit, using same rateless code at each node. Simultaneous transmissions by these relay nodes leads to faster accumulation of energy at the destination thereby reducing the decoding time. We have derived a closed-form expression of the average time for the first phase which allows fixed number of relays to decode the information. Analysis for achieving the time limit by these relays in the second phase has also been evaluated. Simulation results show that there exist an optimal number of decoding relays that leads to the lowest expenditure of the total time. Further, a closed-form expression for secrecy outage probability of this delay-constrained dual hop system has been derived.

Original languageEnglish
Title of host publication2017 23rd National Conference on Communications, NCC 2017
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781509053568
DOIs
StatePublished - Oct 19 2017
Externally publishedYes
Event23rd National Conference on Communications, NCC 2017 - Chennai, India
Duration: Mar 2 2017Mar 4 2017

Publication series

Name2017 23rd National Conference on Communications, NCC 2017

Conference

Conference23rd National Conference on Communications, NCC 2017
Country/TerritoryIndia
CityChennai
Period03/2/1703/4/17

Fingerprint

Dive into the research topics of 'Analyzing secrecy of delay-constrained system in cooperative relay environment using rateless codes'. Together they form a unique fingerprint.

Cite this