{"title":"Secrecy Analysis of Relay Assisted Device-to-Device Systems under Channel Uncertainty","authors":"Furqan Jameel, F. Khan, M. Haider, Asim Ul Haq","doi":"10.1109/FIT.2017.00068","DOIUrl":null,"url":null,"abstract":"This work investigates the impact of channel estimation errors from the perspective of physical layer security in relay assisted Device-to-Device (D2D) communication. Specifically, we derive a generalized closed-form expression of outage probability of the secrecy capacity of N hop relay based D2D communication system. A single eavesdropper is assumed to be present at each hop to intercept the confidential message. Best relay is selected among the cluster of M relays to form a secure link from source to destination. We then quantify the changes in secrecy performance of D2D systems for both certain and uncertain channel information. Analytical and simulation results are provided to validate the derived results.","PeriodicalId":107273,"journal":{"name":"2017 International Conference on Frontiers of Information Technology (FIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Conference on Frontiers of Information Technology (FIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/FIT.2017.00068","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7
Abstract
This work investigates the impact of channel estimation errors from the perspective of physical layer security in relay assisted Device-to-Device (D2D) communication. Specifically, we derive a generalized closed-form expression of outage probability of the secrecy capacity of N hop relay based D2D communication system. A single eavesdropper is assumed to be present at each hop to intercept the confidential message. Best relay is selected among the cluster of M relays to form a secure link from source to destination. We then quantify the changes in secrecy performance of D2D systems for both certain and uncertain channel information. Analytical and simulation results are provided to validate the derived results.