Opportunistic Secure Transmission for Wireless Relay Networks with Modify-and-Forward Protocol

Quoc-Tuan Vien, Tuan Anh Le, Trung Q. Duong

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)


This paper investigates the security at the physical layer in cooperative wireless networks (CWNs) where the data transmission between nodes can be realised via either direct transmission (DT) or relaying transmission (RT) schemes. Inspired by the concept of physical-layer network coding (PNC), a secure PNC-based modify-and-forward (SPMF) is developed to cope with the imperfect shared knowledge of the message modification between relay and destination in the conventional modify-and-forward (MF). In this paper, we first derive the secrecy outage probability (SOP) of the SPMF scheme, which is shown to be a general expression for deriving the SOP of any MF schemes. By comparing the SOPs of various schemes, the usage of the relay is shown to be not always necessary and even causes a poorer performance depending on target secrecy rate and quality of channel links. To this extent, we then propose an opportunistic secure transmission protocol to minimise the SOP of the CWNs. In particular, an optimisation problem is developed in which secrecy rate thresholds (SRTs) are determined to find an optimal scheme among various DT and RT schemes for achieving the lowest SOP. Furthermore, the conditions for the existence of SRTs are derived with respect to various channel conditions to determine if the relay could be relied on in practice.
Original languageEnglish
Title of host publicationIEEE International Conference on Communications (ICC 2017): Proceedings
Place of PublicationParis, France
Number of pages6
Publication statusPublished - 31 Jul 2017

Publication series

NameIEEE International Conference on Communications (ICC): Proceedings
ISSN (Electronic)1938-1883


Dive into the research topics of 'Opportunistic Secure Transmission for Wireless Relay Networks with Modify-and-Forward Protocol'. Together they form a unique fingerprint.

Cite this