Distributed sourcerelay selection scheme for vehicular relaying networks under eavesdropping attacks
 Li Sun^{1, 2},
 Pinyi Ren^{1}Email author and
 Qinghe Du^{1}
https://doi.org/10.1186/168714992014109
© Sun et al.; licensee Springer. 2014
Received: 31 December 2013
Accepted: 16 June 2014
Published: 4 July 2014
Abstract
The recent development of vehicular networking technologies brings the promise of improved driving safety and traffic efficiency. Cooperative communication is recognized as a lowcomplexity solution for enhancing both the reliability and the throughput of vehicular networks. However, due to the openness of wireless medium, the vehicular wireless communications (VWC) is also vulnerable to potential eavesdropping attacks. To tackle with this issue, we in this paper propose a novel usercooperation scheme with antieavesdropping capabilities. Specifically, prior to any frame transmission, a sourcerelay pair is jointly selected to maximize the achievable secrecy rate. After that, the selected relay assists the source to deliver its data to the destination. The proposed selection scheme can be realized in a fully distributed manner, and the security is guaranteed without using any encryption techniques at the upper layers. The closedform expressions for the secrecy outage probability and the intercept probability are derived, and the achievable diversity order is also analyzed. Simulation results show that the proposed scheme outperforms the competing counterparts in terms of both the secrecy outage probability and the average secrecy rate.
Keywords
1 Introduction
During the past few years, vehicular networks have received increasing attentions due to their potentials in enhancing road safety, improving traffic efficiency, and providing mobile infotainment services[1]. In vehicular networks, the information exchange among the vehicles can be typically performed in two modes, namely, vehicletovehicle (V2V) and vehicletoinfrastructure (V2I). The V2V communications do not rely on the existence of the central unit, and the vehicles can communicate with each other directly via either singlehop or multihop connections. Comparably, in V2I communications, data is transferred between the vehicle and the fixed infrastructure deployed along the roadside, which is often called the roadside unit (RSU) in the literature. The coexistence of these two modes makes the vehicular networks a hybrid network that supports both the infrastructurebased and ad hoc communications.
The interests in vehicular networking dates back to late 1980s. Since then, the idea of leveraging wireless technologies for vehicular communications has fascinated researchers around the globe, and great efforts have been made to develop new architectures, protocols, algorithms, and applications for vehicular networks. Many governmental projects or plans have been set up to explore the potentials of vehicular wireless communications (VWC), including the VSC and VII in United States, the eSafety in Europe, and the ASV series in Japan[2]. From the industrial perspective, several standards have been created, among which the most important ones are the IEEE 802.11p and IEEE 1609 protocol suites. IEEE 802.11p specifies the physical layer (PHY) and medium access control (MAC) layer features such that the existing IEEE 802.11 can work in vehicular environments, and IEEE 1609 mainly deals with the multichannel operation, routing, and security issues. The academic research in the field of VWC is also fruitful, ranging from the modeling of vehicular channels[3] to the development of MAC and routing algorithms[4–7]. Besides that, some field trials have also been carried out in many countries for objective performance evaluation[8].
So far, simple and basic solutions at almost all layers have been devised for vehicular communications. However, the unique features of vehicular networks make the design of efficient VWC protocols challenging. First, the vehicular networks are expected to support the mixture of both the realtime and nonrealtime services. As a result, it is difficult to satisfy the diverse qualityofservice (QoS) requirements by simply adopting the existing techniques. Second, the fast movement of the vehicles makes the network topology and the vehicle density highly dynamic, and hence, the connectivity among the vehicles is hard to be guaranteed. Third, due to the existence of various obstacles along the roads, the propagation conditions for VWC is harsher than those for general mobile ad hoc networks. All these factors indicate the necessity for developing innovative wireless techniques to support the emerging applications in vehicular networks.
Among many candidates of VWC technologies, cooperative communication is widely regarded as a promising solution to enhance the performance of vehicular networks from various layers. The key idea of cooperative communication is to let the neighboring terminals relay information for each other. In this way, the spatial diversity gain as well as the spatial multiplexing gain can be harvested without the deployment of multiple antennas. The research in cooperative communications is pioneered by Sendonaris et al.[9]. In[10], several basic cooperative relaying protocols were proposed, and their outage performances were analyzed. Since these two seminal papers, a large body of literature has been devoted to the design, analysis, and implementation of cooperative schemes for various scenarios. In[11], the authors proposed a constellation reassignment scheme at the relay to minimize the symbol error rate at the destination node. In[12], a link adaptive regeneration strategy was developed for decodeandforward (DF) systems. These works, however, are concerned about the simple scenario where there is only one source and one relay. For multiplerelay systems, advanced relaying mechanisms such as distributed spacetime coding[13], relay selection[14], network coding[15], and collaborative beamforming[16] were investigated to further benefit the cooperative systems. Based on the work in[14], the joint sourcerelay selection schemes were proposed in[17, 18] for multisource multirelay networks to exploit both the cooperative diversity and the multiuser diversity.
In vehicular networks, there are often a large number of vehicles that can serve as relays to facilitate both the V2V and V2I communications. Therefore, the application of cooperative relaying in vehicular communications is a natural choice. In[19], a dualhop intervehicular transmission with relay selection was considered, and the outage performance as well as the achievable diversity order was analyzed. By incorporating a highway mobility model, the authors in[20] proposed a scheme for locating and selecting the optimal relay station for multihop vehicular networks. While[19] and[20] mainly focused on the PHYlayer issues,[5] dealt with the relayaided MAC protocol design for vehicular communications. Specifically, by adaptively choosing the relay node and the cooperative mode, the proposed protocol can optimize the system throughput and extend the service range. In[21], the crosslayer routing was studied using cooperative relaying technique. Through investigations, the authors pointed out that cooperative transmission can yield more efficient routes than the competing counterparts in terms of both the reliability and the energy consumption. To fully characterize the performance of vehicular relay networks,[22] developed an analytical model and analyzed the access probability and the connectivity probability.
Although there are plenty of schemes proposed so far to take full advantages of cooperative communications to improve the link reliability, increase the achievable throughput, extend the service coverage, and lower the energy consumption, very few works address the security issue for relayaided vehicular networks, which is also of vital importance due to the openness of wireless channels. Consider a vehicular network consisting of multiple source nodes, multiple relay nodes, and one destination node. The relays can help the sources to deliver their messages to the destination. However, these messages can also be overheard by some eavesdropper nearby the destination. Therefore, the developed relaying protocols should provide the antieavesdropping capabilities. Traditional approaches to securing communications rely heavily on the data encryption at the upper layers of the protocol stack. However, since data security is critically important, it is reasonable to incorporate the security measures at all layers, including the physical layer. Since the seminal work of[23] and[24], more and more attentions have been paid to PHY security from an informationtheoretic point of view[25–27].
Recently, the secrecy problem in cooperative communications networks has emerged as a hot research topic. In[28], three cooperative schemes, namely, DF, amplifyandforward (AF), and cooperative jamming (CJ), are utilized to secure the sourcedestination communications. By allocating transmit power at the source and relays and determining the relay weights, the achievable secrecy rate is maximized subject to the total power budget. PHY security can also be realized via the appropriate selection of relay nodes. Following the idea of jamming, the authors in[29] proposed to select two relays to simultaneously serve the legitimate user and confuse the eavesdropper. For the same system model,[30] also adopts the relay selection and cooperative jamming to secure communications, but the jamming signal is sent from the destination rather than the selected relay. In our previous work[31], the securityembedded relay selection scheme is devised, where the selected relay transmits the superposition of the informationbearing signal and the artificial noise. We have shown through rigorous analysis that full diversity is achieved despite the existence of the eavesdropper. Although the injection of artificial noise is useful in improving the system security level, it also causes additional energy consumption. Aiming at this problem,[32] presents the AF and DFbased optimal relay selection to maximize the secrecy rate, without using artificial noise. Common to the works[28–32] is that they all assume that there is only one eavesdropper within the considered area. In comparison,[33] studied the relay selection issue for dualhop networks with multiple eavesdroppers.
Although the aforementioned works[28–33] have exhibited the potentials of physicallayer techniques in securing the wireless cooperative networks, all of them assumed that there is only one node having message to transmit. This assumption simplifies the protocol design and the performance analysis, but may not be realistic for vehicular networks. Different from these works, we in this paper consider a more practical scenario where there are multiple sources sharing the same pool of multiple relays. For this scenario, a sourcerelay selection strategy with antieavesdropping capabilities is proposed. The selected sourcerelay pair is the one that offers the maximum secrecy rate. A significant advantage of the proposed scheme is that it can be implemented in a distributed manner, which is attractive for vehicular networks.
The rest of this paper is organized as follows. Section 2 presents the system model and introduced the basic assumptions. In Section 3, we give a detailed description of the proposed sourcerelay selection scheme. In Section 4, we evaluate the system performance in terms of the secrecy outage probability, the intercept probability, and the achievable diversity order. Simulation results are shown in Section 5, from which the superiority of our scheme can be observed. Finally, we conclude our work in Section 6.
2 System model
Each node is equipped with a single antenna and operates in a halfduplex mode. All channels are assumed to be independent and modeled as flat block fading, which remain constant within one frame (a twophase duration) and vary independently from frame to frame. The channel coefficient between node i and node j is represented by h_{ ij }, which is a complex circularly symmetric Gaussian variable with mean zero and variance μ_{ ij }. That is, h_{ ij } ∼ CN(0,μ_{ ij }). The average transmit powers at the selected source and the selected relay are denoted by P_{S} and P_{R} respectively, and we assume P_{S} = P_{R} = P for simplicity. The additive noise at each receiver is modeled as a complex Gaussian variable with mean zero and variance N_{0}. The notation ρ = P/N_{0} is used to represent the average signaltonoiseratio (SNR) of the system.
3 Distributed sourcerelay selection under eavesdropping attacks
3.1 Selection criterion
where${\gamma}_{{s}_{k}{r}_{m}}=P{h}_{{s}_{k}{r}_{m}}{}^{2}/{N}_{0}$ and${\gamma}_{{r}_{m}d}=P{h}_{{r}_{m}d}{}^{2}/{N}_{0}$ are the instantaneous received SNR at the m th relay from the k th source and at the destination from the m th relay, respectively.
where R_{S} represents the target secrecy rate, and$v={2}^{2{R}_{\mathrm{S}}}$. Since R_{S} is positive, v should be larger than 1.
If the global CSI is available at some node, e.g., the RSU, the criterion in (3) can be implemented in a centralized manner. However, it is nontrivial to obtain the CSI of all the involved links, especially for the networks with a large number of nodes. This motivates us to develop the distributed algorithm with low complexity, the details of which will be given in the next subsection.
3.2 Lowcomplexity distributed scheme
With the above observation in mind, we can divide the overall selection procedure into three steps. First, every relay node independently evaluates its eligibility for cooperation. After that, each eligible relay selects an appropriate source to maximize its contribution to the achievable secrecy rate. In this way, all the candidate sourcerelay pairs are generated. Finally, a single pair with the maximum${\gamma}_{e2e}^{(k,m)}$ is screened out from the candidate pairs to access the channel. The details of these steps are given in the following:

Step 1: Generating the Set of Eligible Relays. For any relay node R_{ m }, it can be deduced from (3) that if${\gamma}_{{r}_{m}d}<{\gamma}_{{r}_{m}e}$, then${\gamma}_{e2e}^{(k,m)}$ will be less than 1, irrespective of the source index k. In other words, the system will be in outage if this relay node is selected to access the channel, no matter which source is chosen to form the pair.
where (a) stems from the fact that$\frac{b+1}{a+1}<\frac{b}{a}$ for a < b. If${\gamma}_{{r}_{m}e}<{\gamma}_{{r}_{m}d}<v{\gamma}_{{r}_{m}e}$, we have$v{\gamma}_{{r}_{m}e}\left(1+{\gamma}_{{r}_{m}d}\right){\gamma}_{{r}_{m}d}\left(1+{\gamma}_{{r}_{m}e}\right)>0$ and${\gamma}_{{s}_{{k}^{\ast}}{r}_{m}}\left({\gamma}_{{r}_{m}d}v{\gamma}_{{r}_{m}e}\right)<0$. Therefore, the probability provided by (6) equals to 1, implying that the outage event definitely occurs if we choose such a relay to cooperate.
In other words, if the channel gains regarding R_{ m } does not meet (7), R_{ m } cannot be selected. In steps 2 and 3, we will only focus on the eligible relays satisfying (7).
It should be emphasized that the eligibility determination process requires the knowledge of${\gamma}_{{r}_{m}d}$ and${\gamma}_{{r}_{m}e}$ at R_{ m }. However, this can be guaranteed because we have assumed that both the RSU and the eavesdropper are active entities which will transmit control information or messages, and the corresponding channel gains can be estimated at the relays using the pilots from the received signals.

Step 2: Source Selection at Eligible Relays. After step 1 has been finished, all the relays satisfying (7) broadcast flag signals to declare its eligibility for cooperation. Upon receiving the flag signals, all the sources will send an ACK to respond. With the received ACKs, any eligible relay R_{ m } can estimate${\gamma}_{{s}_{k}{r}_{m}}$ for all k s. After that, R_{ m } supposes itself to be the selected relay and chooses the ‘best’ source which can contribute most to${\gamma}_{e2e}^{(k,m)}$. To elaborate on how to find such a source node, a lemma will be introduced first.
where γ_{1}and γ_{2}are two constants with γ_{1}being larger than γ_{2}, is an increasing function of γ.
which is obviously larger than 0 for γ_{1} > γ_{2}. Therefore, f(γ) is an increasing function of γ. □
It is no doubted that step 2 also enjoys a distributed implementation since the source selection is performed at the eligible relays, and there is no information exchange among different relay nodes.

Step 3: Distributed SourceRelay Pair Selection. Upon the completion of step 1 and step 2, we can formulate the expression for the maximum achievable secrecy rate by utilizing the m th relay as${C}_{\mathrm{S}}^{m}=\frac{1}{2}{log}_{2}\left\{\frac{1+\frac{{\gamma}_{{s}_{{k}^{\ast}(m)}{r}_{m}}{\gamma}_{{r}_{m}d}}{1+{\gamma}_{{s}_{{k}^{\ast}(m)}{r}_{m}}+{\gamma}_{{r}_{m}d}}}{1+\frac{{\gamma}_{{s}_{{k}^{\ast}(m)}{r}_{m}}{\gamma}_{{r}_{m}e}}{1+{\gamma}_{{s}_{{k}^{\ast}(m)}{r}_{m}}+{\gamma}_{{r}_{m}e}}}\right\}$(11)
To select the optimal sourcerelay pair, we adopt the method based on the distributed timer[14]. Specifically, after calculating${C}_{\mathrm{S}}^{m}$, each eligible relay R_{ m } will start its timer with the initial value inversely proportional to${C}_{\mathrm{S}}^{m}$. Therefore, the relay with the largest${C}_{\mathrm{S}}^{m}$, namely${R}_{{m}^{\ast}}$, has its timer expired first.${R}_{{m}^{\ast}}$ then broadcasts the flag signal and the rest of the relays will back off after receiving the flag signal. Noticing the fact that the ‘best’ source for${R}_{{m}^{\ast}}$ has already been determined to be${S}_{{k}^{\ast}(m\ast )}$ in step 2, we now have the selected sourcerelay pair.
Remark 1. The proposed sourcerelay selection scheme has two advantages. First, it can be realized in a distributed way, yielding a low implementation complexity. This is of practical significance for vehicular networks. Second, the distributed method, despite of its simplicity, is an optimal solution in the sense that it can select the ‘best’ sourcerelay pair to minimize the system secrecy outage probability.
4 Performance analysis
4.1 Secrecy outage probability
where${\gamma}_{{s}_{{k}^{\ast}(m)}{r}_{m}}=\underset{1\le k\le K}{\text{max}}\left\{{\gamma}_{{s}_{k}{r}_{m}}\right\}$.
Substituting (17) and (19) into (16), the closedform expression for$\text{Pr}\left({\gamma}_{e2e}^{m}<v\right)$ is obtained, and the SOP of the system can also be derived by substituting this result into (12). However, we omit these expressions here due to space limitation. In the next section, we will show through simulations that the derived theoretical result is tight enough for medium to high SNR values.
4.2 Intercept probability
4.3 Diversity order
where κ_{ de } = μ_{ sd }/μ_{ se } is known as the maintoeavesdropper ratio (MER), defined as the ratio of the average channel gain of the sourcedestination link to that of the sourcetoeavesdropper link.
where we have introduced α_{ m } to represent$\frac{{\alpha}_{{r}_{m}d}}{{\alpha}_{{r}_{m}e}}$.
5 Simulation results and discussions
In this section, we present the simulation results to validate the proposed sourcerelay selection scheme. In the following simulations, all the nodes (including the sources, the relays, the destination, and the eavesdropper) are distributed in a 2D plane. The direct links of S_{ k } → D and S_{ k } → E are assumed to be absent for all k’s, and the the channel gains are modeled according to the system model in Section 2. To be specific, h_{ ij } ∼ CN(0,μ_{ ij }), where${\mu}_{\mathit{\text{ij}}}={d}_{\mathit{\text{ij}}}^{\theta}$ with d_{ ij } being the distance between any node pair (i,j) and θ being the path loss exponent. In our simulations, θ is fixed as 3. Unless otherwise stated, the target secrecy rate R_{S} is set to be 0.1 bit/s/Hz, and the notation ‘SNR’ is used to represent the ratio of P versus N_{0}, i.e., ρ in the previous sections.
In Figure3a, we compare the ergodic secrecy capacity of the proposed scheme (C_{1}) and that of the conventional scheme (C_{2}). To illustrate the capacity loss incurred by the secrecy constraint, we calculate the ergodic capacity for the system without eavesdroppers (C_{0}) and present the differences C_{0}C_{1} and C_{0}C_{2} in Figure3b^{a}. One can observe from Figure3a that the proposed scheme outperforms the conventional scheme in terms of the secrecy capacity. However, the secrecy capacities of both the two schemes almost saturate as the SNR tends to infinity. This is because that as SNR gets larger, the achievable rate of the legitimate link as well as the eavesdropper link increases. Comparably, without the existence of the eavesdroppers, the system capacity increases linearly with SNR, which is due to the multiuser diversity gain[17]. This explains the phenomenon in Figure3b, which clearly reflects the capacity penalty to support the secrecy constraints.
Figure5 presents the curve of the system secrecy outage probability and exhibits how it varies with the target secrecy rate R_{S}. In this figure, five representative SNR values are considered. As expected, when the target rate increases, the SOP increases as well.
In Figure6, the effect of the power allocation ratio on the achievable SOP is investigated. Specifically, given the total transmit power P_{tot}, we allocate α P_{tot} to the selected source, and (1  α)P_{tot} to the selected relay. As α changes from 0 to 1, the SOP as a function of α is shown in Figure6. Here, we plot a set of SOP curves, each corresponding to a specific SNR value. It should be pointed out that in Figure6, the notation ‘SNR’ represents the ratio of the total transmit power for two phases versus N_{0}, which is different from the previous figures. An important observation from Figure6 is that in order to optimize the system performance, α should be neither too large nor too small. The reasons can be briefly given as follows. If α is too large, the relaydestination link will be in poor channel quality, which significantly limits the achievable rate at the destination. On the other hand, if α is too small, implying that more power is allocated to the relay node, the eavesdropper will benefit from the improved quality of the relaying channel, which also decreases the secrecy rate. From Figure6, we can also find that the system performance is satisfactory for α = 0.5. Therefore, the equal power allocation scheme, which is assumed in our work, is nearoptimal despite its simplicity.Figure7 shows the relationship between the eavesdropper’s location and the intercept probability. From this figure, we can observe that the intercept probability increases significantly when the eavesdropper moves towards the relay nodes. This is obvious because the closer the eavesdropper to the relays, the better the channel quality of the relayeavesdropper link. Figure8 presents the secrecy outage probability versus the eavesdropper’s location. As expected, the impact of the eavesdropper’s location on the SOP is similar to that on the intercept probability.
6 Conclusions
In this paper, a joint sourcerelay selection scheme is proposed for vehicular networks under eavesdropping attacks. The proposed scheme maximizes the instantaneous secrecy rate of the system and, hence, can minimize the achievable secrecy outage probability. We present the selection criterion and also give a lowcomplexity method to realize this criterion in a distributed manner. The system performance is analyzed in terms of the secrecy outage probability, the intercept probability, and the achievable diversity order. Finally, the effectiveness of the proposed scheme and the correctness of the theoretical analysis are verified through extensive simulations.
There are several interesting issues worthy of further investigations. For example, in this work, we assume that the channel gains regarding the eavesdropper’s link is available, which may not be realistic for some scenarios where the eavesdroppers are passive entities. Besides that, it will be of practical significance to generalize the proposed work to the systems with multiple eavesdroppers and (or) multiple destinations.
Endnote
^{a}For the multisource multirelay network without eavesdroppers, the best sourcerelay pair is selected according to the method in[17].
Declarations
Acknowledgements
This work was supported in part by the National Natural Science Foundation of China (No. 61201207), the National Science and Technology Major Project of China (No. 2013ZX03003004003), the Open Research Fund of National Mobile Communications Research Laboratory, Southeast University (No. 2012D04), and the Fundamental Research Funds for the Central Universities of China.
Authors’ Affiliations
References
 Hartenstein H, Laberteaux KP: A tutorial survey on vehicular ad hoc networks. IEEE Commun. Mag 2008, 46(6):164171.View ArticleGoogle Scholar
 Karagiannis G, Altintas O, Ekici E, Heijenk G, Jarupan B, Lin K, Weil T: Vehicular networking: a survey and tutorial on requirements, architectures, challenges, standards and solutions. IEEE Commun. Surv. Tutor 2011, 13(4):584616.View ArticleGoogle Scholar
 Mecklenbrauker CF, Molisch AF, Karedal J, Tufvesson F, Paier A, Bemado L, Zemen T, Klemp O, Czink N: Vehicular channel characterization and its implications for wireless system design and performance. Proc. IEEE 2011, 99(7):11891212.View ArticleGoogle Scholar
 Harigovindan VP, Babu AV, Jacob L: Ensuring fair access in IEEE 802.11pbased vehicletoinfrastructure networks. EURASIP J. Wireless Commnun. Netw 2012, 2012: 17. doi:10.1186/1687–14992012168 10.1186/16871499201217View ArticleGoogle Scholar
 Zhou T, Sharif H, Hempel M, Mahasukhon P, Wang W, Ma T: A novel adaptive distributed cooperative relaying MAC protocol for vehicular networks. IEEE J. Select. Areas Commun 2011, 29(1):7282.View ArticleGoogle Scholar
 Nzouonta J, Rajgure N, Wang G, Borcea C: VANET routing on city roads using realtime vehicular traffic information. IEEE Trans. Veh. Technol 2009, 58(6):36093626.View ArticleGoogle Scholar
 Eiza MH, Ni Q: An evolving graphbased reliable routing scheme for VANETs. IEEE Trans. Veh. Technol 2013, 62(4):14931504.View ArticleGoogle Scholar
 Lin JC, Lin CS, Liang CN, Chen BC: Wireless communication performance based on IEEE 802.11p R2V field trails. IEEE Commun. Mag 2012, 50(5):184191.View ArticleGoogle Scholar
 Sendonaris A, Erkip E, Aazhang B: User cooperation diversity  part I: system description. IEEE Trans. Commun 2003, 51(11):19271938. 10.1109/TCOMM.2003.818096View ArticleGoogle Scholar
 Laneman JN, Tse DNC, Wornell GW: Cooperative diversity in wireless networks: efficient protocols and outage behavior. IEEE Trans. Inf. Theory 2004, 50(12):30623080. 10.1109/TIT.2004.838089MathSciNetView ArticleGoogle Scholar
 Seddik KG, Ibrahim AS, Liu KJR: Transmodulation in wireless relay networks. IEEE Commun. Lett 2008, 12(3):170172.View ArticleGoogle Scholar
 Wang T, Giannakis GB, Wang R: Smart regenerative relays for linkadaptive cooperative communications. IEEE Trans. Commun 2008, 56(11):19501960.View ArticleGoogle Scholar
 Zhang W, Letaief KB: Fullrate distributed spacetime codes for cooperative communications. IEEE Trans. Wireless Commun 2008, 7(7):24462451.View ArticleGoogle Scholar
 Bletsas A, Khisti A, Reed DP, Lippman A: A simple cooperative diversity method based on network path selection. IEEE J. Select. Areas Commun 2006, 24(3):659672.View ArticleGoogle Scholar
 Ding Z, Leung KK, Goeckel DL, Towsley D: On the study of network coding with diversity. IEEE Trans. Wireless Commun 2009, 8(3):12471259.View ArticleGoogle Scholar
 Zeng M, Zhang R, Cui S: On the design of distributed beamforming for twoway relay networks. IEEE Trans. Signal Process 2011, 59(5):22842295.MathSciNetView ArticleGoogle Scholar
 Sun L, Zhang T, Lu L, Niu H: On the combination of cooperative diversity and multiuser diversity in multisource multirelay wireless networks. IEEE Signal Process Lett 2010, 17(6):535538.View ArticleGoogle Scholar
 Ding H, Ge J, da Costa DB, Jiang Z: A new efficient lowcomplexity scheme for multisource multirelay cooperative networks. IEEE Trans. Veh. Technol 2011, 60(2):716722.View ArticleGoogle Scholar
 Seyfi M, Muhaidat S, Liang J, Uysal M: Relay selection in dualhop vehicular networks. IEEE Signal Process Lett 2011, 18(2):134137.View ArticleGoogle Scholar
 Ge Y, Wen S, Ang YH, Liang YC: Optimal relay selection in IEEE 802.16j multihop relay vehicular networks. IEEE Trans. Veh. Technol 2010, 59(5):21982206.View ArticleGoogle Scholar
 Ding Z, Leung KK: Crosslayer routing using cooperative transmission in vehicular adhoc networks. IEEE J. Select. Areas Commun 2011, 29(3):571581.View ArticleGoogle Scholar
 Ng SC, Zhang W, Zhang Y, Yang Y, Mao G: Analysis of access and connectivity probabilities in vehicular relay networks. IEEE J. Select. Areas Commun 2011, 29(1):140150.View ArticleGoogle Scholar
 Wyner AD: The wiretap channel. Bell Syst. Tech. J 1975, 54(8):13551387. 10.1002/j.15387305.1975.tb02040.xMathSciNetView ArticleGoogle Scholar
 Csiszár I, Körner J: Broadcast channels with confidential messages. IEEE Trans. Inf. Theory 1978, 24(3):339348. 10.1109/TIT.1978.1055892View ArticleGoogle Scholar
 Bloch M, Barros J, Rodrigues MRD, McLaughlin SW: Wireless informationtheoretic security. IEEE Trans. Inf. Theory 2008, 54(6):25152534.MathSciNetView ArticleGoogle Scholar
 Tekin E, Yener A: The general Gaussian multipleaccess and twoway wiretap channels: achievable rates and cooperative jamming. IEEE Trans. Inf. Theory 2008, 54(6):27352751.MathSciNetView ArticleGoogle Scholar
 Krikidis I, Thompson JS, McLaughlin S, Grant PM: A feedbackbased transmission for wireless networks with energy and secrecy constraints. EURASIP J. Wireless Commun. Netw 2011, 2011: 11. doi:10.1155/2011/313269 10.1186/16871499201111View ArticleGoogle Scholar
 Dong L, Han Z, Petropulu AP, Poor HV: Improving wireless physical layer security via cooperating relays. IEEE Trans. Signal Process 2010, 58(3):18751888.MathSciNetView ArticleGoogle Scholar
 Krikidis I, Thompson JS, McLaughlin S: Relay selection for secure cooperative networks with jamming. IEEE Trans. Wireless Commun 2009, 8(10):50035011.View ArticleGoogle Scholar
 Liu Y, Li J, Petropulu AP: Destination assisted cooperative jamming for wireless physicallayer security. IEEE Trans. Inf. Forensic Secur 2013, 8(4):682694.View ArticleGoogle Scholar
 Sun L, Du Q, Ren P: Secrecyenhanced data dissemination using cooperative relaying in vehicular networks. Int. J. Distrib. Sens. Netw 2013, 2013: 505831.Google Scholar
 Zou Y, Wang X, Shen W: Optimal relay selection for physicallayer security in cooperative wireless networks. IEEE J. Select. Areas Commun 2013, 31(10):20992111.View ArticleGoogle Scholar
 Bao V, LTrung N, Debbah M: Relay selection schemes for dualhop networks under security constraints with multiple eavesdroppers. IEEE Trans. Wireless Commun 2013, 12(12):60766085.View ArticleGoogle Scholar
 Ikki S, Ahmed MH: Performance analysis of cooperative diversity wireless networks over Nakagamim fading channel. IEEE Commun. Lett 2007, 11(4):334336.View ArticleGoogle Scholar
 Xu F, Lau FCM, Zhou QF, Yue DW: Outage performance of cooperative communication systems using opportunistic relaying and selection combining receiver. IEEE Signal Process Lett 2009, 16(4):237240.View ArticleGoogle Scholar
Copyright
This article is published under license to BioMed Central Ltd. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly credited.