Skip to main content

Trusted Cooperative Transmissions: Turning a Security Weakness into a Security Enhancement

  • Chapter
  • First Online:
  • 1668 Accesses

Abstract

Since the invention of wireless telegraphy, the effort to improve wireless channel capacity has never stopped. In the last decade, significant advancement has been made and this advancement has featured two milestones. The first milestone is Multiple-Input-Multiple-Output (MIMO) techniques, which create spatial diversity by taking advantage of multiple antennas and improvesthe wireless channel capacity by an amount on the order of the number of antennas on a wireless device. The second milestone is cooperative transmission. Instead of relying on the installation of multiple antennas on one wireless device, cooperative transmission achieves spatial diversity through physical layer cooperation. In cooperative transmission, when the source node transmits a message to the destination node, the nearby nodes that overhear this transmission will “help” the source and destination by relaying the replicas of the message, and the destination will combine the multiple received waveforms so as to improve the link quality. In other words, cooperative transmission techniques utilize nearby nodes as virtual antennas, and mimic the effects of MIMO in achieving spatial diversity.

Portions of this work were supported by NSF grants CNS-0910461 and CNS-0831315.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. A. Sendonaris, E. Erkip, and B. Aazhang, “User cooperation diversity, Part I: system description,” IEEE Transactions on Communications, vol. 51, no. 11, pp. 1927–1938, November 2003.

    Google Scholar 

  2. A. Sendonaris, E. Erkip, and B. Aazhang, User cooperation diversity, Part II: implementation aspects and performance analysis,”IEEE Transactions on Communications, Vol. 51, No. 11, pp. 1939–1948, November 2003.

    Article  Google Scholar 

  3. J. N. Laneman, D. N. C. Tse, and G. W. Wornell, “Cooperative diversity in wireless networks: efficient protocols and outage behavior,” IEEE Transactions on Information Theory, vol. 50, no. 12, pp. 3062–3080, December 2004.

    Article  MathSciNet  Google Scholar 

  4. J. N. Laneman and G. W. Wornell, “Distributed space-time coded protocols for exploiting cooperative diversity in wireless networks,” IEEE Transactions on Information Theory, vol. 49, pp. 2415–2525, October 2003.

    Article  MathSciNet  Google Scholar 

  5. T. M. Cover and A. El Gamal, “Capacity theorems for the relay channel”, IEEE Information Theory, vol. 25, issue 5, pp. 572–584, September 1979.

    Article  MATH  Google Scholar 

  6. http : //ieee802.org/16/relay/

    Google Scholar 

  7. W. Su, A. K. Sadek, and K. J. R. Liu, “SER performance analysis and optimum power allocation for decode-and-forward cooperation protocol in wireless networks,” in Proceedings of IEEE Wireless Communications and Networking Conference (WCNC), New Orleans, LA, March 13–17, 2005.

    Google Scholar 

  8. A. Host-Madsen, “Upper and lower bounds for channel capacity of asynchronous cooperative diversity networks,” IEEE Transactions on Information Theory, vol. 50, no. 4, pp. 3062–3080, Dec. 2004.

    Google Scholar 

  9. A. Host-Madsen, “A new achievable rate for cooperative diversity based on generalized writing on dirty paper,” in Proceedings of IEEE International Symposium Information Theory, pp. 317, Yokohama, Japan, June 2003.

    Google Scholar 

  10. T. E. Hunter and A. Nosratinia, “Performance analysis of coded cooperation diversity”, in Proceedings of 2003 International Conference on Communications (ICC03), vol. 4, pp. 2688–2692, Seattle, WA, May 2003.

    Google Scholar 

  11. T. E. Hunter, S. Sanayei, and A. Nosratinia, “Outage analysis of coded cooperation,” IEEE Transactions on Information Theory, vol. 52, no. 2, pp. 375–391, Feburary 2006.

    Article  MathSciNet  Google Scholar 

  12. M. A. Khojastepour, A. Sabharwal, and B. Aazhang, “On the capacity of ‘cheap’ relay networks,” in Proceedings of 37th Annual Conference on Information Sciences and Systems, Baltimore, MD, March 2003.

    Google Scholar 

  13. J. Luo, R. S. Blum, L. J. Greenstein, L. J. Cimini, and A. M. Haimovich, “New approaches for cooperative use of multiple antennas in ad hoc wireless networks,” in Proceedings of IEEE Vehicular Technology Conference, vol. 4, pp. 2769–2773, Los Angeles, CA, September 2004.

    Google Scholar 

  14. Y. Zhao, R. S. Adve, and T. J. Lim, “Improving amplify-and-forward relay networks: optimal power allocation versus selection”, in Proceedings of IEEE International Symposium on Information Theory, Seattle, WA, July 2006.

    Google Scholar 

  15. Z. Han, X. Zhang, and H. V. Poor, “Cooperative transmission protocols with high spectral efficiency and high diversity order using multiuser detection and network coding”, in Proceedings of IEEE International Conference on Communications, Glasgow, Scotland, June 2007.

    Google Scholar 

  16. Z. Han, T. Himsoon, W. Siriwongpairat, and K. J. Ray Liu, “Energy efficient cooperative transmission over multiuser OFDM networks: who helps whom and how to cooperate”, in Proceedings of IEEE Wireless Communications and Networking Conference, vol. 2, pp. 1030–1035, New Orleans, LA, March 2005.

    Google Scholar 

  17. Z. Yang, J. Liu, and A. Host-Madsen, “Cooperative routing and power allocation in ad-hoc networks,” in Proceedings of IEEE Global Telecommunications Conference, Dallas, TX, November 2005.

    Google Scholar 

  18. A. E. Khandani, E. Modiano, L. Zheng, and J. Abounadi, “Cooperative routing in wireless networks,” Advannces in Pervasive Computing and Networking, Kluwer Academic Publishers, Eds. B. K. Szymanski and B. Yener, 2004.

    Google Scholar 

  19. A. S. Ibrahim, Z. Han, and K. J. R. Liu, “Distributed power-efficient cooperative routing in wireless ad hoc networks”, in Proceedings of IEEE Globe Telecommunication Conference (Globecom), Washington DC, November 2007.

    Google Scholar 

  20. Z. Han and H. V. Poor, “Lifetime improvement in wireless sensor networks via collaborative beamforming and cooperative transmission”, IEE Microwaves, Antennas and Propagation, Special Issue on Antenna Systems and Propagation for Future Wireless Communications, vol. 1, issue 6, pp. 1103–1110, 2007.

    Google Scholar 

  21. J. Boyer, D. D. Falconer, and H. Yanikomeroglu, “Multihop diversity in wireless relaying channels”, IEEE Transactions on Communications, vol. 52, no. 10, pp. 1820–1830, October 2004.

    Article  Google Scholar 

  22. J. Boyer, D. D. Falconer, and H. Yanikomeroglu, “Cooperative connectivity models for wireless relay networks”, IEEE Transactions on Wireless Communications, vol. 6, no. 6, pp. 1992–2000, June 2007.

    Article  Google Scholar 

  23. F. Li, K. Wu, and A. Lippman, “Energy-efficient cooperative routing in multi-hop wireless ad hoc networks,” in Proceedings of IEEE International Performance, Computing, and Communications Conference, pp. 215–222, Phoenix, AZ, April 2006.

    Google Scholar 

  24. A. K. Sadek, W. Su, and K. J. R. Liu, “A class of cooperative communication protocols for multi-node wireless networks,” in Proceedings of IEEE International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Newyork, June 2005.

    Google Scholar 

  25. A. Bletsas, A. Lippman, and D. P. Reed, “A simple distributed method for relay selection in cooperative diversity wireless networks, based on reciprocity and channel measurements”, in Proceedings of IEEE Vehicular Technology Conference, vol. 3, pp. 1484–1488, Stockholm, Sweden, May 2005.

    Google Scholar 

  26. B. Wang, Z. Han, and K. J. Ray Liu, “Distributed relay selection and power control for multiuser cooperative communication networks using buyer/seller game”, in Proceedings of Annual IEEE Conference on Computer Communications, INFOCOM’07, Anchorage, AK, May 2007.

    Google Scholar 

  27. Z. Han and H. V. Poor, “Coalition game with cooperative transmission: a cure for the curse of boundary nodes in selfish packet-forwarding wireless networks”, in Proceedings of 5th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, (WiOpt07), Limassol, Cyprus, April 2007.

    Google Scholar 

  28. Z. Han and K. J. R. Liu, Resource Allocation for Wireless Networks: Basics, Techniques, and Applications, Cambridge University Press, UK, April, 2008.

    Google Scholar 

  29. D. Gunduz and E. Erkip, “Joint source-channel cooperation: Diversity versus spectral efficiency,” in Proceedings of 2004 IEEE International Symposium Information Theory, Chicago, IL, June–July 2004 p. 392.

    Google Scholar 

  30. I. Maric and R. D. Yates, “Cooperative multihop broadcast for wireless networks,” IEEE Journal on Selected Areas in Communications, vol. 22, no. 6, pp. 1080–1088, August 2004.

    Article  Google Scholar 

  31. Z. Han and Y. Lindsay Sun, “Self-learning cooperative transmission — coping with unreliability due to mobility, channel estimation errors, and untrustworthy nodes”, in Proceedings of IEEE Globe Telecommunication Conference (Globecom), Washington DC, November 2007.

    Google Scholar 

  32. Z. Han and Y. Sun “ Securing cooperative transmission in wireless communications, channel,” in Proceedings of 1st ACM Workshop on Security for Emerging Ubiquitous Wireless Networks, Philadelphia, PA, August 2007.

    Google Scholar 

  33. A. Jsang, R. Ismail, and C. Boyd, “A survey of trust and reputation systems for online service provision,” Decision Support Systems, vol. 43, no. 2, pp. 618–644, March 2007.

    Article  Google Scholar 

  34. M. Langheinrich, “When trust does not compute - the role of trust in ubiquitous computing,” in Proceedings of the Fifth International Conference on Ubiquitous Computing (UBICOMP’03), Seattle, Washington, October 2003.

    Google Scholar 

  35. Y. Sun, W. Yu, Z. Han, and K. J. Ray Liu, “Information theoretic framework of trust modeling and evaluation for ad hoc networks,” IEEE Journal on Selected Areas in Communications, Special Issue on Security in Wireless Ad Hoc Networks, vol. 24, no. 2, pp. 305–317, April 2006.

    MATH  Google Scholar 

  36. A. Jsang and R. Ismail, “The beta reputation system,” in Proceedings of the 15th Bled Electronic Commerce Conference, Bled, Slovenia, June 2002.

    Google Scholar 

  37. G. Theodorakopoulos and J. S. Baras, “Trust evaluation in ad-hoc networks,” in Proceedings of the ACM Workshop on Wireless Security (WiSE’04), Philadelphia, PA, October 2004.

    Google Scholar 

  38. S. Boyd and L. Vandenberghe, Convex optimization, Cambridge University Press, 2006. (http://www.stanford.edu/ ˜ boyd/cvxbook.html)

    Google Scholar 

  39. A. K. Sadek, W. Su, and K. J. Ray Liu, “A class of cooperative communication protocols for multi-node wireless networks,” in Proceedings of IEEE International Workshop on Signal Processing Advances in Wireless Communications, SPAWC’05, New York, NY, June 2005.

    Google Scholar 

  40. Y.Wang and J. Vassileva, “A review on trust and reputation for web service selection,” in Proceedings of the first Int. Workshop on Trust and Reputation Magnement in Massively Distributed Computing Systems (TRAM’07), June 2007.

    Google Scholar 

  41. A. Jsang, R. Ismail, and C. Boyd, “A survey of trust and reputation systems for online service provision,” in Decision Support Systems, 2005.

    Google Scholar 

  42. W. Xu, K. Ma, W. Trappe, and Y. Zhang “Jamming sensor networks: attack and defense strategies,” IEEE Networks, vol. 20, no. 3, pp. 41–47, May–June 2006.

    Article  Google Scholar 

  43. W. Xu, T. Wood, W. Trappe, and Y. Zhang “Channel surfing and spatial retreats: defenses against wireless denial of service,” in Proceedings of 2004 ACM Workshop on Wireless Security, pp. 80–89, Philadelphia, PA, October 2004.

    Google Scholar 

  44. J. G. Proakis, Digital Communications, 3rd edition, McGraw-Hill, New York 1995.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yan Lindsay Sun .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

Sun, Y., Han, Z. (2009). Trusted Cooperative Transmissions: Turning a Security Weakness into a Security Enhancement. In: Liu, R., Trappe, W. (eds) Securing Wireless Communications at the Physical Layer. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-1385-2_15

Download citation

  • DOI: https://doi.org/10.1007/978-1-4419-1385-2_15

  • Published:

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-1-4419-1384-5

  • Online ISBN: 978-1-4419-1385-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics