Overloadedwireless mimo switching for information exchanging through untrusted relay in secure wireless communication

Arata TAKAHASHI, Osamu TAKYU, Hiroshi FUJIWARA, Takeo FUJII, Tomoaki OHTSUKI

Research output: Contribution to journalArticlepeer-review

Abstract

Information exchange through a relay node is attracting attention for applying machine-to-machine communications. If the node demodulates the received signal in relay processing confidentially, the information leakage through the relay station is a problem. In wireless MIMO switching, the frequency spectrum usage efficiency can be improved owing to the completion of information exchange within a short time. This study proposes a novel wireless MIMO switching method for secure information exchange. An overloaded situation, in which the access nodes are one larger than the number of antennas in the relay node, makes the demodulation of the relay node difficult. The access schedule of nodes is required for maintaining the overload situation and the high information exchange efficiency. This study derives the equation model of the access schedule and constructs an access schedule with fewer time periods in the integer programming problem. From the computer simulation, we confirm that the secure capacity of the proposed MIMO switching is larger than that of the original one, and the constructed access schedule is as large as the ideal and minimum time period for information exchange completion.

Original languageEnglish
Pages (from-to)1249-1259
Number of pages11
JournalIEICE Transactions on Communications
VolumeE104B
Issue number10
DOIs
Publication statusPublished - 2021

Keywords

  • Mathematical optimization
  • Physical layer security
  • Wireless MIMO switching

ASJC Scopus subject areas

  • Software
  • Computer Networks and Communications
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Overloadedwireless mimo switching for information exchanging through untrusted relay in secure wireless communication'. Together they form a unique fingerprint.

Cite this