Design and Analysis of Distributed Beamforming Techniques in Wireless Relay Networks

Megha G. Paserkar, Shrikant D. Zade, Chanderpaul U. Chauhan


Securing data transmission in physical layer can be considered to solve the security problems from the information theoretic purview in wireless relay networks. The presence of one or more eavesdropper in wireless relay networks jeopardizes the secrecy of communication. For such a scenario, secrecy rate of the network provides a good measure regarding the performance of the system. In this paper our focus is on secrecy capacity and its optimization thereby increasing its security by appropriate designs of relays. For this, the transmission channels are taken into consideration through which the eavesdroppers are connected to the relays. Here in this paper, we propose beam forming scheme in order to improve the wireless security against eavesdropping attack by first detecting the eavesdroppers from the wireless relay networks considering the delay in transmission and energy consumption parameter of the nodes within the wireless network and then removing it as a part of network transmission thereby finding measures to maximize the efficiency, response time and the throughput of the system. It includes an auto-regression technique as first approach and then the use of RC6 algorithm for encrypting the confidential messages to provide even more security. The scheme proposed is a two way approach providing not only security to the confidential messages which is to be communicated within a wireless relay network in presence of multiple relays and eavesdroppers, but also it will deal with the saving the consumed power by detecting and removing the nodes which are malicious or defected which in turn will consume more power in order to perform malicious activity on the messages or may try to create interferences in the network. The eavesdropper nodes in the proposed system are considered to be working as relays so it may either be connected to source or destination directly or in between the working as one of the relays itself.

Full Text:



  • There are currently no refbacks.