A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
Secrecy Outage Performance for DF Buffer-Aided Relaying Networks with a Multi-Antenna Destination
2019
IEEE Access
In this paper, we investigate the secrecy outage performance of decode-and-forward (DF) buffer-aided relaying networks with a multi-antenna destination in the presence of an eavesdropper. ...
INDEX TERMS Buffer-aided relay, multi-antenna, full-duplex, secrecy outage probability, secrecy diversity gain, secrecy coding gain. ...
curial parameters on the secrecy outage performance of DF buffer-aided relaying networks with a multi-antenna destination. ...
doi:10.1109/access.2019.2907781
fatcat:yhzg4lt7uzfvtlisrsbbgfrqsi
Enhancing Physical Layer Security of DF Buffer-Aided Relay Networks with Small Buffer Sizes
2019
IEEE Access
In this paper, we propose a novel max-weight secure link selection (MWSLS) scheme to enhance physical layer security of decode-and-forward (DF) buffer-aided relay networks. ...
The results of this paper reveal that: 1) For the case with small buffer sizes, a significant enhancement on the secrecy outage performance can be observed compared with the popular max-link secure link ...
SECRECY OUTAGE ANALYSIS In this section, we analyze the secrecy outage performance of the DF buffer-aided relay networks under the MWSLS scheme. ...
doi:10.1109/access.2019.2939272
fatcat:7sr5wretdfc7tg7vcj7d7wgzny
Specific buffer-aided full duplex relaying over LTE advanced networks
2017
International Journal of Mobile Network Design and Innovation
The performance of three models, i.e., FDR without buffer-aided (conventional FDR), FDR with general buffer and FDR with specific buffer is investigated and compared in terms of outage probability and ...
The adoption of buffering over relay network outperforms and achieves better outage probability than the conventional relaying. ...
System model Consider a simple cooperative network consisting of eNB (source S), one UE (destination D) and a cluster C with K decode and-forward (DF) relays R k ∈ C(1 ≤ k ≤ K) with buffer. ...
doi:10.1504/ijmndi.2017.082800
fatcat:4xhlamsr6fgwhjae7ed7quaja4
Opportunistic relay and jammer cooperation techniques for physical-layer security in buffer-aided relay networks
2015
2015 International Symposium on Wireless Communication Systems (ISWCS)
In this paper, we investigate opportunistic relay and jammer cooperation schemes in multiple-input multiple-output (MIMO) buffer-aided relay networks. ...
We propose an algorithm to select a set of relay nodes to enhance the legitimate users' transmission and another set of relay nodes to perform jamming of the eavesdroppers. ...
The major contributions in our paper are: • Novel multi-user relay systems with relay and jammer function selection to achieve high secrecy rates. • Novel multi-user buffer-aided relay systems with signals ...
doi:10.1109/iswcs.2015.7454437
dblp:conf/iswcs/LuL15
fatcat:qa6adnlgyjhhfnlxe6iknji5ge
On the secrecy outage analysis of underlay cognitive radio systems with buffer‐aided relaying under Nakagami‐ m channels
2021
IET Communications
In this work, the physical layer security performance of an underlay cognitive buffer-aided relay network over the general Nakagami-m fading channel model is addressed, where a primary source communicates ...
The closed-form expression for the secrecy outage probability (SOP), which is a widely adopted performance metric in the considered scenario, is also derived. ...
The secrecy performance of a buffer-aided CRN is analyzed in [20] by considering a multi-antenna relay configuration and Rayleigh fading channel. ...
doi:10.1049/cmu2.12270
fatcat:jxycpmpnujeovietdupiqeiily
Study of Opportunistic Cooperation Techniques using Jamming and Relays for Physical-Layer Security in Buffer-aided Relay Networks
[article]
2015
arXiv
pre-print
In this paper, we investigate opportunistic relay and jammer cooperation schemes in multiple-input multiple-output (MIMO) buffer-aided relay networks. ...
We propose an algorithm to select a set of relay nodes to enhance the legitimate users' transmission and another set of relay nodes to perform jamming of the eavesdroppers. ...
The major contributions in our paper are: • Novel multi-user relay systems with relay and jammer function selection to achieve high secrecy rates. • Novel multi-user buffer-aided relay systems with signals ...
arXiv:1512.07310v1
fatcat:xqlja3ujobblhli6h4ixd47pw4
On Security-Delay Trade-Off in Two-Hop Wireless Networks With Buffer-Aided Relay Selection
2018
IEEE Transactions on Wireless Communications
This thesis therefore focuses on the PHY security performance study for two-hop wireless networks with buffer-aided relay selection (a typical PHY security technique), where relay buffers will be adopted ...
Physical Layer Security Performance Study for Two-Hop Wireless Networks with Buffer-Aided Relay Selection by Xuening Liao As wireless communication technologies continue to evolve rapidly, an unprecedented ...
security performance study of buffer-aided relay selection scheme for two-hop wireless networks with DF relays. ...
doi:10.1109/twc.2017.2786258
fatcat:2gvfikdq2resbgz34kjx47p4ke
Performance of Cooperative Relay NOMA with Large Antenna Transmitters
2022
Electronics
Again, the performance of CR-NOMA systems using the GBSM channel model with large antenna transmitters and network coding schemes has attracted little attention in academia. ...
In this paper, we study the performance of a two-stage mMIMO CR-NOMA network where the transmitter is represented as a uniform rectangular array (URA) or cylindrical array (CA). ...
, University of Electronic Science and Technology of China for their contribution. ...
doi:10.3390/electronics11213482
fatcat:72sqlqh4qzf2pkp5ls2obqwocm
Link Selection for Secure Cooperative Networks with Buffer-Aided Relaying
[article]
2018
arXiv
pre-print
This paper investigates the secure communication in a two-hop cooperative wireless network, where a buffer-aided relay is utilized to forward data from the source to destination, and a passive eavesdropper ...
Closed-form expressions are derived for the end-to-end secrecy outage probability (SOP), secrecy outage capacity (SOC), and exact secrecy throughput (EST), respectively. ...
with buffer-aided relaying. ...
arXiv:1802.06538v1
fatcat:lbbrpy22zjevfddt5zyiukv5ae
Relaying in the Internet of Things (IoT): A Survey
2021
IEEE Access
Simulation and
HD
buffer state
MAC
analysis
[81]
Minimize secrecy and link
BSI and CSI
PHY
AF
Simulation
HD
outage probabilities
[76]
Outage probability
Relay buffer state
PHY and
DF ...
Considering relays with more than one antenna, the work linked each buffer space to a specific antenna and showed through simulation that the proposed approach achieved gains in reduced outage probability ...
doi:10.1109/access.2021.3112940
fatcat:beo5j6hyd5hwhlxj4mp5vok4sq
Secret-Key-Aided Scheme for Securing Untrusted DF Relaying Networks
2018
IEEE Transactions on Vehicular Technology
A legitimate source node, Alice, sends her data to a legitimate destination node, Bob, with the aid of an untrusted DF relay node, Charlie. ...
This paper proposes a new scheme to secure the transmissions in an untrusted decode-and-forward (DF) relaying network. ...
In [12] , joint destination-based jamming and precoding at both the source and the relay was studied for a multi-antenna untrusted AF relay system. ...
doi:10.1109/tvt.2018.2799900
fatcat:zc5kw5tuevabdis7wlwmi2l3ym
Joint Power Allocation and Link Selection for Multi-Carrier Buffer Aided Relay Network
2019
Electronics
(BS), one destination node i.e., (MU) and a buffer aided decode and forward (DF) relay node. ...
In this paper, we present a joint power allocation and adaptive link selection protocol for an orthogonal frequency division multiplexing (OFDM)-based network consists of one source node i.e., base station ...
For the underlay cognitive radio network with buffer aided DF relay, an adaptive link selection scheme was presented in [11] . ...
doi:10.3390/electronics8060686
fatcat:rxlwbveyxjbk5kal6qjfn2cvje
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
2014
IEEE Communications Surveys and Tutorials
, and relay networks. ...
Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry. ...
[157] considered utilizing a buffer-aided relay to enhance both transmission efficiency and security for two-hop relay networks. ...
doi:10.1109/surv.2014.012314.00178
fatcat:cmqxgwotmvbmldwqdvjkzsweam
Adaptive limited feedback for MISO wiretap channels with cooperative jamming
2013
2013 IEEE 14th Workshop on Signal Processing Advances in Wireless Communications (SPAWC)
, and relay networks. ...
Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry. ...
[157] considered utilizing a buffer-aided relay to enhance both transmission efficiency and security for two-hop relay networks. ...
doi:10.1109/spawc.2013.6612057
dblp:conf/spawc/PeiMW13
fatcat:gjn4o2l4qjae5ipsr6zfjo35yu
Physical Layer Security for UAV Communications in 5G and Beyond Networks
[article]
2021
arXiv
pre-print
Then, we introduce the widely used secrecy performance metrics and start by reviewing the secrecy performance analysis and enhancing techniques for statically deployed UAV systems, and extend the discussion ...
In this paper, a comprehensive survey on the current achievements of the UAV-aided wireless communications is conducted from the PLS perspective. ...
evaluate the average secrecy performance for a random network. ...
arXiv:2105.11332v1
fatcat:d6oidecjcbaxrdz3kezdjxpypa
« Previous
Showing results 1 — 15 out of 66 results