Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








66 Hits in 4.9 sec

Secrecy Outage Performance for DF Buffer-Aided Relaying Networks with a Multi-Antenna Destination

Chen Wei, Wendong Yang, Yueming Cai, Xuanxuan Tang, Guoqin Kang
2019 IEEE Access  
In this paper, we investigate the secrecy outage performance of decode-and-forward (DF) buffer-aided relaying networks with a multi-antenna destination in the presence of an eavesdropper.  ...  INDEX TERMS Buffer-aided relay, multi-antenna, full-duplex, secrecy outage probability, secrecy diversity gain, secrecy coding gain.  ...  curial parameters on the secrecy outage performance of DF buffer-aided relaying networks with a multi-antenna destination.  ... 
doi:10.1109/access.2019.2907781 fatcat:yhzg4lt7uzfvtlisrsbbgfrqsi

Enhancing Physical Layer Security of DF Buffer-Aided Relay Networks with Small Buffer Sizes

Chen Wei, Zhifu Yin, Wendong Yang, Yueming Cai
2019 IEEE Access  
In this paper, we propose a novel max-weight secure link selection (MWSLS) scheme to enhance physical layer security of decode-and-forward (DF) buffer-aided relay networks.  ...  The results of this paper reveal that: 1) For the case with small buffer sizes, a significant enhancement on the secrecy outage performance can be observed compared with the popular max-link secure link  ...  SECRECY OUTAGE ANALYSIS In this section, we analyze the secrecy outage performance of the DF buffer-aided relay networks under the MWSLS scheme.  ... 
doi:10.1109/access.2019.2939272 fatcat:7sr5wretdfc7tg7vcj7d7wgzny

Specific buffer-aided full duplex relaying over LTE advanced networks

Ramachandran Vijayarani, Lakshmanan Nithyanandan
2017 International Journal of Mobile Network Design and Innovation  
The performance of three models, i.e., FDR without buffer-aided (conventional FDR), FDR with general buffer and FDR with specific buffer is investigated and compared in terms of outage probability and  ...  The adoption of buffering over relay network outperforms and achieves better outage probability than the conventional relaying.  ...  System model Consider a simple cooperative network consisting of eNB (source S), one UE (destination D) and a cluster C with K decode and-forward (DF) relays R k ∈ C(1 ≤ k ≤ K) with buffer.  ... 
doi:10.1504/ijmndi.2017.082800 fatcat:4xhlamsr6fgwhjae7ed7quaja4

Opportunistic relay and jammer cooperation techniques for physical-layer security in buffer-aided relay networks

Xiaotao Lu, Rodrigo C. de Lamare
2015 2015 International Symposium on Wireless Communication Systems (ISWCS)  
In this paper, we investigate opportunistic relay and jammer cooperation schemes in multiple-input multiple-output (MIMO) buffer-aided relay networks.  ...  We propose an algorithm to select a set of relay nodes to enhance the legitimate users' transmission and another set of relay nodes to perform jamming of the eavesdroppers.  ...  The major contributions in our paper are: • Novel multi-user relay systems with relay and jammer function selection to achieve high secrecy rates. • Novel multi-user buffer-aided relay systems with signals  ... 
doi:10.1109/iswcs.2015.7454437 dblp:conf/iswcs/LuL15 fatcat:qa6adnlgyjhhfnlxe6iknji5ge

On the secrecy outage analysis of underlay cognitive radio systems with buffer‐aided relaying under Nakagami‐ m channels

Mohammad Javad Saber, Mohsen Naseri, Seyed Mohammad Sajad Sadough
2021 IET Communications  
In this work, the physical layer security performance of an underlay cognitive buffer-aided relay network over the general Nakagami-m fading channel model is addressed, where a primary source communicates  ...  The closed-form expression for the secrecy outage probability (SOP), which is a widely adopted performance metric in the considered scenario, is also derived.  ...  The secrecy performance of a buffer-aided CRN is analyzed in [20] by considering a multi-antenna relay configuration and Rayleigh fading channel.  ... 
doi:10.1049/cmu2.12270 fatcat:jxycpmpnujeovietdupiqeiily

Study of Opportunistic Cooperation Techniques using Jamming and Relays for Physical-Layer Security in Buffer-aided Relay Networks [article]

X. Lu, R. C. de Lamare
2015 arXiv   pre-print
In this paper, we investigate opportunistic relay and jammer cooperation schemes in multiple-input multiple-output (MIMO) buffer-aided relay networks.  ...  We propose an algorithm to select a set of relay nodes to enhance the legitimate users' transmission and another set of relay nodes to perform jamming of the eavesdroppers.  ...  The major contributions in our paper are: • Novel multi-user relay systems with relay and jammer function selection to achieve high secrecy rates. • Novel multi-user buffer-aided relay systems with signals  ... 
arXiv:1512.07310v1 fatcat:xqlja3ujobblhli6h4ixd47pw4

On Security-Delay Trade-Off in Two-Hop Wireless Networks With Buffer-Aided Relay Selection

Xuening Liao, Yuanyu Zhang, Zhenqiang Wu, Yulong Shen, Xiaohong Jiang, Hiroshi Inamura
2018 IEEE Transactions on Wireless Communications  
This thesis therefore focuses on the PHY security performance study for two-hop wireless networks with buffer-aided relay selection (a typical PHY security technique), where relay buffers will be adopted  ...  Physical Layer Security Performance Study for Two-Hop Wireless Networks with Buffer-Aided Relay Selection by Xuening Liao As wireless communication technologies continue to evolve rapidly, an unprecedented  ...  security performance study of buffer-aided relay selection scheme for two-hop wireless networks with DF relays.  ... 
doi:10.1109/twc.2017.2786258 fatcat:2gvfikdq2resbgz34kjx47p4ke

Performance of Cooperative Relay NOMA with Large Antenna Transmitters

Samuel Tweneboah-Koduah, Emmanuel Ampoma Affum, Kwame Agyemang-Prempeh Prempeh Agyekum, Sunday Adeola Ajagbe, Matthew O. Adigun
2022 Electronics  
Again, the performance of CR-NOMA systems using the GBSM channel model with large antenna transmitters and network coding schemes has attracted little attention in academia.  ...  In this paper, we study the performance of a two-stage mMIMO CR-NOMA network where the transmitter is represented as a uniform rectangular array (URA) or cylindrical array (CA).  ...  , University of Electronic Science and Technology of China for their contribution.  ... 
doi:10.3390/electronics11213482 fatcat:72sqlqh4qzf2pkp5ls2obqwocm

Link Selection for Secure Cooperative Networks with Buffer-Aided Relaying [article]

Ji He, Jia Liu, Yulong Shen, Xiaohong Jiang
2018 arXiv   pre-print
This paper investigates the secure communication in a two-hop cooperative wireless network, where a buffer-aided relay is utilized to forward data from the source to destination, and a passive eavesdropper  ...  Closed-form expressions are derived for the end-to-end secrecy outage probability (SOP), secrecy outage capacity (SOC), and exact secrecy throughput (EST), respectively.  ...  with buffer-aided relaying.  ... 
arXiv:1802.06538v1 fatcat:lbbrpy22zjevfddt5zyiukv5ae

Relaying in the Internet of Things (IoT): A Survey

Uyoata Uyoata, Joyce Mwangama, Ramoni Adeogun
2021 IEEE Access  
Simulation and HD buffer state MAC analysis [81] Minimize secrecy and link BSI and CSI PHY AF Simulation HD outage probabilities [76] Outage probability Relay buffer state PHY and DF  ...  Considering relays with more than one antenna, the work linked each buffer space to a specific antenna and showed through simulation that the proposed approach achieved gains in reduced outage probability  ... 
doi:10.1109/access.2021.3112940 fatcat:beo5j6hyd5hwhlxj4mp5vok4sq

Secret-Key-Aided Scheme for Securing Untrusted DF Relaying Networks

Ahmed El Shafie, Ahmed Sultan, Asma Mabrouk, Kamel Tourki, Naofal Al-Dhahir
2018 IEEE Transactions on Vehicular Technology  
A legitimate source node, Alice, sends her data to a legitimate destination node, Bob, with the aid of an untrusted DF relay node, Charlie.  ...  This paper proposes a new scheme to secure the transmissions in an untrusted decode-and-forward (DF) relaying network.  ...  In [12] , joint destination-based jamming and precoding at both the source and the relay was studied for a multi-antenna untrusted AF relay system.  ... 
doi:10.1109/tvt.2018.2799900 fatcat:zc5kw5tuevabdis7wlwmi2l3ym

Joint Power Allocation and Link Selection for Multi-Carrier Buffer Aided Relay Network

Tayyaba Jabeen, Zain Ali, Wali Ullah Khan, Furqan Jameel, Imran Khan, Guftaar Ahmad Sardar Sidhu, Bong Jun Choi
2019 Electronics  
(BS), one destination node i.e., (MU) and a buffer aided decode and forward (DF) relay node.  ...  In this paper, we present a joint power allocation and adaptive link selection protocol for an orthogonal frequency division multiplexing (OFDM)-based network consists of one source node i.e., base station  ...  For the underlay cognitive radio network with buffer aided DF relay, an adaptive link selection scheme was presented in [11] .  ... 
doi:10.3390/electronics8060686 fatcat:rxlwbveyxjbk5kal6qjfn2cvje

Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey

Amitav Mukherjee, S. Ali A. Fakoorian, Jing Huang, A. Lee Swindlehurst
2014 IEEE Communications Surveys and Tutorials  
, and relay networks.  ...  Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry.  ...  [157] considered utilizing a buffer-aided relay to enhance both transmission efficiency and security for two-hop relay networks.  ... 
doi:10.1109/surv.2014.012314.00178 fatcat:cmqxgwotmvbmldwqdvjkzsweam

Adaptive limited feedback for MISO wiretap channels with cooperative jamming

Minyan Pei, Dongtang Ma, Jibo Wei
2013 2013 IEEE 14th Workshop on Signal Processing Advances in Wireless Communications (SPAWC)  
, and relay networks.  ...  Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry.  ...  [157] considered utilizing a buffer-aided relay to enhance both transmission efficiency and security for two-hop relay networks.  ... 
doi:10.1109/spawc.2013.6612057 dblp:conf/spawc/PeiMW13 fatcat:gjn4o2l4qjae5ipsr6zfjo35yu

Physical Layer Security for UAV Communications in 5G and Beyond Networks [article]

Jue Wang, Xuanxuan Wang, Ruifeng Gao, Chengleyang Lei, Wei Feng, Ning Ge, Shi Jin, Tony Q. S. Quek
2021 arXiv   pre-print
Then, we introduce the widely used secrecy performance metrics and start by reviewing the secrecy performance analysis and enhancing techniques for statically deployed UAV systems, and extend the discussion  ...  In this paper, a comprehensive survey on the current achievements of the UAV-aided wireless communications is conducted from the PLS perspective.  ...  evaluate the average secrecy performance for a random network.  ... 
arXiv:2105.11332v1 fatcat:d6oidecjcbaxrdz3kezdjxpypa
« Previous Showing results 1 — 15 out of 66 results