2010
DOI: 10.1049/iet-com.2009.0634
|View full text |Cite
|
Sign up to set email alerts
|

Opportunistic relay selection for cooperative networks with secrecy constraints

Abstract: Abstract-In this paper, a relay selection policy is proposed that fully exploits the flexibility offered by the buffering ability of the relay nodes in order to maximize the achieved diversity gain. The suggested scheme incorporates the instantaneous strength of the wireless links as well as the status of the finite relay buffers and adapts the relay selection decision on the strongest available link by dynamically switching between relay reception and transmission. We show that the proposed relay selection sc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

2
200
0
1

Year Published

2014
2014
2019
2019

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 187 publications
(203 citation statements)
references
References 15 publications
2
200
0
1
Order By: Relevance
“…There are two fundamental relaying protocols: amplify-and-forward (AF) and decode-and-forward (DF). For DF-aided relay networks, the system secure communication has been extensively studied, by deriving analytical expressions for the SOP in [16]- [18]. In order to enhance the security for multi-DF relay networks, these works [16]- [18] used relay selection techniques to exploit the dynamic nature among multi-relay fading channels.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…There are two fundamental relaying protocols: amplify-and-forward (AF) and decode-and-forward (DF). For DF-aided relay networks, the system secure communication has been extensively studied, by deriving analytical expressions for the SOP in [16]- [18]. In order to enhance the security for multi-DF relay networks, these works [16]- [18] used relay selection techniques to exploit the dynamic nature among multi-relay fading channels.…”
Section: Introductionmentioning
confidence: 99%
“…For DF-aided relay networks, the system secure communication has been extensively studied, by deriving analytical expressions for the SOP in [16]- [18]. In order to enhance the security for multi-DF relay networks, these works [16]- [18] used relay selection techniques to exploit the dynamic nature among multi-relay fading channels. Compared with DF relaying, it is, however, much more complicated to obtain analytical SOP expressions for AF relay networks, since the received signal-to-noise ratios (SNRs) at the destination and eavesdroppers are represented in complex forms.…”
Section: Introductionmentioning
confidence: 99%
“…In these systems a relay node located closer to the main destination delivers a higher capacity to the main link than the eavesdropper link [45]. This been said, relay selection for cooperative networks with secrecy constraints has arisen as an interesting research topic Alternatively, jamming techniques which produce an artificial interference at the eavesdropper node to reduce the capacity of the associated link seem to be an attractive approach for practical applications [48][49][50][51]. In [52] the interaction between relay and jammer is presented as a non-cooperative game where both nodes have conflicting objectives and the Nash equilibrium (NE) of the system is derived.…”
Section: Security Based Methodsmentioning
confidence: 99%
“…The exact secrecy outage probability is difficult to characterize, instead, we apply the following approximation as in [39] …”
Section: Appendix F Proof Of Theoremmentioning
confidence: 99%