2017
DOI: 10.3390/s17020377
|View full text |Cite
|
Sign up to set email alerts
|

Performance Analysis of Physical Layer Security of Opportunistic Scheduling in Multiuser Multirelay Cooperative Networks

Abstract: Abstract:In this paper, we study the physical layer security (PLS) of opportunistic scheduling for uplink scenarios of multiuser multirelay cooperative networks. To this end, we propose a low-complexity, yet comparable secrecy performance source relay selection scheme, called the proposed source relay selection (PSRS) scheme. Specifically, the PSRS scheme first selects the least vulnerable source and then selects the relay that maximizes the system secrecy capacity for the given selected source. Additionally, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
19
0

Year Published

2018
2018
2019
2019

Publication Types

Select...
4
1
1

Relationship

2
4

Authors

Journals

citations
Cited by 16 publications
(19 citation statements)
references
References 38 publications
0
19
0
Order By: Relevance
“…And the channel noise is followed by Y ∼ CN(0, 2 Y ). We also assume that the source perfectly knows the channel state information (CSI) of all legitimate users and eavesdropper, as in [11,35].…”
Section: System Modelmentioning
confidence: 99%
See 3 more Smart Citations
“…And the channel noise is followed by Y ∼ CN(0, 2 Y ). We also assume that the source perfectly knows the channel state information (CSI) of all legitimate users and eavesdropper, as in [11,35].…”
Section: System Modelmentioning
confidence: 99%
“…The proposed user selection process is conducted through the channel state information (CSI) estimation/calculation system. Thus, this process is carried out before the data communication process as in [11,35]. In this paper, we propose the BSNBSF user selection scheme to maximize the secrecy capacity at N and F , respectively.…”
Section: The Proposed Best-secure-near-usermentioning
confidence: 99%
See 2 more Smart Citations
“…Shim et al in [144] consider a generalized scenario in a multirelay network where a cluster of M sources transmit messages to a cluster of N relays, in the presence of a single eavesdropper and a single destination. The eavesdropper is assumed to utilize either MRC or SC to combine the signal during source-to-relay and relay-to-destination transmission phases.…”
Section: B Trusted Relaysmentioning
confidence: 99%