2016
DOI: 10.1002/dac.3182
|View full text |Cite
|
Sign up to set email alerts
|

Performance study of hybrid decode–amplify–forward (HDAF) relaying scheme for physical layer security in wireless cooperative network

Abstract: In this paper, the secrecy performance and power allocation of the signal-to-noise ratio-based hybrid decode-amplify-forward (HDAF) relaying protocol in wireless cooperative network are investigated to get security at physical layer. The performance metrics considered are secrecy rate and intercept probability. The Ergodic secrecy rate is approximated theoretically. The effect of relay and eavesdropper locations on the secrecy performance of the system is analyzed. It is found that maximum secrecy rate is obta… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(9 citation statements)
references
References 27 publications
(63 reference statements)
0
7
0
Order By: Relevance
“…Moreover, from (13), we can obtain PDFs of X 1 and X 2 . Then, substituting PDFs of X 1 and X 2 and CDF of SR b in A4 into A3; after some manipulations, we can obtain (16).…”
Section: Appendix A: Proof Of Theoremmentioning
confidence: 99%
See 3 more Smart Citations
“…Moreover, from (13), we can obtain PDFs of X 1 and X 2 . Then, substituting PDFs of X 1 and X 2 and CDF of SR b in A4 into A3; after some manipulations, we can obtain (16).…”
Section: Appendix A: Proof Of Theoremmentioning
confidence: 99%
“…Recently, the physical-layer security (PLS) protocols [15][16][17][18] have gained the attention of researchers. A sole reliance on the physical properties of a wireless medium such as the CSI and distance to obtain security allows for a simple implementation of the PLS protocols compared with the complex cryptographic methods.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…In [13], a security‐aware AF relaying scheme was proposed for a cooperative network in the presence of untrusted relays, and in addition, jamming and relay selection techniques were discussed to maximize the secrecy capacity. Additionally, Gurrala and Das [14] investigated the performance in terms of secrecy rate and intercept probability of hybrid decode amplify‐forward cooperative network with fixed and optimal power allocation. In this work, the authors discussed different jamming schemes in a wireless cooperative network.…”
Section: Introductionmentioning
confidence: 99%