2019
DOI: 10.1002/ett.3639
|View full text |Cite
|
Sign up to set email alerts
|

Physical‐layer security for cellular multiuser two‐way relaying networks with single and multiple decode‐and‐forward relays

Abstract: We investigate the secrecy performance of cellular multiuser two-way relay networks, where the bidirectional information exchange between a multiantenna base station (BS), and several users can be accomplished with the assistance of decode-and-forward relay(s) in the presence of a multiantenna passive eavesdropper. We employ low-complexity antenna selection strategy at the BS coupled with user scheduling for maximizing the end-to-end signal-to-noise ratios (SNRs). To enhance the wiretap probability, the eavesd… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
8
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 10 publications
(8 citation statements)
references
References 58 publications
0
8
0
Order By: Relevance
“…It should also be remarked here that, and are independent because and and . Remark 2: (High-SNR Regime): To gain deeper insights, we consider ( 6) and (7) in the high transmit SNR regime. When the transmit power is sufficiently large, we find that approaches a constant ceiling which only depends on the EVMs at the nodes, while the information leaked towards significantly depends on the power allocation factor .…”
Section: Secure Artificial Noise Masked Beamformingmentioning
confidence: 99%
See 2 more Smart Citations
“…It should also be remarked here that, and are independent because and and . Remark 2: (High-SNR Regime): To gain deeper insights, we consider ( 6) and (7) in the high transmit SNR regime. When the transmit power is sufficiently large, we find that approaches a constant ceiling which only depends on the EVMs at the nodes, while the information leaked towards significantly depends on the power allocation factor .…”
Section: Secure Artificial Noise Masked Beamformingmentioning
confidence: 99%
“…Comparing ( 8), ( 9) with ( 6), (7), it can be clearly seen that the terms and in ( 6) and ( 7), respectively, contribute to a more complicated expression for the non-ideal hardware SNDRs. Based on ( 6), (7), we see that the distortion noises emitted by results in interference at both and , while the self-distortion noise at only degrades the received SNDR at the legitimate destination. Thus, even though hardware imperfection can intrinsically confuse passive eavesdroppers, the secrecy performance is still degraded.…”
Section: Secure Artificial Noise Masked Beamformingmentioning
confidence: 99%
See 1 more Smart Citation
“…During the last decade, PLS has experienced a resurgence of interest from a lot of scientists [4] due to its potential to enhance the quality of communication to satisfy the vast demand of mobile users. PLS has been applied in relay networks [5], cellular networks [6], [7], cognitive radio networks [8], IoT networks [9], and massive multipleinput multiple-output (MIMO) networks [10]. In multi-user networks, physical layer security can be improved by node cooperation.…”
Section: Introductionmentioning
confidence: 99%
“…These two network coding techniques have been the main focus of TWRC for last decade. With the advance research of TWRC, the PLS in spectrally-efficient TWR networks has been extensively researched in the literature [6], [7], [14]- [16], [43]. In particular, Shukla [7] and Pandey [6] investigated the secrecy outage performance of a full-duplex cellular multiuser two-way amplify-and-forward relay network, where a multiantenna base station using transmit antennas selection communicates with one of the several users by the assistance of a relay in the presence of a passive eavesdropper that employs maximal ratio combining.…”
Section: Introductionmentioning
confidence: 99%