2015
DOI: 10.1109/lwc.2015.2466678
|View full text |Cite
|
Sign up to set email alerts
|

Relay Selection for Security-Constrained Cooperative Communication in the Presence of Eavesdropper's Overhearing and Interference

Abstract: This paper addresses the problem of secure communication in a cooperative network operating in the presence of an eavesdropper as well as co-channel interference. Two opportunistic relay selection techniques are exploited for achieving physicallayer based security. The first one aims at minimizing the amount of information leaked to the eavesdropper by selecting the relay which achieves the lowest capacity to the wiretap node. In the second scheme, the relay which yields the maximum achievable capacity at the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
26
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 31 publications
(26 citation statements)
references
References 9 publications
0
26
0
Order By: Relevance
“…This is shown by the dashed line on the top of the figure which is the SOP of the wiretap channel evaluated in (24). When γ th → 0, i.e., R always decodes the message correctly, the SOP also saturates to a fixed value shown by the dashed line at the bottom of the figure, evaluated from (22).…”
Section: Numerical and Simulation Resultsmentioning
confidence: 98%
See 1 more Smart Citation
“…This is shown by the dashed line on the top of the figure which is the SOP of the wiretap channel evaluated in (24). When γ th → 0, i.e., R always decodes the message correctly, the SOP also saturates to a fixed value shown by the dashed line at the bottom of the figure, evaluated from (22).…”
Section: Numerical and Simulation Resultsmentioning
confidence: 98%
“…In the presence of direct links, both the destination and the eavesdropper have access to two independent versions of the source message and can therefore apply diversity combining techniques. Direct and relayed links are combined at the eavesdropper using maximal ratio combining (MRC) and selection combining (SC) in [22], and MRC in [21], [23], [24]. Diversity combining is performed both at the destination and eavesdropper using MRC technique in [25], [26], [29], [30].…”
Section: Introductionmentioning
confidence: 99%
“…interferers share the same bands with D and E and cause interferences to them. It can be observed that the system model is practical and can be applied to practical scenarios [28][29][30]. It is assume that all nodes are equipped with single antenna and all channels are Rayleigh fading.…”
Section: System Model Descriptionmentioning
confidence: 99%
“…A survey of recent progress in this field can be found in [1], [25]. Security aspects of network coding is studied in references like [2], [19], [28]. In this paper, we will study the security of LT coding-based caching technique.…”
Section: Related Workmentioning
confidence: 99%