2015
DOI: 10.1109/lwc.2014.2365808
|View full text |Cite
|
Sign up to set email alerts
|

Relay Selection for Security Enhancement in Cognitive Relay Networks

Abstract: This letter proposes several relay selection policies for secure communication in cognitive decode-and-forward (DF) relay networks, where a pair of cognitive relays are opportunistically selected for security protection against eavesdropping. The first relay transmits the secrecy information to the destination, and the second relay, as a friendly jammer, transmits the jamming signal to confound the eavesdropper. We present new exact closed-form expressions for the secrecy outage probability. Our analysis and s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
150
1
3

Year Published

2015
2015
2019
2019

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 207 publications
(154 citation statements)
references
References 13 publications
0
150
1
3
Order By: Relevance
“…After relaxing ρ ∈ [0, 1] and η ∈ [0, 1], we can see that all constraints of problem (19) are affine and the target function is concave, therefore the Slater's condition is satisfied. This optimization problem can be solved by the Lagrange dual method with a zero duality gap [27].…”
Section: Problem Solutionmentioning
confidence: 99%
“…After relaxing ρ ∈ [0, 1] and η ∈ [0, 1], we can see that all constraints of problem (19) are affine and the target function is concave, therefore the Slater's condition is satisfied. This optimization problem can be solved by the Lagrange dual method with a zero duality gap [27].…”
Section: Problem Solutionmentioning
confidence: 99%
“…Several policies are proposed for relay selection [39]- [41]. In [39], four relay selection policies are proposed and compared, namely random relay and random jammer, random jammer and best relay, best relay and best jammer, and best relay and no jammer; and it characterizes the joint impact of the proposed relay selection policies and the interference power constraint on the secrecy performance by deriving new exact closed-form expressions for the secrecy outage probability; it is shown then that the jammer's absence gives rise to the outage saturation phenomenon.…”
Section: Jamming Policiesmentioning
confidence: 99%
“…Nowadays, the researches of CRNPLS transmission scheme mainly focus on relay selection [10,11,12,13,14] and relay beamforming [15,16]. There is also some research work reported in Chinese journals [6,7,8,9].…”
Section: Introductionmentioning
confidence: 99%
“…Given that relay beamforming is an important method of PLS, this paper mainly researches the CRNPLS transmission problems based on relay beamforming. There is a pair of nodes and some relay nodes in the bibliographies [10,11,12,13,14], but they just select the best one of the relays to transmit signal. Although bibliographies [15,16] mainly concern about CRNPLS transmission schemes with multi-relay collaboration, they concern only the condition of a pair of secondary users.…”
Section: Introductionmentioning
confidence: 99%