2015
DOI: 10.1109/twc.2015.2423290
|View full text |Cite
|
Sign up to set email alerts
|

Secrecy Outage of Dual-Hop Regenerative Multi-Relay System With Relay Selection

Abstract: Relay selection is considered to enhance the secrecy of a dual-hop regenerative multi-relay system with an eavesdropper. Without assuming perfect decoding at the relays, the secrecy outage probability of a single relay system is obtained first. Secrecy outage of optimal, traditional and suboptimal relay selection schemes is then evaluated. To reduce the power consumption, partial relay selection schemes based only on either of the source-relay or relay-destination instantaneous channel state information (ICSI)… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

3
156
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 66 publications
(159 citation statements)
references
References 43 publications
3
156
0
Order By: Relevance
“…It is highlighting that this configuration has numerous practical applications, for instance, in wireless sensor networks (WSN) where the multiantenna nodes convey information via a mobile relay that is restricted to a single antenna due to cost and size limitations, or in device-to-device (D2D) communications scenarios where the relay assists two multi-antenna devices to exchange messages [36]- [42]. Moreover, we follow the similar scenario in [15], [16], [20], [29]- [33], where both of the direct links A → B and A → E are assumed to be nonexistent, due to the direct links may be blocked by an obstruction or suffer from severe shadow fading. By this way, the transmission in the first hop cannot be overheard by Eves.…”
Section: Notationmentioning
confidence: 99%
See 4 more Smart Citations
“…It is highlighting that this configuration has numerous practical applications, for instance, in wireless sensor networks (WSN) where the multiantenna nodes convey information via a mobile relay that is restricted to a single antenna due to cost and size limitations, or in device-to-device (D2D) communications scenarios where the relay assists two multi-antenna devices to exchange messages [36]- [42]. Moreover, we follow the similar scenario in [15], [16], [20], [29]- [33], where both of the direct links A → B and A → E are assumed to be nonexistent, due to the direct links may be blocked by an obstruction or suffer from severe shadow fading. By this way, the transmission in the first hop cannot be overheard by Eves.…”
Section: Notationmentioning
confidence: 99%
“…Mathematically, the secrecy outage probability is formulated as P out (R s ) = Pr (C s < R s ). Following the similar procedures developed in [20], the secrecy outage probability is re-expressed as…”
Section: B Scenario I: Eavesdropper's Csi Is Unavailable At the Relaymentioning
confidence: 99%
See 3 more Smart Citations