2018
DOI: 10.1109/lcomm.2017.2768513
|View full text |Cite
|
Sign up to set email alerts
|

Secrecy Rate Maximization With Outage Constraint in Multihop Relaying Networks

Abstract: Abstract-In this paper, we study the secure transmission in multihop wireless networks with randomize-and-forward (RaF) relaying, in the presence of randomly distributed eavesdroppers. By considering adaptive encoder with on-off transmission (OFT) scheme, we investigate the optimal design of the wiretap code and routing strategies to maximize the secrecy rate while satisfying the secrecy outage probability (SOP) constraint. We derive the exact expressions for the optimal rate parameters of the wiretap code. Th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
12
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(12 citation statements)
references
References 21 publications
(24 reference statements)
0
12
0
Order By: Relevance
“…Next, substituting Equation (35) into Equation (34), and after some manipulations, we obtain Equation (32) and finish the proof.…”
Section: Lemmamentioning
confidence: 91%
See 3 more Smart Citations
“…Next, substituting Equation (35) into Equation (34), and after some manipulations, we obtain Equation (32) and finish the proof.…”
Section: Lemmamentioning
confidence: 91%
“…Equation (28) shows that there are 04 possible cases for the set U 1 , i.e., U 1 = {∅}, U 1 = {N 1 }, U 1 = {N 2 }, U 1 = {N 1 , N 2 }. In Equation (28), the terms SOP CMT N 0 ,{∅} and SOP CMT N 0 ,{N 2 } can be calculated as in (32). Considering the term SOP CMT N 0 ,{N 1 } , which can be written by…”
Section: Cooperative Multi-hop Transmission Protocol (Cmt)mentioning
confidence: 99%
See 2 more Smart Citations
“…However, because the source data can be overheard over multiple hops, the channel capacity obtained at the eavesdroppers can be significantly increased by using the MRC combiner [ 20 ]. To solve this problem, a randomize-and-forward strategy [ 20 , 21 ] is often employed by the transmitters including the source and the relays to confuse the eavesdroppers. In [ 22 ], a secure transmission protocol in a dual-hop MIMO relay system using TAS/MRC over Nakagami- m fading channels was proposed and analyzed.…”
Section: Introductionmentioning
confidence: 99%