2014
DOI: 10.1109/tcomm.2014.2345763
|View full text |Cite
|
Sign up to set email alerts
|

Secure Multiuser Communications in Multiple Amplify-and-Forward Relay Networks

Abstract: Abstract-This paper proposes relay selection to increase the physical layer security in multiuser cooperative relay networks with multiple amplify-and-forward relays, in the presence of multiple eavesdroppers. To strengthen the network security against eavesdropping attack, we present three criteria to select the best relay and user pair. Specifically, criteria I and II study the received signal-to-noise ratio (SNR) at the receivers, and perform the selection by maximizing the SNR ratio of the user to the eave… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
99
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
7

Relationship

2
5

Authors

Journals

citations
Cited by 124 publications
(99 citation statements)
references
References 38 publications
0
99
0
Order By: Relevance
“…An eavesdropper, E, can overhear the message forwarded from relays, which indicates a great threat to the communication from S to D. Note that the network secrecy performance becomes worse if multiple eavesdroppers exist in the network, no matter whether the eavesdroppers decode the messages in a colluding or non-colluding manner [20]. However, the relay selection criteria and the secrecy performance analytical framework proposed in this work can be easily extended to the case of multiple eavesdroppers.…”
Section: System Modelmentioning
confidence: 99%
See 3 more Smart Citations
“…An eavesdropper, E, can overhear the message forwarded from relays, which indicates a great threat to the communication from S to D. Note that the network secrecy performance becomes worse if multiple eavesdroppers exist in the network, no matter whether the eavesdroppers decode the messages in a colluding or non-colluding manner [20]. However, the relay selection criteria and the secrecy performance analytical framework proposed in this work can be easily extended to the case of multiple eavesdroppers.…”
Section: System Modelmentioning
confidence: 99%
“…As such, it is not trivial to derive an exact analytical expression for the SOP, since γ D n and γ E n are correlated RVs. To deal with this issue, we note that the authors in [20] presented simplified expressions for γ D n and γ E n , by assuming large transmit power P . However, this is not applicable in practical scenarios, where the terminals are limited powered, e.g., mobile devices or sensor nodes.…”
Section: A a Novel Lower Bound On The Sopmentioning
confidence: 99%
See 2 more Smart Citations
“…The case with direct links between the PT and its corresponding PR involves many complicated problems such as the maximum ratio combination of network-coded data and direct transmitted data and is beyond the focus of the paper. In addition, due to the long distance or the shielding effect caused by some barrier between each PT and its corresponding PR, the PR is not within the communication range of the PT, and thus, the assumption that there is no direct link between the source and destination is reasonable for some practical applications [33][34][35].…”
Section: System Modelmentioning
confidence: 99%