2021
DOI: 10.1109/access.2021.3067472
|View full text |Cite
|
Sign up to set email alerts
|

Secure Multiuser Scheduling for Hybrid Relay-Assisted Wireless Powered Cooperative Communication Networks With Full-Duplex Destination-Based Jamming

Abstract: In this paper, we investigate secure communication in a hybrid relay (HR)-assisted wireless powered cooperative communication network (WPCCN), where an eavesdropper tries to intercept the data transmitted by a source user and the HR simultaneously. The HR has the ability to wireless powered the energy-constrained multiple users in the downlink and to relay the received confidential information in the uplink. In particular, the full-duplex destination-based jamming (FD-DBJ) strategy is exploited to improve the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
16
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(16 citation statements)
references
References 60 publications
0
16
0
Order By: Relevance
“…Further, the conventional max-min scheduling scheme has disadvantages like limited throughput since relay nodes are not equipped with a buffer. Additionally, there is very little probability of scheduling for users with inferior channel quality [36]. In addition, the user pairs, who have poor channel quality, are segregated into two batches.…”
Section: The Problemmentioning
confidence: 99%
“…Further, the conventional max-min scheduling scheme has disadvantages like limited throughput since relay nodes are not equipped with a buffer. Additionally, there is very little probability of scheduling for users with inferior channel quality [36]. In addition, the user pairs, who have poor channel quality, are segregated into two batches.…”
Section: The Problemmentioning
confidence: 99%
“…Since Yðg ps Þ is a function of random variables ( G, H, U) which are also functions of the random variable g ps according to (17), (18), and (25), O s ðC 0 Þ in (55) is computed as…”
Section: Sop For the Primary Message X Pmentioning
confidence: 99%
“…Nonetheless, both cognitive and primary users in these networks are allowed to transmit on the LFB concomitantly that may facilitate eavesdroppers in emulating legal users to overhear privacy messages, seriously alerting security problems. To supplement and enhance security performance for conventional encryption and cryptographic solutions, physical layer security (PHY security) has lately been emerged as a promising candidate [17][18][19]. PHY security can be deployed with numerous techniques, including relaying and jamming.…”
Section: Introductionmentioning
confidence: 99%
“…To overcome the secrecy challenges arising from the broadcast property of wireless communications, physical-layer security (PLS) as a beneficial approach has been proposed. The view of PLS is taking advantage of the channel randomness in wireless transmissions to ensure security [5,[13][14][15][16][17]. To offer more enhancements in the PLS of wireless communications, user scheduling strategies and also there is a wide use of relay selection strategies in the literature [6,[14][15][16][17][18][19][20][21].…”
Section: Introductionmentioning
confidence: 99%
“…The view of PLS is taking advantage of the channel randomness in wireless transmissions to ensure security [5,[13][14][15][16][17]. To offer more enhancements in the PLS of wireless communications, user scheduling strategies and also there is a wide use of relay selection strategies in the literature [6,[14][15][16][17][18][19][20][21]. The authors in [14] propose user-pair scheduling schemes to calculate the secrecy outage probability (SOP) of a cooperative system with the aid of friendly jammers.…”
Section: Introductionmentioning
confidence: 99%