Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

Physical layer security for multiuser relay networks

Physical layer security for multiuser relay networks

For access to this article, please select a purchase option:

Buy chapter PDF
£10.00
(plus tax if applicable)
Buy Knowledge Pack
10 chapters for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
Trusted Communications with Physical Layer Security for 5G and Beyond — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

In this chapter, we will present criteria for user selection and relay selection to enhance the physical layer security in multiuser multi-relay networks. Specifically, for multiuser networks with multiple amplify-and-forward (AF) relays, we present three criteria to select the best relay and user pair. Criteria I and II study the received signal-to-noise ratio (SNR) at the receivers and perform the selection by maximising the SNR ratio ofthe user to the eavesdroppers. To this end, criterion I relies on both the main and eavesdropper links, while criterion II relies on the main links only. Criterion III is the standard max-min selection criterion, which maximises the minimum of the dual-hop channel gains of main links. For the three selection criteria, we examine the system secrecy performance by deriving the analytical expressions for the secrecy outage probability. We also derive the asymptotic analysis for the secrecy outage probability with high main-to-eavesdropper ratio.

Chapter Contents:

  • 7.1 AF relaying
  • 7.1.1 Relay and user selection
  • 7.1.2 Lower bound
  • 7.1.2.1 Criterion I
  • 7.1.2.2 Criteria II and III
  • 7.1.3 Asymptotic analysis
  • 7.1.3.1 Criterion I
  • 7.1.3.2 Criteria II and III
  • 7.1.4 Numerical and simulation results
  • 7.2 DF relaying
  • 7.2.1 User and relay selection criteria
  • 7.2.1.1 Criterion I
  • 7.2.1.2 Criterion II
  • 7.2.2 Closed-form analysis
  • 7.2.2.1 A tight lower bound for Criterion I
  • 7.2.2.2 Exact formula for Criterion II
  • 7.2.3 Asymptotic analysis
  • 7.2.3.1 Asymptotic Pout for Criterion I
  • 7.2.3.2 Asymptotic Pout for Criterion II
  • 7.2.4 Numerical and simulation results
  • Appendix A
  • A.1 Proof of Theorem 1
  • Appendix B
  • B.1 Proof of Theorem 2
  • Appendix C
  • C.1 Proof of Theorem 3
  • References

Inspec keywords: relay networks (telecommunication); probability; amplify and forward communication

Other keywords: standard max-min selection criterion; dual-hop channel gains; secrecy outage probability; physical layer security; amplify-and-forward relays; multiuser multirelay networks

Subjects: Other topics in statistics; Radio links and equipment

Preview this chapter:
Zoom in
Zoomout

Physical layer security for multiuser relay networks, Page 1 of 2

| /docserver/preview/fulltext/books/te/pbte076e/PBTE076E_ch7-1.gif /docserver/preview/fulltext/books/te/pbte076e/PBTE076E_ch7-2.gif

Related content

content/books/10.1049/pbte076e_ch7
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address