2015
DOI: 10.1109/tcomm.2015.2494012
|View full text |Cite
|
Sign up to set email alerts
|

Cooperative Beamforming and User Selection for Improving the Security of Relay-Aided Systems

Abstract: Abstract-A relay network in which a source wishes to convey a confidential message to a legitimate destination with the assistance of trusted relays is considered. In particular, cooperative beamforming and user selection techniques are applied to protect the confidential message. The secrecy rate (SR) and secrecy outage probability (SOP) of the network are investigated first, and a tight upper bound for the SR and an exact formula for the SOP are derived. Next, asymptotic approximations for the SR and SOP in … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
50
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 78 publications
(50 citation statements)
references
References 32 publications
0
50
0
Order By: Relevance
“…where c DF is a constant subject to the constraint (8). From (6), (8) and (14), we have c DF = √ N whereby (6) can be given by…”
Section: A Mrc/mrt At Relaymentioning
confidence: 99%
See 2 more Smart Citations
“…where c DF is a constant subject to the constraint (8). From (6), (8) and (14), we have c DF = √ N whereby (6) can be given by…”
Section: A Mrc/mrt At Relaymentioning
confidence: 99%
“…Among recent works on the security for massive MIMO relaying systems [3]- [8], the authors in [3] and [4] considered cooperative relay systems and compared the security improvement for both amplify-and-forward (AF) and decodeand-forward (DF) relaying, while only the AF scheme (or the DF scheme) was considered in [5] and [6] (or in [7] and [8]). These works, however, did not consider any direct link between source and eavesdropper.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…To enhance the performance of communication systems, the combination of interference alignment [59], spectrum allocation and energy-efficient management should be necessarily considered and implemented simultaneously. This leads to the introduction of a hybrid resource management scheme for the emerging of 5G network architectures, i.e., cognitive relay networks [19,59], massive multiple-input multiple-output (MIMO), heterogeneous networks (HetNets), and cell-free. In this paper, we provide and analyse the novel of hybrid resource allocation approaches for improving EE performance in potential 5G network scenarios.…”
Section: Introductionmentioning
confidence: 99%
“…Recently, the introduction of relay into physical layer security has attracted a lot of research interest as a promising solution to improve transmission security through cooperative diversity [4,5]. Similar to the traditional relay systems, amplify-and-forward (AF) [6] and decode-and-forward (DF) [7] are two commonly used schemes in secure relay systems.…”
Section: Introductionmentioning
confidence: 99%