2018
DOI: 10.1002/ett.3289
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing physical layer security in AF relay–assisted multicarrier wireless transmission

Abstract: In this paper, we study the physical layer security problem in the dual‐hop orthogonal frequency division multiplexing–based wireless communication system. First, we consider a single‐user single‐relay system and study a joint power optimization problem at the source and relay subject to individual power constraint at the 2 nodes. The aim is to maximize the end‐to‐end secrecy rate with optimal power allocation over different subcarriers. Later, we consider a more general multiuser multirelay scenario. Under hi… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
16
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
7
1

Relationship

2
6

Authors

Journals

citations
Cited by 17 publications
(16 citation statements)
references
References 33 publications
0
16
0
Order By: Relevance
“…By comparing (27) with (31), we note that the two problems are very similar, hence by applying also in this case the Lagrange multiplier method we obtain again (30), with the following coefficient values…”
Section: Infinite-length Coding With Discrete Constellationsmentioning
confidence: 96%
“…By comparing (27) with (31), we note that the two problems are very similar, hence by applying also in this case the Lagrange multiplier method we obtain again (30), with the following coefficient values…”
Section: Infinite-length Coding With Discrete Constellationsmentioning
confidence: 96%
“…As for mm-wave relay systems, [24] investigates the robustness of the compressed sensing multi-hop scheme in the presence of one eavesdropper. Reference [25] considers resources allocation problem to enhance physical layer security in AF relay assisted wireless networks. In paper [26], RF and baseband beamforming designs are divided.…”
Section: B Related Work and Motivationmentioning
confidence: 99%
“…16 Exploiting the dynamics in the physical layer, physical layer security has recently shown to support secure transmissions and emerged as an appealing method to provide perfect secrecy. [17][18][19][20] In the context of cooperative NOMA, physical layer security has attracted increasing research interests. [21][22][23][24][25][26] In the work of Vo et al, 21 the authors considered imperfect channel state information (CSI) and analyzed the secrecy and throughput of a cooperative NOMA energy harvesting IoT system in the presence of untrust relays.…”
Section: Introductionmentioning
confidence: 99%