2016
DOI: 10.1109/lcomm.2016.2521655
|View full text |Cite
|
Sign up to set email alerts
|

OFDMA-Based DF Secure Cooperative Communication With Untrusted Users

Abstract: In this letter we consider resource allocation for OFDMA-based secure cooperative communication by employing a trusted Decode and Forward (DF) relay among the untrusted users. We formulate two optimization problems, namely, (i) sum rate maximization subject to individual power constraints on source and relay, and (ii) sum power minimization subject to a fairness constraint in terms of per-user minimum support secure rate requirement. The optimization problems are solved utilizing the optimality of KKT conditio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
33
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 18 publications
(33 citation statements)
references
References 9 publications
0
33
0
Order By: Relevance
“…In physical layer security, the system models are generally classified in two broad categories -one having external eavesdropper which is an entity external to the network [6,7,8,9,10,11,12], and the other having untrusted users which are actually legitimate users of the system, who have lost mutual trust and consider each other as an eavesdropper [13,14,15]. Untrusted users is a far more hostile condition in comparison to external eavesdropper, where each user contends for a subcarrier against rest of the users (behaving as 2 eavesdroppers), which results in a relatively complex resource allocation problem and lesser secure rate [16].…”
Section: Resource Allocation Without Subcarrier Pairingmentioning
confidence: 99%
See 2 more Smart Citations
“…In physical layer security, the system models are generally classified in two broad categories -one having external eavesdropper which is an entity external to the network [6,7,8,9,10,11,12], and the other having untrusted users which are actually legitimate users of the system, who have lost mutual trust and consider each other as an eavesdropper [13,14,15]. Untrusted users is a far more hostile condition in comparison to external eavesdropper, where each user contends for a subcarrier against rest of the users (behaving as 2 eavesdroppers), which results in a relatively complex resource allocation problem and lesser secure rate [16].…”
Section: Resource Allocation Without Subcarrier Pairingmentioning
confidence: 99%
“…To communication with users, S has to communicate through R. All subcarriers over source to relay S − R link, and relay to users R − U link are considered to face quasi-static Rayleigh fading. Since all users are legitimate in the system, perfect CSI of all the links is available at source using conventional channel estimation and feedback mechanisms [7,8,15,13,14].…”
Section: System Model and Problem Formulationmentioning
confidence: 99%
See 1 more Smart Citation
“…Under the umbrella of orthogonal frequency division multiple access, resource allocation for PLS in a dual hop with DF protocol has been studied in other works. () The power allocation problem to maximize the secrecy rate was investigated in the work of Jeong and Kim . The extension to this work with joint subcarrier allocation and power loading was made in the work of Wang et al Recently, Saini et al proposed the 2 different power optimization schemes at source and relay under individual power constraint: one achieves sum secrecy rate maximization in the presence of untrusted users, whereas the other achieves fairness for the minimum requirement of secrecy per user.…”
Section: Introductionmentioning
confidence: 99%
“…With multi-antenna nodes, [8] investigated multiuser resource allocation for decode and forward (DF) relay assisted system without direct link, in the presence of single eavesdropper. The authors in [9] considered resource allocation problem for a DF relay assisted orthogonal frequency division multiple access (OFDMA) system with multiple untrusted users. Manuscript Assuming the availability of direct link, the optimal power allocation and transmission mode selection for DF relayassisted secure communication was considered in [10].…”
Section: Introductionmentioning
confidence: 99%