2018
DOI: 10.1109/twc.2018.2822286
|View full text |Cite
|
Sign up to set email alerts
|

Optimal Power Allocation by Imperfect Hardware Analysis in Untrusted Relaying Networks

Abstract: By taking a variety of realistic hardware imperfections into consideration, we propose an optimal power allocation (OPA) strategy to maximize the instantaneous secrecy rate of a cooperative wireless network comprised of a source, a destination and an untrusted amplify-and-forward (AF) relay. We assume that either the source or the destination is equipped with a large-scale multiple antennas (LSMA) system, while the rest are equipped with a single antenna. To prevent the untrusted relay from intercepting the so… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
51
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
6
1

Relationship

2
5

Authors

Journals

citations
Cited by 38 publications
(51 citation statements)
references
References 43 publications
0
51
0
Order By: Relevance
“…Reference [42] provided a power-efficient resource allocation algorithm for secure wireless-powered communication networks with the hardware noises. Taking hardware imperfection into account, the authors of [43] proposed an optimal power allocation strategy to maximize the instantaneous secrecy rate of a cooperative amplify-and-forward (AF) relaying scheme. In [44], we calculated PNSC of multi-hop relay networks over Nakagami-m fading channels in presence of the hardware impairments.…”
mentioning
confidence: 99%
“…Reference [42] provided a power-efficient resource allocation algorithm for secure wireless-powered communication networks with the hardware noises. Taking hardware imperfection into account, the authors of [43] proposed an optimal power allocation strategy to maximize the instantaneous secrecy rate of a cooperative amplify-and-forward (AF) relaying scheme. In [44], we calculated PNSC of multi-hop relay networks over Nakagami-m fading channels in presence of the hardware impairments.…”
mentioning
confidence: 99%
“…EVM determines the quality of radio frequency (RF) transceivers and is defined as the ratio of the average distortion magnitude to the average signal magnitude. Notably, the EVM measures the joint effect of different hardware imperfections and compensation algorithms and thus it can be measured directly in practice 14,28 . 3rd generation partnership project long‐term elvolution has EVM requirements in the range of k tx , k rx ∈ [0.08,0.175], where smaller values are needed to achieve higher spectral efficiencies.…”
Section: Signal and System Modelmentioning
confidence: 99%
“…In other words, examining the sign of Ω( τ ) is sufficient to investigate the monotonicity of ϕ ( τ ). Now, relying on corollary 1 in Reference 14 together with the sign of Ω( τ ) at the boundaries τ = τ min and τ = 1, the following proposition is presented to solve the maximization of ϕ ( τ ) in (21).Proposition Based on the sign of Ω( τ ) at the boundaries τ = τ min and τ = 1 , ϕ ( τ ) may be convex, concave or it is possible to be neither convex nor concave in the feasible set τ ∈ ( τ min , 1] . Following this fact, the optimal point is given by τnormalopt*=TmaxΩτminΩτ1Ωτ2Ω1;Ωτmin.Ω1>0TmaxΩτminΩ1;Ωτmin<0&Ω1>0τ1;Ωτmin>0&Ω1<0, where τ1=ε2+ε224ε1ε3…”
Section: Sop Analysis and The Corresponding Opa Strategymentioning
confidence: 99%
“…Mekkawy et al discussed the different relay selection schemes for untrusted two‐way AF relaying networks. The optimal power allocation was considered in Kuhestani et al, where all nodes experience hardware imperfections. In this scenario, the source and destination are equipped with large‐scale multiple antennas.…”
Section: Introductionmentioning
confidence: 99%