2015
DOI: 10.1049/iet-com.2014.1128
|View full text |Cite
|
Sign up to set email alerts
|

Secrecy performance analysis with relay selection methods under impact of co‐channel interference

Abstract: In this study, the authors evaluate secrecy performance of cooperative protocols with relay selection methods under impact of co-channel interference. In particular, the authors propose an optimal selection scheme to maximise the secrecy capacity obtained at the cooperative phase. In addition, the authors also consider suboptimal and random selection schemes which reduce the complexity of implementation, when compared with the optimal one. For performance evaluation, the authors derive exact and asymptotic clo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
41
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 55 publications
(42 citation statements)
references
References 31 publications
1
41
0
Order By: Relevance
“…We then find that criterion II outperforms criterion III, since the former incorporates different impact from the two hops into the network security. Furthermore, the selection scheme in [28] achieves higher secrecy outage probability than the three selection investigated in this work. This is because that the selection scheme proposed in [28] is a partial relay selection scheme that relies on the second-hop main channel only, for the sake of low complexity.…”
Section: −4 E and The Associated Mer Is (D/d E )mentioning
confidence: 79%
See 1 more Smart Citation
“…We then find that criterion II outperforms criterion III, since the former incorporates different impact from the two hops into the network security. Furthermore, the selection scheme in [28] achieves higher secrecy outage probability than the three selection investigated in this work. This is because that the selection scheme proposed in [28] is a partial relay selection scheme that relies on the second-hop main channel only, for the sake of low complexity.…”
Section: −4 E and The Associated Mer Is (D/d E )mentioning
confidence: 79%
“…Recently, the impact of co-channel interference on the secure communications has received much attention. In [28], the authors studied the PLS of multi-DF relay networks in the presence of co-channel interference, by deriving the analytical and asymptotic SOP expressions. To the best of our knowledge, no prior work has considered the secure communications of multi-AF relay networks, taking into account the impact of co-channel interference and relay selection.…”
Section: Introductionmentioning
confidence: 99%
“…This is reasonable due to the fact that both SU and PU are in the same systems and they should have dedicated feedback channels. In addition, the channel mean gain of the S-Tx!EAV can be selected offline following [42][43][44].…”
Section: System Modelmentioning
confidence: 99%
“…In [6] and [7], the authors evaluated the secrecy performances of the relaying networks at the second phase (cooperative phase). In particular, the published work [6] proposed the joint relay and jammer selection methods to enhance the security for secondary networks in underlay cognitive radio.…”
Section: Introductionmentioning
confidence: 99%
“…In particular, the published work [6] proposed the joint relay and jammer selection methods to enhance the security for secondary networks in underlay cognitive radio. The authors in [7] investigated the impact of co-channel interference on the secrecy performance of various relay selection strategies. In [8] and [9], dual-hop secured communication protocols in one-way and two-way relaying networks were studied, respectively.…”
Section: Introductionmentioning
confidence: 99%