2017
DOI: 10.3390/e19100522
|View full text |Cite
|
Sign up to set email alerts
|

Secure Communication for Two-Way Relay Networks with Imperfect CSI

Abstract: This paper considers a two-way relay network, where two legitimate users exchange messages through several cooperative relays in the presence of an eavesdropper, and the Channel State Information (CSI) of the eavesdropper is imperfectly known. The Amplify-and-Forward (AF) relay protocol is used. We design the relay beamforming weights to minimize the total relay transmit power, while requiring the Signal-to-Noise-Ratio (SNRs) of the legitimate users to be higher than the given thresholds and the achievable rat… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
8
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(8 citation statements)
references
References 33 publications
0
8
0
Order By: Relevance
“…Wang et al [12] proposed a jammer selection strategy with imperfect CSI, which is based on selecting the minimum secrecy rate and maximise it, to enhance the system security against the eavesdropper. Sun et al [13] considers a HD-based two-way relaying (TWR) system model structure in the presence of a single eavesdropper. Sun et al [13] also considers that the source terminal to the eavesdropper and the relay to the eavesdropper CSIs are imperfect.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Wang et al [12] proposed a jammer selection strategy with imperfect CSI, which is based on selecting the minimum secrecy rate and maximise it, to enhance the system security against the eavesdropper. Sun et al [13] considers a HD-based two-way relaying (TWR) system model structure in the presence of a single eavesdropper. Sun et al [13] also considers that the source terminal to the eavesdropper and the relay to the eavesdropper CSIs are imperfect.…”
Section: Introductionmentioning
confidence: 99%
“…Sun et al [13] considers a HD-based two-way relaying (TWR) system model structure in the presence of a single eavesdropper. Sun et al [13] also considers that the source terminal to the eavesdropper and the relay to the eavesdropper CSIs are imperfect. In addition, Sun et al [13] utilise the beamforming technique to minimise the total relay transmit power and prevent information leakage.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The authors of [19][20][21][22][23][24][25] considered the secrecy performance enhancement for underlay cognitive radio (UCR) networks in which transmit power of secondary users (SUs) is limited by maximum interference levels required by primary users (PUs). The authors of [26][27][28][29] proposed secure communication protocols for two-way relay networks. In [30][31][32][33], the end-to-end secrecy performance of multi-hop relaying systems is investigated.Thus far, most published works related to performance evaluation assume that transceiver hardware of wireless terminals is perfect.…”
mentioning
confidence: 99%
“…[7,8] study the energy harvesting technique on TWRN under the effect of practical hardware impairments. Finally, physical layer security of AF-TWRN considering imperfect channel state information (CSI) is explored in [9].…”
Section: Introductionmentioning
confidence: 99%