2021
DOI: 10.1002/dac.4763
|View full text |Cite
|
Sign up to set email alerts
|

Secure communication with joint resource allocation, relay and jammer selection in OFDM‐based cooperative networks

Abstract: Summary This paper considers an orthogonal frequency division multiplexing (OFDM) based cooperative network, where a source node communicates with a destination node with the help of multiple intermediate nodes, in the presence of an eavesdropper. Each intermediate node is assumed to be able to act as a relay or a jammer to improve the physical layer security. The problem of joint subcarrier allocation, power allocation, and mode selection to maximize the sum secrecy rate is investigated. We first reformulate … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
10
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(11 citation statements)
references
References 26 publications
1
10
0
Order By: Relevance
“…where HH H is a (L + 1) × (L + 1) random non-negative definite matrix including real and non-negative eigenvalues 𝜈 i s, thus, the capacity can be written as Equation (11).…”
Section: System Model and Problem Descriptionmentioning
confidence: 99%
See 3 more Smart Citations
“…where HH H is a (L + 1) × (L + 1) random non-negative definite matrix including real and non-negative eigenvalues 𝜈 i s, thus, the capacity can be written as Equation (11).…”
Section: System Model and Problem Descriptionmentioning
confidence: 99%
“…Since p c l and p s m are assumed to be integer and the optimization problem contains binary variable 𝛽 m,l , thus, the PT 1 formulation is an MINLP problem. From Equation (11) and Figure 3, it is observed that the capacity function in terms of SUs and DRs power has many local maxima, and the number of local optima usually increases exponentially with the problem dimensions. Some traditional techniques such as branch and bound, and brute-force could be used to reach the optimal solution, whereas they would cause prohibitive computational complexity.…”
Section: System Model and Problem Descriptionmentioning
confidence: 99%
See 2 more Smart Citations
“…Research in ref. [23] considered an OFDM system in the presence of an eavesdropper and used some intermediate node to act as cooperative jammer to improve the security, however, the relay‐aid cooperative jamming scheme were not effective in the presence of untrusted relay. The work in ref.…”
Section: Introductionmentioning
confidence: 99%