没有合适的资源?快使用搜索试试~ 我知道了~
多中继辅助编解码协作系统的安全可靠性权衡分析
需积分: 3 0 下载量 139 浏览量
2021-02-25
23:11:06
上传
评论
收藏 489KB PDF 举报
温馨提示
试读
7页
多中继辅助编解码协作系统的安全可靠性权衡分析
资源推荐
资源详情
资源评论
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 65, NO. 7, JULY 2016 5825
where γ
k
j
= α
l,n
β
l,n
/(α
l,n
+ β
l,n
), α
l,n
= E(|h
s,l,n
|
2
)ρ/σ
2
,and
β
l,n
= E(|h
l,d,n
|
2
)ρ/σ
2
. Since these two distinct links (direct and
best indirect links) are mutually independent, then the overall pdf can
be found by convoluting the above two individual pdfs. Specifically,
the overall pdf for random v ariable t = y + γ
b
can be expressed as
f(t)=μ
L
n=1
(−1)
n+1
L−n+1
k
1
=1
L−n+2
k
2
=k
1
+1
···
L
k
n
=k
n−1
+1
× exp(−ϕt)
erf c(ϕ
)exp(ϕ
2
)ϕ
n+
1
2
√
π
8
(10)
where ϕ =
n
j=1
(1/γ
k
j
),andϕ
=(ϕ + μ)/(2
√
ϕ). In particular,
erfc is the complementary error function that can be written as
erf c(x)=(2/
√
π)
∞
x
exp(−t
2
)dt. Finally, the average uncondi-
tional SNR outage probability can be obtained by integrating (2) from
0to∞, and then, we arrive at
Pr (y+γ
b
≥ 0)=
∞
0
f(t)dt=μ
L
n=1
(−1)
n+1
L−n+1
k
1
=1
L−n+2
k
2
=k
1
+1
···
L
k
n
=k
n−1
+1
erf c(ϕ
)exp(ϕ
2
)ϕ
n−
1
2
√
π
8
. (11)
R
EFERENCES
[1] Z. Mo, W. Su, S. Batalama, and J. Matyjas, “Cooperative communication
protocol designs based on optimum power and time allocation,” IEEE
Trans. Wireless Commun., vol. 13, no. 8, pp. 4283–4296, Aug. 2014.
[2] I. Krikidis, J. S. Thompson, S. Mclaughlin, and N. Goertz, “Max-min
relay selection for legacy amplify-and-forward systems with interfer-
ence,” IEEE Trans. Wireless Commun., vol. 8, no. 6, pp. 3016–3027,
Jun. 2009.
[3] H. Hakim, H. Boujemaa, and W. Ajib, “Single relay selection schemes
for broadcast networks,” IEEE Trans. Wireless Commun., vol. 12, no. 6,
pp. 2646–2657, Jun. 2013.
[4] Y. Li and Z. Zheng, “Energy-efficient power allocation for two-hop relay
networks,” Electron. Lett., vol. 50, no. 2, pp. 123–125, Jan. 2014.
[5] M. Kaneko et al., “Amplify-and-forward cooperative diversity schemes
for multi-carrier systems,” IEEE Trans. Wireless Commun., vol. 7, no. 5,
pp. 1845–1850, May 2008.
[6] S. Ikki and M. H. Ahmed, “Performance analysis of cooperative diversity
with incremental-best-relay technique over Rayleigh fading channels,”
IEEE Trans. Commun., vol. 59, no. 8, pp. 2152–2161, Aug. 2011.
Security–Reliability Tradeoff Analysis of Multirelay-Aided
Decode-and-Forward Cooperation Systems
Jia Zhu, Yulong Zou, Senior Member, IEEE,
Benoit Champagne, Senior Member, IEEE,
Wei-Ping Zhu, Senior Member, IEEE,and
Lajos Hanzo, Fellow, IEEE
Abstract—We consider a cooperative wireless network comprised of
a source, a destination, and multiple relays operating in the presence
of an eavesdropper, which attempts to tap the source–destination trans-
mission. We propose a multirelay selection scheme for protecting the
source against eavesdropping. More specifically, multirelay selection allows
multiple relays to simultaneously forward the source’s transmission to the
destination, differing from the conventional single-relay selection, where
only the best relay is chosen to assist in the transmission from the source
to the destination. For the purpose of comparison, we consider the classic
direct transmission and single-relay selection as benchmark schemes. We
derive closed-form expressions of the intercept probability and the outage
probability for the direct transmission, as well as for the single-relay
and multirelay selection schemes over Rayleigh fading channels. It is
demonstrated that as the outage requirement is relaxed, the intercept
performance of the three schemes improves, and vice versa, implying that
there is a security-versus-reliability tradeoff (SRT). We also show that both
the single-relay and multirelay selection schemes outperform the direct
transmission in terms of SRT, demonstrating the advantage of the relay
selection schemes for protecting the source’s transmission against the
eavesdropping attacks. Finally, upon increasing the number of relays, the
SRTs of both the single-relay and multirelay selection schemes significantly
improve, and as expected, multirelay selection outperforms single-relay
selection.
Index Terms—Eavesdropping attack, intercept probability (IP), outage
probability (OP), relay selection, security–reliability tradeoff (SRT).
I. INT RODUCT ION
Wireless security has attracted increasing research attention in re-
cent years [1], [2]. Due to the broadcast nature of a wireless medium,
legitimate transmissions may be readily tapped by unauthorized users,
Manuscript received January 22, 2015; revised May 3, 2015; accepted July 3,
2015. Date of publication July 8, 2015; date of current version July 14, 2016.
This work was supported in part by the National Natural Science Foundation of
China under Grant 61302104 and Grant 61401223, by the Scientific Research
Foundation of Nanjing Uni versity of Posts and Telecommunications under
Grant NY213014 and Grant NY214001, by the Natural Science Foundation of
Jiangsu Province under Grant BK20140887, and by the Key Project of Natural
Science Research of Higher Education Institutions of Jiangsu Province under
Grant 15KJA510003. The review of this paper was coordinated by Dr. C. Xing.
(Corresponding author: Yulong Zou.)
J. Zhu and Y. Zou are with the School of Telecommunication and Information
Engineering, Nanjing University of Posts and Telecommunications, Nanjing
210046, China (e-mail: yulong.zou@njupt.edu.cn; jiazhu@njupt.edu.cn).
B. Champagne is with the Department of Electrical and Computer En-
gineering, McGill University, Montreal, QC H3A 0E9, Canada (e-mail:
benoit.champagne@mcgill.ca).
W.-P. Zhu is with the Department of Electrical and Computer Engineering,
Concordia Unive rsity, Montreal, QC H3G 1M8, Canada, and also with the
School of Communication and Information Engineering, Nanjing University
of Posts and Telecommunications, Nanjing 210046, China (e-mail: weiping@
ece.concordia.ca).
L. Hanzo is with the Department of Electronics and Computer Sci-
ence, Univ ersity of Southampton, Southampton SO17 1BJ, U.K. (e-mail:
lh@ecs.soton.ac.uk).
Color versions of one or more of the figures in this paper are available online
at http://ieeexplore.ieee.org.
Digital Object Identifier 10.1109/TVT.2015.2453364
0018-9545 © 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
资源评论
weixin_38642285
- 粉丝: 5
- 资源: 948
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
最新资源
- 自动驾驶定位系列教程十:闭环修正.pdf
- HM2333-VB一款P-Channel沟道SOT23的MOSFET晶体管参数介绍与应用说明
- Python实现插入排序算法(源代码)
- 123.cpp
- HM2319-VB一款P-Channel沟道SOT23的MOSFET晶体管参数介绍与应用说明
- modbus4j-3.0.4.jar
- 蒙特·卡罗实验、使用蒙特·卡罗方法计算圆周率近似值.docx
- HM2319A-VB一款P-Channel沟道SOT23的MOSFET晶体管参数介绍与应用说明
- JAVA SpringBoot 集成华为云OBS,多镜像配置settings
- 一个文件共享系统,包括前端文件展示系统和后台管理系统,基于SpringBoot + MyBatis实现
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功