pith. sign in

arxiv: 1712.09420 · v1 · pith:H7FMFNIAnew · submitted 2017-12-21 · 💻 cs.IT · math.IT

Effective Optimization Criteria and Relay Selection Algorithms for Physical-Layer Security in Multiple-Antenna Relay Networks

classification 💻 cs.IT math.IT
keywords criteriarelayalgorithmschannelseavesdropperseffectiveknowledgenetworks
0
0 comments X p. Extension
pith:H7FMFNIA Add to your LaTeX paper What is a Pith Number?
\usepackage{pith}
\pithnumber{H7FMFNIA}

Prints a linked pith:H7FMFNIA badge after your title and writes the identifier into PDF metadata. Compiles on arXiv with no extra files. Learn more

read the original abstract

Physical-layer security for wireless networks has become an effective approach and recently drawn significant attention in the literature. In particular, the deployment and allocation of resources such as relays to assist the transmission have gained significant interest due to their ability to improve the secrecy rate of wireless networks. In this work, we examine relay selection criteria with arbitrary knowledge of the channels of the users and the eavesdroppers. We present alternative optimization criteria based on the signal-to-interference and the secrecy rate criteria that can be used for resource allocation and that do not require knowledge of the channels of the eavesdroppers and the interference. We then develop effective relay selection algorithms that can achieve a high secrecy rate performance without the need for the knowledge of the channels of the eavesdroppers and the interference. Simulation results show that the proposed criteria and algorithms achieve excellent performance.

This paper has not been read by Pith yet.

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.