Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Achieving zero secrecy outage in amplify-and-forward relaying systems

View through CrossRef
A proposed artificial noise (AN) injection strategy is considered in amplify-and-forward (AF) relaying systems. The limit of secrecy rate, hence the resulting zero-outage secrecy throughput, is determined subject to guarantee zero secrecy outage toward any powerful eavesdropper. The results show that the proposed simple strategy can achieve zero secrecy outage, which cannot be achieved in literature, and that it is easy to apply in wireless networks. The results also show an important finding: increasing throughput against increasing transmit power in secrecy.
Title: Achieving zero secrecy outage in amplify-and-forward relaying systems
Description:
A proposed artificial noise (AN) injection strategy is considered in amplify-and-forward (AF) relaying systems.
The limit of secrecy rate, hence the resulting zero-outage secrecy throughput, is determined subject to guarantee zero secrecy outage toward any powerful eavesdropper.
The results show that the proposed simple strategy can achieve zero secrecy outage, which cannot be achieved in literature, and that it is easy to apply in wireless networks.
The results also show an important finding: increasing throughput against increasing transmit power in secrecy.

Related Results

Channel Precoding for Compute and Forward Relaying in Two Way Relay Network Model
Channel Precoding for Compute and Forward Relaying in Two Way Relay Network Model
Physical layer Network Coding (PNC) is a promising strategy to improve the spectral efficiency in a relay-based wireless transmission. This paper employs lattice-based channel codi...
Minimum transmit power under/considering relay selection for asymmetric two‐way relaying networks
Minimum transmit power under/considering relay selection for asymmetric two‐way relaying networks
Two‐way amplify‐and‐forward (AF) relaying networks have been widely studied because of their simplicity and high spectral efficiency characteristics. Power allocation (PA) and rela...
Optimal power allocation to improve secrecy performance of non‐regenerative cooperative systems using an untrusted relay
Optimal power allocation to improve secrecy performance of non‐regenerative cooperative systems using an untrusted relay
To protect data communication from eavesdropper nodes, different techniques have been developed to improve the physical‐layer security (PLS) of communications systems. Destination‐...
Physical layer security in space‐time block codes from coordinate interleaved orthogonal design
Physical layer security in space‐time block codes from coordinate interleaved orthogonal design
In this study, the physical layer (PHY) security performance of orthogonal space‐time block coding (OSTBC) employing a coordinate interleaved orthogonal design (CIOD) is analysed a...
Secret Leviathan
Secret Leviathan
Leviathan, the all-powerful sea monster of the Old Testament, was Thomas Hobbes’s metaphor for the state: “that Mortall God to which wee owe . . . our peace and defence.” We make o...
A Lightweight Anonymous Authentication Protocol with Perfect Forward Secrecy for Wireless Sensor Networks
A Lightweight Anonymous Authentication Protocol with Perfect Forward Secrecy for Wireless Sensor Networks
Due to their frequent use in unattended and hostile deployment environments, the security in wireless sensor networks (WSNs) has attracted much interest in the past two decades. Ho...
Multi‐way relaying for cooperative indoor power line communications
Multi‐way relaying for cooperative indoor power line communications
Sustaining high data rates over an indoor broadband power line communication (PLC) link is a challenging task due to the significant attenuation of high frequency signals transmitt...

Back to Top