Secure Transmission with Optimal Power Allocation in Untrusted Relay Networks

被引:128
|
作者
Wang, Lifeng [1 ]
Elkashlan, Maged [1 ]
Huang, Jing [2 ]
Tran, Nghi H. [3 ]
Duong, Trung Q. [4 ]
机构
[1] Queen Mary Univ London, London, England
[2] Univ Calif Irvine, Irvine, CA USA
[3] Univ Akron, Akron, OH 44325 USA
[4] Queens Univ Belfast, Belfast, Antrim, North Ireland
关键词
Cooperative jamming; optimal power allocation; physical layer security; untrusted relay;
D O I
10.1109/WCL.2014.031114.140018
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider the problem of secure transmission in two-hop amplify-and-forward untrusted relay networks. We analyze the ergodic secrecy capacity (ESC) and present compact expressions for the ESC in the high signal-to-noise ratio regime. We also examine the impact of large scale antenna arrays at either the source or the destination. For large antenna arrays at the source, we confirm that the ESC is solely determined by the channel between the relay and the destination. For very large antenna arrays at the destination, we confirm that the ESC is solely determined by the channel between the source and the relay.
引用
收藏
页码:289 / 292
页数:4
相关论文
共 50 条
  • [31] Joint Power Splitting and Secure Beamforming Design in the Wireless-powered Untrusted Relay Networks
    Zhao, Mingxiong
    Feng, Suili
    Wang, Xiangfeng
    Zhang, Meng
    Liu, Yuan
    Fu, Hao
    [J]. 2015 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2015,
  • [32] Secure Beamforming for MIMO Two-Way Transmission with an Untrusted Relay
    Mo, Jianhua
    Tao, Meixia
    Liu, Yuan
    Xia, Bin
    Ma, Xiaoli
    [J]. 2013 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2013, : 4180 - 4185
  • [33] Optimized Secure and Energy-Efficient Transmission in an Untrusted Relay Network
    Mekkawy, Tamer
    Yao, Rugui
    Xu, Fei
    Wang, Ling
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMMUNICATIONS AND COMPUTING (ICSPCC), 2017,
  • [34] Secure Transmission Using an Untrusted Relay with Scaled Compute-and-Forward
    Ren, Zhijie
    Goseling, Jasper
    Weber, Jos H.
    Gastpar, Michael
    [J]. 2015 IEEE INFORMATION THEORY WORKSHOP (ITW), 2015,
  • [35] Secure transmission using an untrusted relay with scaled compute-and-forward
    Dep. of Intelligent Systems, Delft University of Technology, Netherlands
    不详
    不详
    [J]. IEEE Inf. Theory Workshop, ITW, 2015,
  • [36] Optimal Relay Selection for Secure NOMA Systems Under Untrusted Users
    Cao, Kunrui
    Wang, Buhong
    Ding, Haiyang
    Li, Tengyao
    Gong, Fengkui
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (02) : 1942 - 1955
  • [37] Bandwidth and Power Allocation for Gaussian Orthogonal Untrusted Relay Channel
    Deng Zhixiang
    Yu Zhangju
    Wang Baoyun
    [J]. PROCEEDINGS OF 2012 IEEE 11TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING (ICSP) VOLS 1-3, 2012, : 1315 - 1318
  • [38] Outage Regions and Optimal Power Allocation for Wireless Relay Networks
    Renk, Tobias
    Jaekel, Holger
    Jondral, Friedrich K.
    [J]. 2009 IEEE INFORMATION THEORY WORKSHOP (ITW 2009), 2009, : 168 - 172
  • [39] Secure Transmission with Covert Requirement in Untrusted Relaying Networks
    Forouzesh, Moslem
    Azmi, Paeiz
    Kuhestani, Ali
    [J]. 2018 9TH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2018, : 670 - 675
  • [40] Secure OFDM Transmission in Wireless Networks with Untrusted Relays
    Dong, Qiuli
    Li, Guobing
    [J]. 2017 9TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP), 2017,