Exact Outage Probability of a Decode-and-Forward Scheme with Best Relay Selection Under Physical Layer Security

2013 ◽  
Vol 74 (2) ◽  
pp. 325-342 ◽  
Author(s):  
Pham Ngoc Son ◽  
Hyung Yun Kong
Sensors ◽  
2021 ◽  
Vol 21 (17) ◽  
pp. 5692
Author(s):  
Van-Duc Phan ◽  
Tan N. Nguyen ◽  
Anh Vu Le ◽  
Miroslav Voznak

In this paper, we study the physical layer security for simultaneous wireless information and power transfer (SWIPT)-based half-duplex (HD) decode-and-forward relaying system. We consider a system model including one transmitter that tries to transmit information to one receiver under the help of multiple relay users and in the presence of one eavesdropper that attempts to overhear the confidential information. More specifically, to investigate the secrecy performance, we derive closed-form expressions of outage probability (OP) and secrecy outage probability for dynamic power splitting-based relaying (DPSBR) and static power splitting-based relaying (SPSBR) schemes. Moreover, the lower bound of secrecy outage probability is obtained when the source’s transmit power goes to infinity. The Monte Carlo simulations are given to corroborate the correctness of our mathematical analysis. It is observed from simulation results that the proposed DPSBR scheme outperforms the SPSBR-based schemes in terms of OP and SOP under the impact of different parameters on system performance.


Frequenz ◽  
2014 ◽  
Vol 68 (9-10) ◽  
Author(s):  
Zongsheng Zhang ◽  
Xurong Pi

AbstractIn this paper, we investigate the outage performance of decode-and-forward cognitive relay networks for Nakagami-m fading channels, with considering both best relay selection and interference constraints. Focusing on the relay selection and making use of the underlay cognitive approach, an exact closed-form outage probability expression is derived in an independent, non-identical distributed Nakagami-m environment. The closed-form outage probability provides an efficient means to evaluate the effects of the maximum allowable interference power, number of cognitive relays, and channel conditions between the primary user and cognitive users. Finally, we present numerical results to validate the theory analysis. Moreover, from the simulation results, we obtain that the system can obtain the full diversity.


2015 ◽  
Vol 17 (2) ◽  
pp. 162-171 ◽  
Author(s):  
Khuong Ho-Van ◽  
Paschalis C. Sofotasios ◽  
George C. Alexandropoulos ◽  
Steven Freear

IEEE Access ◽  
2018 ◽  
Vol 6 ◽  
pp. 22670-22683 ◽  
Author(s):  
Khagendra Belbase ◽  
Zhang Zhang ◽  
Hai Jiang ◽  
Chintha Tellambura

Sign in / Sign up

Export Citation Format

Share Document