multiple relay
Recently Published Documents


TOTAL DOCUMENTS

317
(FIVE YEARS 41)

H-INDEX

21
(FIVE YEARS 3)

Electronics ◽  
2021 ◽  
Vol 11 (1) ◽  
pp. 40
Author(s):  
Nabila Sehito ◽  
Shouyi Yang ◽  
Esraa Mousa Ali ◽  
Muhammad Abbas Khan ◽  
Raja Sohail Ahmed Larik ◽  
...  

In this article, we investigated the secrecy performance of a three-hop relay network system with Power Splitting (PS) and Energy Harvesting (EH). In the presence of one eavesdropper, a signal is transferred from source to destination with the help of a relay. The source signal transmits in full-duplex (FD) mood, jamming the relay transfer signals to the destination. The relay and source employ Time Switching (TS) and Energy Harvesting (EH) techniques to obtain the power from the power beacon. In this study, we compared the Secrecy Rate of two Cooperative Schemes, Amplify and Forward (AF) and Decode and Forward (DF), for both designed systems with the established EH and PS system. The Secrecy Rate was improved by 50.5% in the AF scheme and by 44.2% in the DF scheme between the relay and eavesdropper at 40 m apart for the proposed system in EH and PS. This simulation was performed using the Monto Carlo method in MATLAB.


Sensors ◽  
2021 ◽  
Vol 21 (17) ◽  
pp. 5692
Author(s):  
Van-Duc Phan ◽  
Tan N. Nguyen ◽  
Anh Vu Le ◽  
Miroslav Voznak

In this paper, we study the physical layer security for simultaneous wireless information and power transfer (SWIPT)-based half-duplex (HD) decode-and-forward relaying system. We consider a system model including one transmitter that tries to transmit information to one receiver under the help of multiple relay users and in the presence of one eavesdropper that attempts to overhear the confidential information. More specifically, to investigate the secrecy performance, we derive closed-form expressions of outage probability (OP) and secrecy outage probability for dynamic power splitting-based relaying (DPSBR) and static power splitting-based relaying (SPSBR) schemes. Moreover, the lower bound of secrecy outage probability is obtained when the source’s transmit power goes to infinity. The Monte Carlo simulations are given to corroborate the correctness of our mathematical analysis. It is observed from simulation results that the proposed DPSBR scheme outperforms the SPSBR-based schemes in terms of OP and SOP under the impact of different parameters on system performance.


2021 ◽  
Author(s):  
Gan Srirutchataboon ◽  
Jun Kochi ◽  
Shinya Sugiura

This paper proposes novel buffer-aided relaying selection in a two-hop cooperative network based on virtual full-duplex (VFD) and half-duplex transmission. The proposed scheme consists of five relay selection modes, i.e., two unicast modes, a broadcast mode, a cooperative beamforming mode, and a VFD mode. The broadcast mode allows multiple relay nodes to seamlessly share a common packet, which allows us to solve the inter-relay interference problem imposed on the VFD mode.


2021 ◽  
Author(s):  
Gan Srirutchataboon ◽  
Jun Kochi ◽  
Shinya Sugiura

This paper proposes novel buffer-aided relaying selection in a two-hop cooperative network based on virtual full-duplex (VFD) and half-duplex transmission. The proposed scheme consists of five relay selection modes, i.e., two unicast modes, a broadcast mode, a cooperative beamforming mode, and a VFD mode. The broadcast mode allows multiple relay nodes to seamlessly share a common packet, which allows us to solve the inter-relay interference problem imposed on the VFD mode.


2021 ◽  
Author(s):  
Tu-Trinh Thi Nguyen ◽  
Dinh-Thuan Do ◽  
Yeong-Chin Chen ◽  
Chakchai So-In ◽  
Md Arafatur Rahman

2021 ◽  
Vol 2021 ◽  
pp. 1-15
Author(s):  
Thu-Thuy Thi Dao ◽  
Pham Ngoc Son

This paper considers the effects of perfect/imperfect successive interference cancellation (SIC) and perfect/imperfect ` information (CSI) in a multiple-relay two-way cooperative network using nonorthogonal multiple access (NOMA) and digital network coding (DNC). In this model, a relay is selected by maximizing estimated channel gains to enhance the decoding capacity of the nearer source and minimize the collection time of imperfect CSI. Spectrum utilization efficiency is enhanced two times by a mixture of the SIC and DNC techniques at the selected relay (called as the SIC-2TS protocol). The system performance is considered through analysis of the exact and asymptotic expressions of the system outage probabilities and throughput. The major thing is exposed as the proposed SIC-2TS protocol can reach the best performance at optimal positions of the selected relay. Besides, the system throughput of the proposed protocol outperforms a SIC-utilized two-way relaying scheme without the DNC (called as the SIC-3TS protocol) and a conventional two-way scheme (called as the CONV-4TS protocol) for all signal-to-noise ratio regions. Lastly, the validity of the analytical expressions is verified by the Monte Carlo simulation results.


2021 ◽  
Vol 10 (2) ◽  
pp. 848-855
Author(s):  
Chi-Bao Le ◽  
Dinh-Thuan Do

This paper studies a downlink security-aware secure outage performance in the secondary network of cognitive radio-assisted non-orthogonal multiple access network (CR-NOMA). The multiple relay is employed to assist transmission from the secondary source to destinations. The security-aware performance is subject to constraints in fixed power allocation factor assigned to each secondary user. The security-aware secure performance is based on channel state information (CSI) at the physical layer in which an eavesdropper intends to steal information. According to the considered system, exact expressions of Strictly positive secure capacity (SPSC) are proved to analyze system in terms of secure performance. Finally, the secondary user secure problem is evaluated via Monte-Carlo simulation method. The main results indicate that the secure performance of proposed system can be improved significantly.


Sign in / Sign up

Export Citation Format

Share Document