4,167 research outputs found
Outage Capacity of Incremental Relaying at Low Signal-to-Noise Ratios
We present the \epsilon-outage capacity of incremental relaying at low
signal-to-noise ratios (SNR) in a wireless cooperative network with slow
Rayleigh fading channels. The relay performs decode-and-forward and repetition
coding is employed in the network, which is optimal in the low SNR regime. We
derive an expression on the optimal relay location that maximizes the
\epsilon-outage capacity. It is shown that this location is independent of the
outage probability and SNR but only depends on the channel conditions
represented by a path-loss factor. We compare our results to the
\epsilon-outage capacity of the cut-set bound and demonstrate that the ratio
between the \epsilon-outage capacity of incremental relaying and the cut-set
bound lies within 1/\sqrt{2} and 1. Furthermore, we derive lower bounds on the
\epsilon-outage capacity for the case of K relays.Comment: 5 pages, 4 figures, to be presented at VTC Fall 2009 in Anchorage,
Alask
Relay Selection for Wireless Communications Against Eavesdropping: A Security-Reliability Tradeoff Perspective
This article examines the secrecy coding aided wireless communications from a
source to a destination in the presence of an eavesdropper from a
security-reliability tradeoff (SRT) perspective. Explicitly, the security is
quantified in terms of the intercept probability experienced at the
eavesdropper, while the outage probability encountered at the destination is
used to measure the transmission reliability. We characterize the SRT of
conventional direct transmission from the source to the destination and show
that if the outage probability is increased, the intercept probability
decreases, and vice versa. We first demonstrate that the employment of relay
nodes for assisting the source-destination transmissions is capable of
defending against eavesdropping, followed by quantifying the benefits of
single-relay selection (SRS) as well as of multi-relay selection (MRS) schemes.
More specifically, in the SRS scheme, only the single "best" relay is selected
for forwarding the source signal to the destination, whereas the MRS scheme
allows multiple relays to participate in this process. It is illustrated that
both the SRS and MRS schemes achieve a better SRT than the conventional direct
transmission, especially upon increasing the number of relays. Numerical
results also show that as expected, the MRS outperforms the SRS in terms of its
SRT. Additionally, we present some open challenges and future directions for
the wireless relay aided physical-layer security.Comment: 16 pages, IEEE Network, 201
A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead
Physical layer security which safeguards data confidentiality based on the
information-theoretic approaches has received significant research interest
recently. The key idea behind physical layer security is to utilize the
intrinsic randomness of the transmission channel to guarantee the security in
physical layer. The evolution towards 5G wireless communications poses new
challenges for physical layer security research. This paper provides a latest
survey of the physical layer security research on various promising 5G
technologies, including physical layer security coding, massive multiple-input
multiple-output, millimeter wave communications, heterogeneous networks,
non-orthogonal multiple access, full duplex technology, etc. Technical
challenges which remain unresolved at the time of writing are summarized and
the future trends of physical layer security in 5G and beyond are discussed.Comment: To appear in IEEE Journal on Selected Areas in Communication
Energy harvesting based two-way full-duplex relaying network over a Rician fading environment: performance analysis
Full-duplex transmission is a promising technique to enhance the capacity of communication systems. In this paper, we propose and investigate the system performance of an energy harvesting based two-way full-duplex relaying network over a Rician fading environment. Firstly, we analyse and demonstrate the analytical expressions of the achievable throughput, outage probability, optimal time switching factor, and symbol error ratio of the proposed system. In the second step, the effect of various parameters of the system on its performance is presented and investigated. In the final step, the analytical results are also demonstrated by Monte Carlo simulation. The numerical results proved that the analytical results and the simulation results agreed with each other.Web of Science68112311
- …