897 research outputs found

    Exploiting secure performance of full-duplex decode and forward in optimal relay selection networks

    Get PDF
    In the presence of an illegitimate user, we investigate the secrecy outage probability (SOP) of the optimal relay selection (ORS) networks by applying decode-and-forward (DnF) based full-duplex (FD) relaying mode. The closed-form expressions for the allocations of the end-to-end signal-to-interference-plus-noise ratio (SINR) in each wireless network are derived as well as the closed-form expression for the exact SOP of the proposed ORS system is presented under Rayleigh fading schemes. As an important achievement, SOP is also compared between orthogonal multiple access (OMA) and non-orthogonal multiple access (NOMA) schemes. Our results reveal that the SOP of the suggested scheme can be considerably influenced by several parameters involved, including the number of relays, the average signal-to-noise ratio (SNR) of eavesdropper links, transmit power and the average residual self-interference (SI) enforced on the FD relays.Web of Science244767

    Secrecy performance of TAS/SC-based multi-hop harvest-to-transmit cognitive WSNs under joint constraint of interference and hardware imperfection

    Get PDF
    In this paper, we evaluate the secrecy performance of multi-hop cognitive wireless sensor networks (WSNs). In the secondary network, a source transmits its data to a destination via the multi-hop relaying model using the transmit antenna selection (TAS)/selection combining (SC) technique at each hop, in the presence of an eavesdropper who wants to receive the data illegally. The secondary transmitters, including the source and intermediate relays, have to harvest energy from radio-frequency signals of a power beacon for transmitting the source data. Moreover, their transmit power must be adjusted to satisfy the quality of service (QoS) of the primary network. Under the joint impact of hardware imperfection and interference constraint, expressions for the transmit power for the secondary transmitters are derived. We also derive exact and asymptotic expressions of secrecy outage probability (SOP) and probability of non-zero secrecy capacity (PNSC) for the proposed protocol over Rayleigh fading channel. The derivations are then verified by Monte Carlo simulations.Web of Science195art. no. 116
    corecore