The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we investigate the error exponents of dual-hop amplify-and-forward (AF) system for η-μ fading channel. Channel capacity of a wireless communication system gives only the knowledge of maximum achievable rate. Therefore, it is necessary to analyse the decoding complexity of the code that achieves a certain level of reliable communication. In fact, a measure of reliability called error...
We consider the problem of secret communication through co-existing radio systems assisted by cognitive relay (CR). Assuming a cognitive radio setup in which secondary base station (SBS) is allowed to transmit simultaneously with the primary base station (PBS) over the same channel, at first, we investigate the impact of interferences on the receive diversity of cognitive interference channels and...
Along with the channel capacity, the error exponent is one of the most important information-theoretic measures of reliability, as it sets ultimate bounds on the performance of communication systems employing codes of finite complexity. In this paper, we derive the closed-form expressions for the Gallager's random coding and expurgated error exponents for Rayleigh fading multi-keyhole multiple-input...
We consider a confidential communication through log-normal fading channel in which a single antenna transmitter communicates with a legitimate receiver in the presence of an eavesdropper. Employing maximal ratio combining (MRC) and equal gain combining (EGC) reception schemes at the legitimate receiver and eavesdropper, we find the closed-form expressions for the secrecy parameters, namely, the probability...
We consider the problem of secret communication through cognitive relay assisted interference channels where the secondary users are allowed to transmit simultaneously with the primary users over the same channel in the presence of an eavesdropper. At first, we investigate the effect of diversity in enhancing security of the cognitive interference channels with multiple relays. Then, the performance...
Along with the channel capacity, the error exponent is one of the most important information theoretic measures of reliability, as it sets ultimate bounds on the performance of communication systems employing codes of finite complexity. In this paper, we derive the closed-form expressions for the Gallager's random coding and expurgated error exponents for Rayleigh fading product multiple-input multiple-output...
Along with the channel capacity, the error exponent is one of the most important information-theoretic measures of reliability, as it sets ultimate bounds on the performance of communication systems employing codes of finite complexity. In this paper, we consider 2 × 2 Nakagami-m fading channels and determine the exact closed-form analytical expression for the random coding error exponent which provides...
Along with the channel capacity, the error exponent is one of the most important information theoretic measures of reliability, as it sets ultimate bounds on the performance of communication systems employing codes of finite complexity. In this paper, we derive the closed-form expressions of Gallager's random coding and expurgated error exponents for Nakagami-m fading keyhole multiple-input multiple-output...
This paper is concerned with the study of secrecy capacity for the log-normal fading channel in which the main channel is correlated with the eavesdropper channel. Perfect secrecy is achieved when the transmitter and legitimate receiver can communicate at some positive rate, while insuring that the eavesdropper gets zero bits of information. We consider the full channel state information (CSI) case,...
This paper is concerned with the study of confidential communication through independent and identically distributed (i.i.d.) and evenly correlated Rayleigh fading channels, where a single antenna transmitter communicates with the corresponding receiver in the presence of an eavesdropper. Both the receiver and eavesdropper are equipped with multiple antennas and employ diversity combining receptions...
In this paper, we study the error exponent of generalized-K fading multiple-input multiple-output (MIMO) channels over Orthogonal Space-Time Block Codes (OSTBC). Error exponent sets ultimate bounds on the performance of communication systems employing codes of finite complexity and has been seen as one of the most significant information theoretic measures of reliability. In this paper, closed-form...
In this correspondence, we consider a confidential communication through slow non-selective correlated Rayleigh fading channel, where a single antenna transmitter communicates at a pre-decided constant rate with a legitimate receiver in the presence of an eavesdropper. Both the legitimate receiver and eavesdropper are equipped with multiple antennas and employ maximal ratio combining (MRC) reception...
In the group-oriented applications such as military and commercial wireless cellular networks often require the same data to be conveyed to multiple users simultaneously. This technique is usually referred to as physical layer multicasting. In this paper, we consider the problem of secret communication over Nakagami-m fading multiple-input single-output (MISO) channel, where a single transmitter sends...
We consider the problem of secret communication over Nakagami-m fading multiple-input single-output (MISO) broadcast channel, where transmitter sends messages to the destination users following two different transmission protocols. In the first transmission protocol, transmitter sends a confidential message to user 1, and user 2 acts as an eavesdropper. In this protocol, at first, we define the ergodic...
In this paper, we derive the closed-form Gallager's random coding error exponent expression for Orthogonal Space-Time Block Coded (OSTBC) Nakagami-m fading multiple-input multiple-output (MIMO) channels. We assume that the transmitter has no channel-state information (CSI) and perfect CSI at the receiver. We get the knowledge of an elementary tradeoff between the communication reliability and information...
In this paper, we consider a Rayleigh fading multiple-access interference channel where a group of users communicate with a receiver in the presence of multiple Gaussian interferers. We derive the closed-form analytical expressions for the ergodic sum-capacity in case of uncorrelated multiple-input multiple-output (MIMO) channel and spatially uncorrelated orthogonal space time block coded (OSTBC)...
In this paper, a wireless multicast scenario is considered in which the transmitter sends a common message to a group of client receivers through quasi-static Rayleigh fading channel in the presence of an eavesdropper. The communication between transmitter and each client receiver is said to be secured if the eavesdropper is unable to decode any information. On the basis of an information-theoretic...
In the group-oriented applications such as military and commercial wireless cellular networks often require the same data to be conveyed to multiple users simultaneously. This technique is usually referred to as physical layer multicasting. In this paper, we are interested in protecting these data from eavesdropping. Here, we consider the transmission of confidential data through slow fading channels...
In this paper, we consider a cognitive relay assisted multiple-input multiple-output (MIMO) communication scenario through Rayleigh fading channel where multiple primary and secondary users wish to communicate with two different receivers in the presence of a cognitive relay. We assume that secondary users transmit simultaneously with the primary users over the same channel instead of waiting for...
In this paper, we analyze the outage performance of a cognitive relay assisted single-input multiple-output (SIMO) cognitive interference channel, where multiple secondary users each with single antenna wish to communicate with the secondary receiver equipped with multiple antennas through Rayleigh fading channels in the presence of a primary user. We assume that secondary users transmit simultaneously...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.