The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, multi-hop cooperative techniques are adopted to improve the physical-layer security in 5G large-scale decode-and-forward relay networks with massive relays and eavesdroppers. The utilization of graph theory is investigated to relieve the burden of massive nodes and ease the cooperative anti-eavesdropping transmission designs. In particular, a secrecy weighted graph is first established...
In this paper, we focus on the issue of energy efficiency (EE) optimization of amplify-and-forward-based energy harvesting two-way relaying systems. Utilizing the statistical channel state information, we first build a statistical EE model, which is applicable to practical environments under fast fading channels. Then, a power allocation problem is formulated to maximize the EE under the constraints...
In this paper, we first investigate the physical-layer security in wireless communication with multiple eavesdroppers. Considering the importance of the fairness among multiple relays, this paper presents the sub-optimal relay selection protocol based on cumulative distribution function (CDF) of the ratio of channel coefficients, which satisfies the security requirement at the same time. We analyze...
Increasing attention has been concentrated on the information-theoretic secrecy in physical layer. Considering that both reliability and validity are important design targets for wireless network design, therefore, rather than improve the secure performance as much as possible, the goal of the paper is to maximize the system capacity while satisfying the secure quality of service (QoS) and the total...
In this paper, with the square root Kalman filter (SR-KF), a low complexity estimation algorithm for doubly selective fading channels is proposed. Based on the complex exponential basis expansion models (CE-BEMs), the proposed scheme can achieve nearly the same mean-square error of estimated channel and bit error rate (BER) performance as traditional recursive least square (RLS) scheme regardless...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.