The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper investigates the leakage rate based hybrid untrustworthy relay selection strategy. The investigation considers a dual-hop multiple half/full-duplex untrustworthy bidirectional amplify-and-forward wireless relaying network in the system model. The investigation also considers that the untrustworthy relay terminals are under the effect of a finite number of friendly jammers' interference...
This paper presents a ray tracing approach to optimise the position of a relay in a static environment such that the signal-to-noise ratio (SNR) is maximised at the receiver. The underlying principles behind the ray tracing wireless channel model are summarised. An implementation of a ray tracing algorithm is developed in MATLAB to calculate the channel state information (CSI) of a relay-assisted...
This paper presents an adaptive robotic swarm of Unmanned Aerial Vehicles (UAVs) enabling communications between separated non-swarm devices. The swarm nodes utilise machine learning and hyper-heuristic policy evolution to provide agility within the swarm, enabling each swarm member to select the most appropriate mobility policy for the environment given the swarm's abilities. The swarm evolution...
Millimeter wave (mmWave) communication is a key enabling technology for 5G cellular systems. However, due to mmWave propagation characteristics, link length for very high rates is limited and will likely necessitate the use of relay nodes for longer-range ultra-high-speed backhaul communications. This paper investigates relay selection and scheduling to support high end-to-end throughput in mmWave...
The deployment of small cell base stations within the coverage area of a macrocell base station serves as an important means of increasing energy efficiency. Furthermore, such a deployment also constitutes a key technology for future communication network markets. There is a shortage of research, however, on how to efficiently solve the problem of coverage holes (that is, specific locations or areas...
In this work, information security of a cooperative wireless communication system over three-phase amplify-and-forward (AF) two-way relaying channels is investigated. A relay power allocation scheme is proposed to improve secrecy capacity of the system. We first derive the secrecy rate expression for the basic scenario which consists of one source, one destination, one single relay, and an eavesdropper...
Physical layer security is becoming a promising technology to face the security challenges of diversified and rapidly-growing wireless applications. In this paper, we propose a three-hop secure Orthogonal Frequency Division Multiplexing (OFDM) transmission protocol for the wireless networks with untrusted relays. In the proposed protocol, instead of exploiting the degree of freedom over spatial domain...
In this paper, a vertical physical-layer network coding (VPNC) scheme based pulse amplitude modulation (PAM) for two-way relay channel (TWRC) is proposed. Different from the conventional physical layer network coding (PNC) scheme in which the relay superimposes two users' signals of the same constellation, in the proposed VPNC scheme two users transmit PAM signals with vertical constellation and the...
Energy harvesting has been gaining a lot of attention in the past decade due to its ability to provide a-virtually-endless energy supply. Nodes in a Wireless Powered Communication Network (WPCN) depend, totally or partially, on the energy harvested from the Central Node (CN) which has a constant power supply. This work addresses a solution to the problem of lack of fairness in the distribution of...
Considering unreliable wireless backhaul connections across transmitters, we investigate the outage performance of a finite-sized selective relaying system with M transmitters and N relays under Nakagami-m fading channels. To send the source message to the destination, the transmitter-relay pair providing the highest end-to-end signal-to-noise ratio is selected for transmission. The backhaul reliability...
Simultaneous wireless information and power transfer (SWIPT) is an effective way for energy-constrained unmanned aerial vehicle (UAV) to prolong the network lifetime. In this paper, an amplify and forward (AF) relaying network is considered, where an energy-constrained UAV harvests energy and information simultaneously from base station and then transmits the information to the destination node. Based...
This paper describes a new implementation of the Elastic Multicast (EM) protocol including new design enhancements for improved dynamic operation. The paper also presents additional performance data collected from emulation-based mobile network experiments. EM is a low complexity extension to Simplified Multicast Forwarding (SMF) that adds group-specific dynamic pruning of the SMF-based multicast...
In this paper, we propose a scheme in which a communication relay unmanned aerial vehicle (UAV) estimates the distribution of the terminals and selects the optimal relay position for autonomous maneuvering. In order to accomplish mission success, warfighters on the battlefield must communicate with their commander all the time. Autonomous maneuvering of a relay UAV using the proposed scheme will support...
In the conventional directional modulation (DM) system without relay aiding, when the eavesdropper locates within the main-beam of the desired direction, it can intercept the confidential message from source Alice. In this paper, we propose a strategy to enhance physical-layer security of direction modulation in wireless transmission with the help of multi-relay cooperation. In this scenario, the...
Terahertz (THz) band (0.1–10 THz) communication, which is envisioned as one of the key wireless communication technologies of the next decade, exhibits an extremely large bandwidth at the cost of an extremely high path loss. The unique distance-dependent behavior on the available bandwidth in THz communication interrelates all THz properties, and affects the design and performances within and across...
Internet of Things (IoT) depicts an intelligent future, where any IoT-based devices having a sensorial and computing capabilities to interact with each other. Recently, we are living in the area of internet and rapidly moving towards a smart planet where devices are capable to be connected to each other. Cooperative ad-hoc vehicle systems are the main driving force for the actualization of IoT-based...
Numerous IoT devices in wireless network interact and cooperate with each other to achieve diverse intelligent services. Such devices use static channel for wireless transmission, making the whole network vulnerable to eavesdroppers. This raises a need for means to allow secure data transmission/reception between IoT routing nodes. The concept of antenna diversity is used to enhance secrecy capacity...
In this paper, we propose two novel fiber-optic relaying schemes, one using SM technology and another using STBC and MRC diversity reception technologies, for MIMO mobile transmission. Using single RoF link to relay MIMO signals, the proposed schemes have much lower system complexity and cost than the conventional RoF relaying system. Computer simulation confirmed that the proposed SM-RoF scheme has...
In this paper, we propose a cross-layer design framework for transmitting Markov modulated Poisson process (MMPP) traffic over cognitive cooperative networks, which considers the energy efficient transmissions for different delay-aware packets. The adaptive modulation and coding (AMC) is used in the cooperative transmission system. The queueing process is considered in the buffer aided relay and source...
This paper investigates the link selection policy for secure communications over a buffer-aided two-hop communication link. It is assumed that a source wishes to send information to a destination with the aid of a trusted half-duplex relay node compromised by a passive eavesdropper, and that there is no direct link between the source and the destination. The buffer-aided relay forwards the information...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.