Max-Ratio Relay Selection in Secure Buffer-Aided Cooperative Wireless Networks
نویسندگان
چکیده
منابع مشابه
Max-Relay Selection in Cooperative Wireless Networks with Data Compression
The secure wireless communication has been an important field of research. The proposed max-ratio relay selection techniques introduced to security of transmission in buffer aided cooperative wireless network. The data transmitted from source to relay and relay to destination. An eavesdropper can used to intercept the data from source to relay and relay to destination. Assume, data buffer are a...
متن کاملLink Selection for Secure Cooperative Networks with Buffer-Aided Relaying
This paper investigates the secure communication in a two-hop cooperative wireless network, where a bufferaided relay is utilized to forward data from the source to destination, and a passive eavesdropper attempts to intercept data transmission from both the source and relay. Depending on the availability of instantaneous channel state information of the source, two cases of transmission mechan...
متن کاملPerformance Analysis of Wireless Cooperative Networks with Iterative Incremental Relay Selection
In this paper, an iterative incremental relay selection (IIRS) scheme is considered for wireless cooperative networks in order to increase the reliability of transmission. Different from the conventional incremental relay selection which incrementally selects a best relay for only one iteration; the IIRS scheme iteratively applies the incremental relaying and relay selection processes. To evalu...
متن کاملBuffer-Aided Relay Selection Algorithms for Physical-Layer Security in Wireless Networks
In this work, we consider the use of buffer-aided relays, linear precoding techniques and multiple antennas for physical-layer security in wireless networks. We develop relay selection algorithms to improve the secrecy-rate performance of cooperative multi-user multiple-antenna wireless networks. In particular, we propose a novel finite buffer-aided relay selection algorithm that employs the ma...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Information Forensics and Security
سال: 2014
ISSN: 1556-6013,1556-6021
DOI: 10.1109/tifs.2014.2307672