Relay selection for wireless communications against eavesdropping: a security-reliability trade-off perspective

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security-reliability trade-off for cognitive radio networks in the presence of eavesdropping attack

In this paper, we consider a cognitive radio network that consists of one cognitive base station (CBS) and multiple cognitive users (CUs) in the presence of an eavesdropper. In the cognitive radio network, CBS first detects whether there is spectrum hole through spectrum sensing and then communicates with CUs over the detected spectrum hole. Due to the broadcast nature of wireless transmission,...

متن کامل

Security-Reliability Trade-off Analysis of Multi-Relay Aided Decode-and-Forward Cooperation Systems

We consider a cooperative wireless network comprised of a source, a destination and multiple relays operating in the presence of an eavesdropper, which attempts to tap the source-destination transmission. We propose multi-relay selection scheme for protecting the source against eavesdropping. More specifically, multi-relay selection allows multiple relays to simultaneously forward the source’s ...

متن کامل

Relay Node Selection Algorithm for Cooperative Communications in Wireless Networks

IEEE 802.11a/b/g standards support multiple transmission rates. Even though the use of multiple transmission rates increase the WLAN capacity, this feature leads to the performance anomaly problem. Cooperative communication was introduced to relieve the performance anomaly problem. Data packets are delivered to the destination much faster through a relay node with high rate than through direct ...

متن کامل

Wireless communications: security management against cloned cellular phones

Digital Object Identifier : 10.1109/WCNC.1999.796970 This work presents the development of a distributed security management system for telecommunication networks. The system consists in reducing the use of cloned mobile telephones (same both number and series of a genuine phone a perfect copy) using three main techniques. (1) An ISO Formal Technique (LOTOS) is used to specify and validate the ...

متن کامل

Trade-off Analysis for Requirements Selection

Evaluation, prioritization and selection of candidate requirements are of tremendous importance and impact for subsequent software development. Effort, time as well as quality constraints have to be taken into account. Typically, different stakeholders have conflicting priorities and the requirements of all these stakeholders have to be balanced in an appropriate way to ensure maximum value of ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Network

سال: 2016

ISSN: 0890-8044

DOI: 10.1109/mnet.2016.7579030