Relay selection for wireless communications against eavesdropping: a security-reliability trade-off perspective
نویسندگان
چکیده
منابع مشابه
Security-reliability trade-off for cognitive radio networks in the presence of eavesdropping attack
In this paper, we consider a cognitive radio network that consists of one cognitive base station (CBS) and multiple cognitive users (CUs) in the presence of an eavesdropper. In the cognitive radio network, CBS first detects whether there is spectrum hole through spectrum sensing and then communicates with CUs over the detected spectrum hole. Due to the broadcast nature of wireless transmission,...
متن کاملSecurity-Reliability Trade-off Analysis of Multi-Relay Aided Decode-and-Forward Cooperation Systems
We consider a cooperative wireless network comprised of a source, a destination and multiple relays operating in the presence of an eavesdropper, which attempts to tap the source-destination transmission. We propose multi-relay selection scheme for protecting the source against eavesdropping. More specifically, multi-relay selection allows multiple relays to simultaneously forward the source’s ...
متن کاملRelay Node Selection Algorithm for Cooperative Communications in Wireless Networks
IEEE 802.11a/b/g standards support multiple transmission rates. Even though the use of multiple transmission rates increase the WLAN capacity, this feature leads to the performance anomaly problem. Cooperative communication was introduced to relieve the performance anomaly problem. Data packets are delivered to the destination much faster through a relay node with high rate than through direct ...
متن کاملWireless communications: security management against cloned cellular phones
Digital Object Identifier : 10.1109/WCNC.1999.796970 This work presents the development of a distributed security management system for telecommunication networks. The system consists in reducing the use of cloned mobile telephones (same both number and series of a genuine phone a perfect copy) using three main techniques. (1) An ISO Formal Technique (LOTOS) is used to specify and validate the ...
متن کاملTrade-off Analysis for Requirements Selection
Evaluation, prioritization and selection of candidate requirements are of tremendous importance and impact for subsequent software development. Effort, time as well as quality constraints have to be taken into account. Typically, different stakeholders have conflicting priorities and the requirements of all these stakeholders have to be balanced in an appropriate way to ensure maximum value of ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Network
سال: 2016
ISSN: 0890-8044
DOI: 10.1109/mnet.2016.7579030