Performance Analysis of Physical Layer Security of Opportunistic Scheduling in Multiuser Multirelay Cooperative Networks
نویسندگان
چکیده
In this paper, we study the physical layer security (PLS) of opportunistic scheduling for uplink scenarios of multiuser multirelay cooperative networks. To this end, we propose a low-complexity, yet comparable secrecy performance source relay selection scheme, called the proposed source relay selection (PSRS) scheme. Specifically, the PSRS scheme first selects the least vulnerable source and then selects the relay that maximizes the system secrecy capacity for the given selected source. Additionally, the maximal ratio combining (MRC) technique and the selection combining (SC) technique are considered at the eavesdropper, respectively. Investigating the system performance in terms of secrecy outage probability (SOP), closed-form expressions of the SOP are derived. The developed analysis is corroborated through Monte Carlo simulation. Numerical results show that the PSRS scheme significantly improves the secure ability of the system compared to that of the random source relay selection scheme, but does not outperform the optimal joint source relay selection (OJSRS) scheme. However, the PSRS scheme drastically reduces the required amount of channel state information (CSI) estimations compared to that required by the OJSRS scheme, specially in dense cooperative networks.
منابع مشابه
Distance-Aware Beamforming for Multiuser Secure Communication Systems
Typical cryptography schemes are not well suited for low complexity types of equipment, e.g., Internet of things (IoT) devices, as they may need high power or impose high computational complexity on the device. Physical (PHY) layer security techniques such as beamforming (in multiple antennas systems) are possible alternatives to provide security for such applications. In this paper, we consid...
متن کاملBursty Traffic Meets Fading: A Cross-Layer Design Perspective∗
We study cross-layer optimization of transmitting bursty traffic over fading channels. A common theme is to exploit (rather than combat) channel variation and traffic burstiness. Specifically, for bursty data transmissions in CDMA networks, we identify the existence of a nontrivial predictive multi-access interference (MAI) temporal structure in such systems. The predictive MAI structure is uti...
متن کاملOpportunistic Scheduling Using Channel Memory in Markov-modeled Wireless Networks
The presence of multiple users in a network provides us with a valuable resource known as multiuser diversity. With information on the instantaneous states of the channels, multiuser diversity can be tapped by opportunistic multiuser scheduling. It is important that the channel state information is acquired in a cost-effective way so that the losses involved in this operation do not offset the ...
متن کاملPerformance of opportunistic scheduling for physical layer security with transmit antenna selection
We introduce an opportunistic scheduling to enhance the physical layer security with transmit antenna selection (TAS) in multiuser environment. We consider a wireless communication system composed of a single transmitter and multiple legitimate users in the presence of several eavesdroppers with each node having multiple antennas under quasi-static Rayleigh fading channel. The transmitter selec...
متن کاملOpportunistic Scheduling Using Channel Memory in Markov-modeled Wireless Networks
The presence of multiple users in a network provides us with a valuable resource known as multiuser diversity. With information on the instantaneous states of the channels, multiuser diversity can be tapped by opportunistic multiuser scheduling. It is important that the channel state information is acquired in a cost-effective way so that the losses involved in this operation does not offset th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره 17 شماره
صفحات -
تاریخ انتشار 2017