Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Physical layer security via maximal ratio combining and relay selection over Rayleigh fading channel
Technology Research Center for Convergence Networks and Ubiquitous Services, University of Science and Technology Beijing.
Technology Research Center for Convergence Networks and Ubiquitous Services, University of Science and Technology Beijing.
School of Information and Electrical Engineering, Hunan University of Science and Technology, Xiangtan.
University of Science and Technology, Beijing, Technology Research Center for Convergence Networks and Ubiquitous Services, University of Science and Technology Beijing.
Show others and affiliations
2015 (English)In: 26th IEEE Annual International Symposium on Personal, Indoor, and Mobile Radio Communications, PIMRC 2015: Hong Kong, Aug. 30 2015-Sept. 2 2015, Piscataway, NJ: IEEE Communications Society, 2015, p. 612-616, article id 7343372Conference paper, Published paper (Refereed)
Abstract [en]

The impact of both maximal ratio combining (MRC) and relay selection on the physical layer security in wireless communication systems is studied by analyzing some important factors, including the probability characteristic of the legitimate receiver (Bob) and malicious eavesdropper (Eve)'s end-to-end signal-to-noise ratio (SNR), the secrecy outage probability, and the average secrecy channel capacity over Rayleigh fading Channel. We assume that Bob receives its data from both the relay and the source by cooperative communication, provided that MRC is employed at the receiver. Compared to the conventional MRC methods, a higher spatial diversity order can be exploited by performing relay selection in the proposed method, as validated via both theoretical analysis and numerical simulation. The theoretical closed-form expressions for some figures of merit, e.g., the secrecy outage probability and the average secrecy capacity, are all consistent with the numerical results

Place, publisher, year, edition, pages
Piscataway, NJ: IEEE Communications Society, 2015. p. 612-616, article id 7343372
National Category
Media and Communication Technology
Research subject
Mobile and Pervasive Computing
Identifiers
URN: urn:nbn:se:ltu:diva-32713DOI: 10.1109/PIMRC.2015.7343372Scopus ID: 2-s2.0-84958047669Local ID: 749ccdcc-cb35-410b-9824-88086a7f718dISBN: 9781467367820 (electronic)OAI: oai:DiVA.org:ltu-32713DiVA, id: diva2:1005947
Conference
IEEE Annual International Symposium on Personal, Indoor, and Mobile Radio Communications : 30/08/2015 - 02/09/2015
Note
Validerad; 2016; Nivå 1; 20160226 (andbra)Available from: 2016-09-30 Created: 2016-09-30 Last updated: 2018-07-10Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records BETA

Vasilakos, Athanasios

Search in DiVA

By author/editor
Vasilakos, Athanasios
By organisation
Computer Science
Media and Communication Technology

Search outside of DiVA

GoogleGoogle Scholar

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 17 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf