[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Yin et al., 2018 - Google Patents

Secure energy harvesting communications with relay selection over Nakagami-m fading channels

Yin et al., 2018

View PDF
Document ID
4316046230698008162
Author
Yin C
Nguyen N
Garcia-Palacios E
Tran X
Le-Tien T
Publication year
Publication venue
Mobile Networks and Applications

External Links

Snippet

In this paper, an energy harvesting relay network over Nakagami-m fading is investigated. In the considered system, the power beacon can provide wireless energy for the source and relays which deploy time-switching-based radio frequency energy harvesting technique …
Continue reading at pure.qub.ac.uk (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/14Relay systems
    • H04B7/15Active relay systems
    • H04B7/155Ground-based stations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/02Diversity systems; Multi-antenna systems, i.e. transmission or reception using multiple antennas
    • H04B7/04Diversity systems; Multi-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
    • H04B7/0413MIMO systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/04Large scale networks; Deep hierarchical networks
    • H04W84/042Public Land Mobile systems, e.g. cellular systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L5/00Arrangements affording multiple use of the transmission path
    • H04L5/0001Arrangements for dividing the transmission path
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L5/00Arrangements affording multiple use of the transmission path
    • H04L5/003Arrangements for allocating sub-channels of the transmission path
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W72/00Local resource management, e.g. wireless traffic scheduling or selection or allocation of wireless resources
    • H04W72/04Wireless resource allocation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W16/00Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
    • H04W16/24Cell structures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B1/00Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04JMULTIPLEX COMMUNICATION
    • H04J11/00Orthogonal multiplex systems, e.g. using WALSH codes
    • H04J11/0023Interference mitigation or co-ordination
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W52/00Power Management, e.g. TPC [Transmission Power Control], power saving or power classes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity

Similar Documents

Publication Publication Date Title
Cao et al. Improving physical layer security of uplink NOMA via energy harvesting jammers
Ha et al. Outage performance of energy harvesting DF relaying NOMA networks
Pahuja et al. Cooperative communication in physical layer security: Technologies and challenges
Ibrahim et al. A new relay and jammer selection schemes for secure one-way cooperative networks
Garcia et al. Relay selection and power allocation for secrecy sum rate maximization in underlying cognitive radio with cooperative relaying NOMA
Wang et al. Secure wireless powered cooperative communication networks with finite energy storage
Jia et al. Relay selection for improved physical layer security in cognitive relay networks using artificial noise
Jin et al. Physical layer security transmission scheme based on artificial noise in cooperative SWIPT NOMA system
Yin et al. Secure energy harvesting communications with relay selection over Nakagami-m fading channels
Hung et al. Secrecy outage performance of multi-hop leach networks using power beacon aided cooperative jamming with jammer selection methods
Cuong et al. Analysis of secrecy outage performance for full duplex NOMA relay systems with appearance of multiple eavesdroppers
Ha et al. Secure cognitive reactive decode-and-forward relay networks: With and without eavesdropper
Rauniyar et al. Secrecy performance analysis of cooperative nonorthogonal multiple access in IoT networks
Sarker et al. Secure wireless multicasting through AF-cooperative networks with best-relay selection over generalized fading channels
Zarrabi et al. EE‐RS and PA for untrusted relay network at high signal‐to‐noise ratio regime
Chen et al. Joint power optimization for multi-source multi-destination relay networks
Sharma et al. Secure communication with energy harvesting multiple half-duplex DF relays assisted with jamming
Odeyemi et al. Secrecy outage probability in energy harvesting aided underlay cognitive radio network under eavesdroppers scenarios
Nawaz et al. Resource optimization framework for physical layer security of dual-hop multi-carrier decode and forward relay networks
Jiang et al. Joint relay and jammer selection and power control for physical layer security in two-way relay networks with imperfect CSI
Khan et al. Reflective in-band full duplex NOMA communications for secure 5G networks
Benedict et al. Secrecy analysis of a cognitive radio network with an energy harvesting AF relay
Le-Thanh et al. Security-and-reliability trade-off of energy harvesting-based underlay relaying networks with transmit antenna selection and jamming
Mekkawy et al. Optimal power allocation in an amplify-and-forward untrusted relay network with imperfect channel state information
Zhang et al. Secrecy analysis for IoT relaying networks deploying NOMA with energy harvesting