Yin et al., 2018 - Google Patents
Secure energy harvesting communications with relay selection over Nakagami-m fading channelsYin et al., 2018
View PDF- Document ID
- 4316046230698008162
- Author
- Yin C
- Nguyen N
- Garcia-Palacios E
- Tran X
- Le-Tien T
- Publication year
- Publication venue
- Mobile Networks and Applications
External Links
Snippet
In this paper, an energy harvesting relay network over Nakagami-m fading is investigated. In the considered system, the power beacon can provide wireless energy for the source and relays which deploy time-switching-based radio frequency energy harvesting technique …
- 238000003306 harvesting 0 title abstract description 22
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/14—Relay systems
- H04B7/15—Active relay systems
- H04B7/155—Ground-based stations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/02—Diversity systems; Multi-antenna systems, i.e. transmission or reception using multiple antennas
- H04B7/04—Diversity systems; Multi-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
- H04B7/0413—MIMO systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/04—Large scale networks; Deep hierarchical networks
- H04W84/042—Public Land Mobile systems, e.g. cellular systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L5/00—Arrangements affording multiple use of the transmission path
- H04L5/0001—Arrangements for dividing the transmission path
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L5/00—Arrangements affording multiple use of the transmission path
- H04L5/003—Arrangements for allocating sub-channels of the transmission path
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W72/00—Local resource management, e.g. wireless traffic scheduling or selection or allocation of wireless resources
- H04W72/04—Wireless resource allocation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W16/00—Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
- H04W16/24—Cell structures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B1/00—Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04J—MULTIPLEX COMMUNICATION
- H04J11/00—Orthogonal multiplex systems, e.g. using WALSH codes
- H04J11/0023—Interference mitigation or co-ordination
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W52/00—Power Management, e.g. TPC [Transmission Power Control], power saving or power classes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Cao et al. | Improving physical layer security of uplink NOMA via energy harvesting jammers | |
Ha et al. | Outage performance of energy harvesting DF relaying NOMA networks | |
Pahuja et al. | Cooperative communication in physical layer security: Technologies and challenges | |
Ibrahim et al. | A new relay and jammer selection schemes for secure one-way cooperative networks | |
Garcia et al. | Relay selection and power allocation for secrecy sum rate maximization in underlying cognitive radio with cooperative relaying NOMA | |
Wang et al. | Secure wireless powered cooperative communication networks with finite energy storage | |
Jia et al. | Relay selection for improved physical layer security in cognitive relay networks using artificial noise | |
Jin et al. | Physical layer security transmission scheme based on artificial noise in cooperative SWIPT NOMA system | |
Yin et al. | Secure energy harvesting communications with relay selection over Nakagami-m fading channels | |
Hung et al. | Secrecy outage performance of multi-hop leach networks using power beacon aided cooperative jamming with jammer selection methods | |
Cuong et al. | Analysis of secrecy outage performance for full duplex NOMA relay systems with appearance of multiple eavesdroppers | |
Ha et al. | Secure cognitive reactive decode-and-forward relay networks: With and without eavesdropper | |
Rauniyar et al. | Secrecy performance analysis of cooperative nonorthogonal multiple access in IoT networks | |
Sarker et al. | Secure wireless multicasting through AF-cooperative networks with best-relay selection over generalized fading channels | |
Zarrabi et al. | EE‐RS and PA for untrusted relay network at high signal‐to‐noise ratio regime | |
Chen et al. | Joint power optimization for multi-source multi-destination relay networks | |
Sharma et al. | Secure communication with energy harvesting multiple half-duplex DF relays assisted with jamming | |
Odeyemi et al. | Secrecy outage probability in energy harvesting aided underlay cognitive radio network under eavesdroppers scenarios | |
Nawaz et al. | Resource optimization framework for physical layer security of dual-hop multi-carrier decode and forward relay networks | |
Jiang et al. | Joint relay and jammer selection and power control for physical layer security in two-way relay networks with imperfect CSI | |
Khan et al. | Reflective in-band full duplex NOMA communications for secure 5G networks | |
Benedict et al. | Secrecy analysis of a cognitive radio network with an energy harvesting AF relay | |
Le-Thanh et al. | Security-and-reliability trade-off of energy harvesting-based underlay relaying networks with transmit antenna selection and jamming | |
Mekkawy et al. | Optimal power allocation in an amplify-and-forward untrusted relay network with imperfect channel state information | |
Zhang et al. | Secrecy analysis for IoT relaying networks deploying NOMA with energy harvesting |