Secure Transmission for Multiuser Relay Networks
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, Sung-Il | - |
dc.contributor.author | Kim, Il-Min | - |
dc.contributor.author | Heo, Jun | - |
dc.date.accessioned | 2021-09-04T14:23:23Z | - |
dc.date.available | 2021-09-04T14:23:23Z | - |
dc.date.created | 2021-06-16 | - |
dc.date.issued | 2015-07 | - |
dc.identifier.issn | 1536-1276 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/93054 | - |
dc.description.abstract | We investigate secure transmission for multiuser relay networks, where the undesired users who are not selected for data reception may overhear the source message as eavesdroppers. In this system, the secrecy performance may deteriorate as the number of users increases, since the number of eavesdroppers also increases. To address this issue, we consider a multiuser relay scheme with cooperative jamming (MUCJ). In this scheme, the desired user sends a jamming signal to the relay while the source sends its message to the relay, and then the relay amplifies and forwards the received signal to the desired user. Since the jamming can be subtracted only at the desired user, it acts as interference to prevent the eavesdroppers from intercepting the source message. We propose an optimal user selection scheme for the MUCJ, which is optimal in the sense of maximizing the secrecy rate. For the existing multiuser relay scheme (MURS) without cooperative jamming and the MUCJ, we derive the ergodic secrecy rates and analyze the asymptotic secrecy rate gains. We reveal that the ergodic secrecy rate can be increased as the number of users grows and much higher secrecy rate can be achieved by the MUCJ. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC | - |
dc.subject | WIRELESS NETWORKS | - |
dc.subject | POWER ALLOCATION | - |
dc.subject | DIVERSITY | - |
dc.subject | PERFORMANCE | - |
dc.subject | COMMUNICATION | - |
dc.subject | SELECTION | - |
dc.subject | CHANNEL | - |
dc.title | Secure Transmission for Multiuser Relay Networks | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Heo, Jun | - |
dc.identifier.doi | 10.1109/TWC.2015.2410776 | - |
dc.identifier.scopusid | 2-s2.0-84937146871 | - |
dc.identifier.wosid | 000357805200017 | - |
dc.identifier.bibliographicCitation | IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, v.14, no.7, pp.3724 - 3737 | - |
dc.relation.isPartOf | IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS | - |
dc.citation.title | IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS | - |
dc.citation.volume | 14 | - |
dc.citation.number | 7 | - |
dc.citation.startPage | 3724 | - |
dc.citation.endPage | 3737 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordPlus | WIRELESS NETWORKS | - |
dc.subject.keywordPlus | POWER ALLOCATION | - |
dc.subject.keywordPlus | DIVERSITY | - |
dc.subject.keywordPlus | PERFORMANCE | - |
dc.subject.keywordPlus | COMMUNICATION | - |
dc.subject.keywordPlus | SELECTION | - |
dc.subject.keywordPlus | CHANNEL | - |
dc.subject.keywordAuthor | Cooperative jamming | - |
dc.subject.keywordAuthor | multiuser relay networks | - |
dc.subject.keywordAuthor | physical layer security | - |
dc.subject.keywordAuthor | secrecy capacity | - |
dc.subject.keywordAuthor | secure communications | - |
dc.subject.keywordAuthor | untrustworthy users | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.