Table of Contents Author Guidelines Submit a Manuscript
Mobile Information Systems
Volume 2017, Article ID 7461803, 8 pages
https://doi.org/10.1155/2017/7461803
Research Article

Performance Analysis of Secrecy Outage Probability for AF-Based Partial Relay Selection with Outdated Channel Estimates

Department of Electronic Engineering, Kyungil University, Gyeongbuk, Republic of Korea

Correspondence should be addressed to Kyu-Sung Hwang; rk.ca.uik@gnawhsk

Received 26 April 2017; Accepted 22 June 2017; Published 27 August 2017

Academic Editor: Michele Garetto

Copyright © 2017 Kyu-Sung Hwang. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. C. E. Shannon, “Communication theory of secrecy systems,” The Bell System Technical Journal, vol. 28, pp. 656–715, 1949. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  2. A. D. Wyner, “The wire-tap channel,” The Bell System Technical Journal, vol. 54, no. 8, pp. 1355–1387, 1975. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  3. I. Csiszár and J. Körner, “Broadcast channels with confidential messages,” IEEE Transactions on Information Theory, vol. 24, no. 3, pp. 339–348, 1978. View at Publisher · View at Google Scholar · View at MathSciNet
  4. S. K. Leung-Yan-Cheong and M. E. Hellman, “The Gaussian wire-tap channel,” IEEE Transactions on Information Theory, vol. 24, no. 4, pp. 451–456, 1978. View at Publisher · View at Google Scholar · View at MathSciNet
  5. M. Bloch, J. Barros, M. R. Rodrigues, and S. W. McLaughlin, “Wireless information-theoretic security,” IEEE Transactions on Information Theory, vol. 54, no. 6, pp. 2515–2534, 2008. View at Publisher · View at Google Scholar · View at MathSciNet
  6. A. Sendonaris, E. Erkip, and B. Aazhang, “User cooperation diversity-part I: system description,” IEEE Transactions on Communications, vol. 51, no. 11, pp. 1927–1938, 2003. View at Publisher · View at Google Scholar · View at Scopus
  7. B. Rankov and A. Wittneben, “Spectral efficient protocols for half-duplex fading relay channels,” IEEE Journal on Selected Areas in Communications, vol. 25, no. 2, pp. 379–389, 2007. View at Publisher · View at Google Scholar · View at Scopus
  8. L. Lai and H. El Gamal, “The relay-eavesdropper channel: cooperation for secrecy,” IEEE Transactions on Information Theory, vol. 54, no. 9, pp. 4005–4019, 2008. View at Publisher · View at Google Scholar · View at MathSciNet
  9. L. Dong, Z. Han, A. P. Petropulu, and H. . Poor, “Improving wireless physical layer security via cooperating relays,” IEEE Transactions on Signal Processing, vol. 58, no. 3, part 2, pp. 1875–1888, 2010. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  10. I. Krikidis, “Opportunistic relay selection for cooperative networks with secrecy constraints,” IET Communications, vol. 4, no. 15, pp. 1787–1791, 2010. View at Publisher · View at Google Scholar · View at Scopus
  11. H. N. Vu and V. N. Q. Bao, “Study of relay selection for dual-hop networks under secrecy constraints with multiple eavesdroppers,” in Proceedings of the 4th Annual International Conference on Advanced Technologies for Communications, ATC2011, pp. 89–92, August 2011. View at Publisher · View at Google Scholar · View at Scopus
  12. K.-S. Hwang and M. Ju, “Secrecy outage probability of amplify-and-forward transmission with multi-antenna relay in presence of eavesdropper,” in Proceedings of the 2014 24th IEEE International Conference on Communications, ICC 2014, pp. 5408–5412, June 2014. View at Publisher · View at Google Scholar · View at Scopus
  13. H. M. Wang and X. G. Xia, “Enhancing wireless secrecy via cooperation: signal design and optimization,” IEEE Communications Magazine, vol. 53, no. 12, pp. 47–53, 2015. View at Publisher · View at Google Scholar
  14. X. Chen, D. W. Ng, W. H. Gerstacker, and H. Chen, “A Survey on Multiple-Antenna Techniques for Physical Layer Security,” IEEE Communications Surveys & Tutorials, vol. 19, no. 2, pp. 1027–1053, 2017. View at Publisher · View at Google Scholar
  15. N. Yang, P. L. Yeoh, M. Elkashlan, R. Schober, and I. B. Collings, “Transmit antenna selection for security enhancement in MIMO wiretap channels,” IEEE Transactions on Communications, vol. 61, no. 1, pp. 144–154, 2013. View at Publisher · View at Google Scholar · View at Scopus
  16. I. Krikidis, J. Thompson, S. Mclaughlin, and N. Goertz, “Amplify-and-forward with partial relay selection,” IEEE Communications Letters, vol. 12, no. 4, pp. 235–237, 2008. View at Publisher · View at Google Scholar
  17. H. A. Suraweera, M. Soysa, C. Tellambura, and H. K. Garg, “Performance analysis of partial relay selection with feedback delay,” IEEE Signal Processing Letters, vol. 17, no. 6, pp. 531–534, 2010. View at Publisher · View at Google Scholar · View at Scopus
  18. M. Soysa, H. A. Suraweera, C. Tellambura, and H. K. Garg, “Partial and opportunistic relay selection with outdated channel estimates,” IEEE Transactions on Communications, vol. 60, no. 3, pp. 840–850, 2012. View at Publisher · View at Google Scholar · View at Scopus
  19. D. S. Michalopoulos, H. A. Suraweera, G. K. Karagiannidis, and R. Schober, “Amplify-and-forward relay selection with outdated channel estimates,” IEEE Transactions on Communications, vol. 60, no. 5, pp. 1278–1290, 2012. View at Publisher · View at Google Scholar · View at Scopus
  20. I. S. Gradshteyn and I. M. Ryzhik, Table of integrals, series, and products, Academic Press, Inc., San Diego, CA, USA, 7th edition, 1996. View at MathSciNet
  21. M. K. Simon and M.-S. Alouini, Digital Communication over Fading Channels, John Wiley & Sons, New York, NY, USA, 2nd edition, 2004.