Learn More
In this paper, we develop a simple blind channel estimation algorithm for two-way relay network (TWRN) that consists of two terminal nodes and one relay node. We consider the frequency selective channels and adopt the orthogonal frequency-division multiplexing (OFDM) modulation to compensate the inter-symbol interference (ISI). By(More)
This paper proposes relay selection in order to increase the physical layer security in multiuser cooperative relay networks with multiple amplify-and-forward (AF) relays, in the presence of multiple eavesdroppers. To strengthen the network security against eavesdropping attack, we present three criteria to select the best relay and user pair. Specifically,(More)
We present two physical layer secure transmission schemes for multiuser multirelay networks, where the communication from M users to the base station is assisted by direct links and by N decode-and-forward relays. In this network, we consider that a passive eavesdropper exists to overhear the transmitted information, which entails exploiting the advantages(More)
This paper studies an untrusted relay channel, in which the destination sends artificial noise simultaneously with the source sending a message to the relay, in order to protect the source's confidential message. The traditional amplify-and-forward (AF) scheme shows poor performance in this situation because of the interference power dilemma. Providing(More)
In this paper, optimal power control for source and relay in an energy harvesting relay network is studied. The relay network includes a source node, an amplify-and-forward relay node, and a destination node. The source and relay are able to harvest energy from nature, and have their own data to transmit. The source and relay adjust their transmission(More)
In this paper, we propose a multiuser cognitive relay network, where multiple secondary sources communicate with a secondary destination through the assistance of a secondary relay in the presence of secondary direct links and multiple primary receivers. We consider the two relaying protocols of amplify-andforward (AF) and decode-and-forward (DF), and take(More)
This paper considers a multiuser two-way relay network (TWRN) consisting of one base station (BS), one amplifyand-forward (AF) relay and K mobile stations (MSs) among which the N th-best MS is selected to exchange information with the BS. Specifically, we study the impact of outdated channel state information (CSI) on the system over time-varying Rayleigh(More)
In this paper, we study a two-phase underlay cognitive relay network, where there exists an eavesdropper who can overhear the message. The secure data transmission from the secondary source to secondary destination is assisted by two decode-and-forward (DF) relays. Although the traditional opportunistic relaying technique can choose one relay to provide the(More)