Max-Ratio Relay Selection in Secure Buffer-Aided Cooperative Wireless Networks

@article{Chen2014MaxRatioRS,
  title={Max-Ratio Relay Selection in Secure Buffer-Aided Cooperative Wireless Networks},
  author={Gaojie Chen and Zhao Tian and Yu Gong and Zhi Chen and Jonathon A. Chambers},
  journal={IEEE Transactions on Information Forensics and Security},
  year={2014},
  volume={9},
  pages={719-729}
}
  • Gaojie Chen, Zhao Tian, +2 authors Jonathon A. Chambers
  • Published in
    IEEE Transactions on…
    2014
  • Computer Science
  • This paper considers the security of transmission in buffer-aided decode-and-forward cooperative wireless networks. An eavesdropper which can intercept the data transmission from both the source and relay nodes is considered to threaten the security of transmission. Finite size data buffers are assumed to be available at every relay in order to avoid having to select concurrently the best source-to-relay and relay-to-destination links. A new max-ratio relay selection policy is proposed to… CONTINUE READING

    Create an AI-powered research feed to stay up to date with new papers like this posted to ArXiv

    Citations

    Publications citing this paper.
    SHOWING 1-10 OF 105 CITATIONS

    ISOLATION OF DETECTED IN EAVESDROPPING IN 5G WIRELESS COMMUNICATION NETWORKS

    VIEW 4 EXCERPTS
    CITES BACKGROUND & METHODS
    HIGHLY INFLUENCED

    Secure Simultaneous Wireless Information and Power Transfer in MIMO Systems

    VIEW 17 EXCERPTS
    CITES BACKGROUND
    HIGHLY INFLUENCED

    On Security-Delay Trade-Off in Two-Hop Wireless Networks With Buffer-Aided Relay Selection

    VIEW 6 EXCERPTS
    CITES METHODS & BACKGROUND
    HIGHLY INFLUENCED

    Physical layer security performance study for Two-Hop wireless networks with Buffer-Aided relay selection

    VIEW 10 EXCERPTS
    CITES METHODS & BACKGROUND
    HIGHLY INFLUENCED

    Secrecy Outage Analysis of Buffer-Aided Cooperative MIMO Relaying Systems

    VIEW 8 EXCERPTS
    CITES BACKGROUND & METHODS
    HIGHLY INFLUENCED

    Secrecy Outage Analysis for Downlink Transmissions in the Presence of Randomly Located Eavesdroppers

    VIEW 7 EXCERPTS
    CITES BACKGROUND

    Secrecy outage analysis of buffer-aided multi-antenna relay systems without eavesdropper's CSI

    VIEW 8 EXCERPTS
    CITES BACKGROUND & METHODS
    HIGHLY INFLUENCED

    A Survey on Buffer-Aided Relay Selection

    VIEW 5 EXCERPTS
    CITES BACKGROUND
    HIGHLY INFLUENCED

    Cost-Effective Signal Processing Algorithms for Physical-Layer Security in Wireless Networks

    VIEW 8 EXCERPTS
    CITES BACKGROUND & METHODS
    HIGHLY INFLUENCED

    The Delay-Security Trade-Off in Two-Hop Buffer-Aided Relay Wireless Network

    VIEW 6 EXCERPTS
    CITES BACKGROUND & METHODS
    HIGHLY INFLUENCED

    FILTER CITATIONS BY YEAR

    2014
    2020

    CITATION STATISTICS

    • 17 Highly Influenced Citations

    • Averaged 19 Citations per year from 2017 through 2019

    • 11% Increase in citations per year in 2019 over 2018

    References

    Publications referenced by this paper.
    SHOWING 1-10 OF 36 REFERENCES

    Buffer-Aided Relay Selection for Cooperative Diversity Systems without Delay Constraints

    VIEW 7 EXCERPTS
    HIGHLY INFLUENTIAL

    Opportunistic relay selection for cooperative networks with secrecy constraints

    VIEW 4 EXCERPTS
    HIGHLY INFLUENTIAL

    Buffer-Aided Relaying with Adaptive Link Selection

    A General Relaying Transmission Protocol for MIMO Secrecy Communications

    VIEW 1 EXCERPT

    Buffer-aided relaying in a three node network

    Comment on "Relay Selection for Secure Cooperative Networks with Jamming"

    Joint Relay and Jammer Selection for Secure Two-Way Relay Networks

    VIEW 2 EXCERPTS

    Max-Max Relay Selection for Relays with Buffers

    VIEW 1 EXCERPT