Secure Multiuser Scheduling in Downlink Dual-Hop Regenerative Relay Networks Over Nakagami- $m$ Fading Channels

@article{Yang2016SecureMS,
  title={Secure Multiuser Scheduling in Downlink Dual-Hop Regenerative Relay Networks Over Nakagami- \$m\$ Fading Channels},
  author={Maoqiang Yang and Daoxing Guo and Yuzhen Huang and Trung Quang Duong and Bangning Zhang},
  journal={IEEE Transactions on Wireless Communications},
  year={2016},
  volume={15},
  pages={8009-8024}
}
In this paper, we investigate the secrecy performance of multiuser dual-hop relay networks where a base station (BS) communicates with multiple legitimate users through the assistance of a trustful regenerative relay in the presence of multiple eavesdroppers. In particular, the maximal ratio transmission scheme is exploited at the BS and a threshold-based multiuser scheduling scheme is employed over the legitimate users, while concerning the imperfect decoding at the regenerative relay. To… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-10 OF 18 CITATIONS

Industrial Networks and Intelligent Systems

  • Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
  • 2017
VIEW 4 EXCERPTS
CITES BACKGROUND, METHODS & RESULTS
HIGHLY INFLUENCED

Secrecy performance of cognitive radio networks with optimal source selection under the impact of unreliable backhaul

  • 2018 2nd International Conference on Recent Advances in Signal Processing, Telecommunications & Computing (SigTelCom)
  • 2018

References

Publications referenced by this paper.
SHOWING 1-10 OF 42 REFERENCES

Secrecy Outage of Dual-Hop Regenerative Multi-Relay System With Relay Selection

  • IEEE Transactions on Wireless Communications
  • 2015
VIEW 6 EXCERPTS
HIGHLY INFLUENTIAL

Wireless Information-Theoretic Security

  • IEEE Transactions on Information Theory
  • 2008
VIEW 3 EXCERPTS
HIGHLY INFLUENTIAL

Performance of Analog Network Coding Based Two-Way EH Relay with Beamforming

  • 2016 IEEE 83rd Vehicular Technology Conference (VTC Spring)
  • 2016
VIEW 1 EXCERPT

Similar Papers

Loading similar papers…